1,397 research outputs found

    Aplikasi Klinik Renograf IR-03 Untuk Rumah Sakit: Teknologi Dan Analisis Biaya

    Full text link
    Teknik Renografi menggunakan Alat Renograf adalah salah satu modalitas pemeriksaan fungsi ginjal selain dengan pemeriksaanlaboratorium dan teknik Sinar-X. Prototip Renograf IR-03 untuk pemeriksaan fungsi ginjal hasil rancangbangun BATAN telah dikonstruksi dan menjalani uji laboratorium di PRPN-BATAN Serpong dan uji klinis di RSUP DR.Sardjito Jogyakarta. Biaya yang berkaitan dengan pemakaian klinik Alat Renograf di rumahsakit telah dianalisis yang terdiri dari komponen nilai radiofarmaka dan nilai investasi alatRenograf. Perhitungan biaya radiofarmaka hippuran Iodine per tahun dengan estimasi jumlah pasien 2000 orang sebesar Rp 30 juta, Total Direct Cost adalah Rp 212,5 juta dan biaya modal satu Alat Renograf sebesar Rp 250 juta. Nilai Titik Impas (Break Event Point) Investasi satu Alat Renograf adalah 1194 (0,597%) atau setara Rp 209,475 juta, dengan biaya per prosedur adalah Rp 85.000,-. Harga ini tergantung pada beberapa variable terutama volume (kapasitas pelayanan pasien). Perhitungan analisis Cash-Flow untuk melihat seberapa jauh investasi tersebut menarik dan memberi prospek ke masa depan menunjukkan nilai Rate of Return yang diperoleh yaitu ROR (i) adalah 22,6%, jauh diatas suku bunga simpanan Bank saat ini yaitu <10%. Perhitungan analisa Payback Period menunjukkan nilai 1,818 tahun, sangat prospektif secara ekonomi

    Connections of the Mesencephalic Locomotor Region (MLR) in the Cat

    Get PDF
    The cat entopeduncular nucleus (EN), which is the main output of the basal ganglia, is known to project to the mesencephalic tegmentum. We have been able to elicit antidromic responses in single EN neurons from the region of the mesencephalic locomotor region (MLR), then transect (precollicular-postmamillary) the brainstem and elicit rhythmic movements of the limbs by stimulation of the same site in the same animal. Injections of the fluorescent dye 2,4 diamidino phenylindole 2 HCL (DAPI) into this area induces retrograde labeling of cell bodies in EN and motor cortex. Injections of a tritiated amino acid (leucine) into the motor cortex induce terminal labeling in the area of the MLR. These studies describe convergent projections from EN and motor cortex to the MLR. These connections may be involved in the sequencing and ordering of voluntary movements in which locomotion is necessary

    Towards Applying Cryptographic Security Models to Real-World Systems

    Get PDF
    The cryptographic methodology of formal security analysis usually works in three steps: choosing a security model, describing a system and its intended security properties, and creating a formal proof of security. For basic cryptographic primitives and simple protocols this is a well understood process and is performed regularly. For more complex systems, as they are in use in real-world settings it is rarely applied, however. In practice, this often leads to missing or incomplete descriptions of the security properties and requirements of such systems, which in turn can lead to insecure implementations and consequent security breaches. One of the main reasons for the lack of application of formal models in practice is that they are particularly difficult to use and to adapt to new use cases. With this work, we therefore aim to investigate how cryptographic security models can be used to argue about the security of real-world systems. To this end, we perform case studies of three important types of real-world systems: data outsourcing, computer networks and electronic payment. First, we give a unified framework to express and analyze the security of data outsourcing schemes. Within this framework, we define three privacy objectives: \emph{data privacy}, \emph{query privacy}, and \emph{result privacy}. We show that data privacy and query privacy are independent concepts, while result privacy is consequential to them. We then extend our framework to allow the modeling of \emph{integrity} for the specific use case of file systems. To validate our model, we show that existing security notions can be expressed within our framework and we prove the security of CryFS---a cryptographic cloud file system. Second, we introduce a model, based on the Universal Composability (UC) framework, in which computer networks and their security properties can be described We extend it to incorporate time, which cannot be expressed in the basic UC framework, and give formal tools to facilitate its application. For validation, we use this model to argue about the security of architectures of multiple firewalls in the presence of an active adversary. We show that a parallel composition of firewalls exhibits strictly better security properties than other variants. Finally, we introduce a formal model for the security of electronic payment protocols within the UC framework. Using this model, we prove a set of necessary requirements for secure electronic payment. Based on these findings, we discuss the security of current payment protocols and find that most are insecure. We then give a simple payment protocol inspired by chipTAN and photoTAN and prove its security within our model. We conclude that cryptographic security models can indeed be used to describe the security of real-world systems. They are, however, difficult to apply and always need to be adapted to the specific use case

