145 research outputs found

    Evaluation and Management of Pruritus in Primary Biliary Cholangitis

    Full text link
    Chronic pruritus is a classic symptom in patients with primary biliary cholangitis. It affects up to two-thirds of patients in the course of the disease. Efficient therapy consists of topical treatment combined with systemic options such as anion exchangers, rifampicin, bezafibrate, ÎŒ-opioid receptor antagonists, selective-serotonin receptor uptake inhibitors, and gabapentinoids. Future therapeutic approaches may contain the selective blockade of the enterohepatic cycle by inhibiting the ileal bile acid transporter, the agonism at Îș-opioid receptors, and antagonism of the mas-related G protein-coupled receptor X4. As nondrug treatment, ultraviolet B therapy, albumin dialysis, and biliary drainage are available at specialized centers

    Iron as recyclable energy carrier: Feasibility study and kinetic analysis of iron oxide reduction

    Get PDF
    Carbon-free and sustainable energy storage solutions are required to mitigate climate change. One possible solution, especially for stationary applications, could be the storage of energy in metal fuels. Energy can be stored through reduction of the oxide with green hydrogen and be released by combustion. In this work a feasibility study for iron as possible metal fuel considering the complete energy cycle is conducted. On the basis of equilibrium calculations it could be shown that the power-to-power efficiency of the iron/iron oxide cycle is 27 %. As technology development requires a more detailed description of both the reduction and the oxidation, a first outlook is given on the kinetic analysis of the reduction of iron oxides with hydrogen. Thermogravimetric experiments using Fe2_2O3_3, Fe3_3O4_4 and FeO indicate a three-step process for the reduction. The maximum reduction rate can be achieved with a hydrogen content of 25 %. Based on the experimental results a reaction mechanism and accompanied kinetic data were developed for description of Fe2_2O3_3 reduction with H2_2 under varying experimental conditions

    Simulation of Fluid Flow During Direct Synthesis of H2_{2}O2_{2} in a Microstructured Membrane Reactor

    Get PDF
    A microstructured membrane reactor has been developed to overcome the safety and productivity challenge of the direct synthesis of hydrogen peroxide. A single membrane is employed for separate, continuous dosage of the gaseous reactants hydrogen and oxygen to the solid catalyst present in the aqueous solvent. Using a custom OpenFOAM¼ model, the impact of catalyst‐coated static mixers with different mixer geometries is studied. It is demonstrated that the custom fluid guiding elements outperform the investigated commercial static mixer under the flow conditions relevant to this application

    Distribution of Buxbaumia viridis (Moug. ex Lam. et DC.) Brid. ex Moug. et Nestl. (Bryophyta) in Montenegro

    Get PDF
    The present paper is a contribution to the knowledge of the distribution of the moss species Buxbaumia viridis in Montenegro. The records are from 14 known sites at elevations over 1300 m a.s.l. in the northern and north-eastern parts of the country. Population size is remarkable in Durmitor National Park at Crno jezero lake, where sporophytes can be found on ca 50 tree trunks

    Design and Reliability Performance Evaluation of Network Coding Schemes for Lossy Wireless Networks

    Get PDF
    This thesis investigates lossy wireless networks, which are wireless communication networks consisting of lossy wireless links, where the packet transmission via a lossy wireless link is successful with a certain value of probability. In particular, this thesis analyses all-to-all broadcast in lossy wireless networks, where every node has a native packet to transmit to all other nodes in the network. A challenge of all-to-all broadcast in lossy wireless networks is the reliability, which is defined as the probability that every node in the network successfully obtains a copy of the native packets of all other nodes. In this thesis, two novel network coding schemes are proposed, which are the neighbour network coding scheme and the random neighbour network coding scheme. In the two proposed network coding schemes, a node may perform a bit-wise exclusive or (XOR) operation to combine the native packet of itself and the native packet of its neighbour, called the coding neighbour, into an XOR coded packet. The reliability of all-to-all broadcast under both the proposed network coding schemes is investigated analytically using Markov chains. It is shown that the reliability of all-to-all broadcast can be improved considerably by employing the proposed network coding schemes, compared with non-coded networks with the same link conditions, i.e. same probabilities of successful packet transmission via wireless channels. Further, the proposed schemes take the link conditions of each node into account to maximise the reliability of a given network. To be more precise, the first scheme proposes the optimal coding neighbour selection method while the second scheme introduces a tuning parameter to control the probability that a node performs network coding at each transmission. The observation that channel condition can have a significant impact on the performance of network coding schemes is expected to be applicable to other network coding schemes for lossy wireless networks

    A model for the periodic water wave problem and its long wave amplitude equations