    What\u27s Group Got To Do With It?: Debate, Group Discussion, and Voting Behavior: The 2004 Presidential Race

    Get PDF
    A primary goal of this study was to confirm the effect that presidential debate have on viewers as well as to discover how group discussion has the potential to affect voters after viewing the debate. Debates do have the ability to influence voter\u27s intent to vote as well as their acquisition of knowledge. The study also revealed that group discussion following the debates has an impact on viewers. Through the use of quantitative methods surveys were distributed to Debate Watch 2004 participants inquiring about their voting behavior. An analysis of the responses yielded positive results as to the effects that debates have on viewers. One-way analysis of variance as well as chi-square showed significant relationships between each variable tested

    Three-Dimensional Photonic Metamaterials by Direct Laser Writing and Advanced Metallization Techniques

    Get PDF
    We have utilized a novel fabrication concept, i.e., direct laser writing in combination with chemical vapor deposition of silver, to realize three-dimensional metamaterials for optical frequencies. Some of the fabricated structures give rise to bianisotropy resulting in a cross-coupling of the electric and magnetic fields of an incident light wave. We have also presented two unit cell designs which show a negative refractive index at infrared frequencies

    The New West Virginia Antitrust Act from the Defense Perspective

    Get PDF
    Sharply heightened attention is currently being paid to antitrust enforcement at the state level. In 1976, Congress appropriated approximately $30,000,000 in federal funds to the states for the maintenance of antitrust actions and other programs. A fertile field is being made available for the expenditure of these funds by the focus of the federal antitrust enforcement agencies on the larger structural cases with a corresponding decline in enforcement actions against routine practices. In this climate, the opportunities for state actions are extremely favorable, especially in light of the generally high political marks to be achieved by state Attorneys General, who are typically elected officials, in the commencement of antitrust suits. As stated by Stephen J. Greenvogel, Massachusetts\u27 antitrust division chief, It looks good for an AG to say he\u27s suing this company or that company on antitrust grounds. Not every state, however, has a fully developed antitrust statute to provide the framework for the intensified state enforcement program. Legislatures are acting to fill the void. The most ambitious and comprehensive action in this regard was the adoption by West Virginia of an all-inclusive antitrust act in 1978. At first blush from the defendant\u27s standpoint, it is difficult to view the new West Virginia Antitrust Act with overwhelming enthusiasm. The Act basically follows the outlines of federal law while resolving most open questions in favor of the government or private plaintiff. Nevertheless, in part because of the parallel to federal law, and the incorporation of federal decisional law under section 16 of the new Act, there are numerous opportunities for all parties to take some comfort from the provisions of the statute. Several objectives manifest themselves in the new Antitrust Act. First, there appears to be an attempt not merely to track the substantive provisions of the Sherman Act but also to clarify its specific applications. Second, the West Virginia Antitrust Act seeks to provide the Antitrust Division with strong investigatory and enforcement powers, also patterned after, but diverging from, federal provisions. Finally, the Act is far more plaintiff-oriented than federal law in its provision for parens patriae actions by the Attorney General on behalf of citizens or residents of the state. Substantial unresolved questions lurk beneath each of these statutory objectives, however, and the courts will undoubtedly be required to make major decisions in the near future which will give shape to the new Act and possibly stimulate further legislative modifications. An examination of the provisions of this Act is instructive not only for its application to practices in or affecting West Virginia but also for the pattern it may set for the legislative actions of other states. This analysis, while attempting to provide a general overview, is designed to anticipate and discuss some questions which might occur to defense counsel in attempting to deal with the new statute

    Negative-index bi-anisotropic photonic metamaterial fabricated by direct laser writing and silver shadow evaporation

    Full text link
    We present the blueprint for a novel negative-index metamaterial. This structure is fabricated via three-dimensional two-photon direct laser writing and silver shadow evaporation. The comparison of measured linear optical spectra with theory shows good agreement and reveals a negative real part of the refractive index at around 3.85 micrometer wavelength - despite the fact that the metamaterial structure is bi-anisotropic due to the lack of inversion symmetry along its surface normal.Comment: 8 pages, 3 figure
    • …
    corecore