    Get PDF
    We are interested in the validity of the KdV and of the long wave NLS approximation for the water wave problem over a periodic bottom. Approximation estimates are non-trivial, since solutions of order O(Δ^2 ), resp. O(Δ), have to be controlled on an O(1/Δ^3 ), resp. O(1/Δ^2 ), time scale. In contrast to the spatially homogeneous case, in the periodic case new quadratic resonances occur and make a more involved analysis necessary. For a phenomenological model we present some results and explain the underlying ideas. The focus is on results which are robust in the sense that they hold under very weak non-resonance conditions without a detailed discussion of the resonances. This robustness is achieved by working in spaces of analytic functions. We explain that, if analyticity is dropped, the KdV and the long wave NLS approximation make wrong predictions in case of unstable resonances and suitably chosen periodic boundary conditions. Finally we outline, how, we think, the presented ideas can be transferred to the water wave problem

    Modulational Instability in Equations of KdV Type

    Full text link
    It is a matter of experience that nonlinear waves in dispersive media, propagating primarily in one direction, may appear periodic in small space and time scales, but their characteristics --- amplitude, phase, wave number, etc. --- slowly vary in large space and time scales. In the 1970's, Whitham developed an asymptotic (WKB) method to study the effects of small "modulations" on nonlinear periodic wave trains. Since then, there has been a great deal of work aiming at rigorously justifying the predictions from Whitham's formal theory. We discuss recent advances in the mathematical understanding of the dynamics, in particular, the instability of slowly modulated wave trains for nonlinear dispersive equations of KdV type.Comment: 40 pages. To appear in upcoming title in Lecture Notes in Physic

    Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices

    Get PDF
    Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, often passwords with all their well-known pitfalls remain the only practical mechanism. We present an assessment of the security requirements for the industrial setting, illustrating that offline attacks on passwords-based authentication protocols should be considered a significant threat. Correspondingly use of a Password Authenticated Key Exchange protocol becomes desirable. We review the signif-icant challenges faced for implementations on resource-constrained devices. We explore the design space and shown how we succeeded in tailoring a partic-ular variant of the Password Authenticated Connection Establishment (PACE) protocol, such that acceptable user interface responsiveness was reached even for the constrained setting of an ARM Cortex-M0+ based Bluetooth low-energy transceiver running from a power budget of 1.5 mW without notable energy buffers for covering power peak transients

    Hyper-precarious lives : Migrants, work and forced labour in the Global North

    Get PDF
    This paper unpacks the contested inter-connections between neoliberal work and welfare regimes, asylum and immigration controls, and the exploitation of migrant workers. The concept of precarity is explored as a way of understanding intensifying and insecure post-Fordist work in late capitalism. Migrants are centrally implicated in highly precarious work experiences at the bottom end of labour markets in Global North countries, including becoming trapped in forced labour. Building on existing research on the working experiences of migrants in the Global North, the main part of the article considers three questions. First, what is precarity and how does the concept relate to working lives? Second, how might we understand the causes of extreme forms of migrant labour exploitation in precarious lifeworlds? Third, how can we adequately theorize these particular experiences using the conceptual tools of forced labour, slavery, unfreedom and precarity? We use the concept of ‘hyper-precarity’ alongside notions of a ‘continuum of unfreedom’ as a way of furthering human geographical inquiry into the intersections between various terrains of social action and conceptual debate concerning migrants’ precarious working experiences

    FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks

    Get PDF
    This work deals with the energy-efficient, high-speed and high-security implementation of elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and elliptic curve digital signatures on embedded devices using FourQ and incorporating strong countermeasures to thwart a wide variety of side-channel attacks. First, we set new speed records for constant-time curve-based scalar multiplication, DH key exchange and digital signatures at the 128-bit security level with implementations targeting 8, 16 and 32-bit microcontrollers. For example, our software computes a static ECDH shared secret in 6.9 million cycles (or 0.86 seconds @8MHz) on a low-power 8-bit AVR microcontroller which, compared to the fastest Curve25519 and genus-2 Kummer implementations on the same platform, offers 2x and 1.4x speedups, respectively. Similarly, it computes the same operation in 496 thousand cycles on a 32-bit ARM Cortex-M4 microcontroller, achieving a factor-2.9 speedup when compared to the fastest Curve25519 implementation targeting the same platform. A similar speed performance is observed in the case of digital signatures. Second, we engineer a set of side-channel countermeasures taking advantage of FourQ\u27s rich arithmetic and propose a secure implementation that offers protection against a wide range of sophisticated side-channel attacks, including differential power analysis (DPA). Despite the use of strong countermeasures, the experimental results show that our FourQ software is still efficient enough to outperform implementations of Curve25519 that only protect against timing attacks. Finally, we perform a differential power analysis evaluation of our software running on an ARM Cortex-M4, and report that no leakage was detected with up to 10 million traces. These results demonstrate the potential of deploying FourQ on low-power applications such as protocols for the Internet of Things
    • 

    corecore