Journal of Materials Science: Materials in Electronics - The main weakness of polymer gas sensors is its stability. Here, we report stability enhancement of a 100 nm polypyrrole (PPy) thin... 相似文献
We cross-sectionally examined the relationship between age, optic disc area, refraction, and gender and optic disc topography and retinal nerve fiber layer (RNFL) measurements, using optical imaging techniques. One eye from each of 155 Caucasian subjects (age range 23.0-80.8 y) without ocular pathology was included. Measurements were obtained by using the Heidelberg Retina Tomography (HRT), the GDx Nerve Fiber Analyzer, and the Optical Coherence Tomograph (OCT). The effects of age were small (R2 < 17%) and were limited to specific HRT, GDx, and OCT parameters. Disc area was significantly associated with most HRT parameters and isolated GDx and OCT parameters. Refraction and gender were not significantly associated with any optic disc or RNFL parameters. Although effects of age on the optic disc and RNFL are small, they should be considered in monitoring ocular disease. Optic disc area should be considered when cross-sectionally evaluating disc topography and, to a lesser extent, RNFL thickness. 相似文献
BACKGROUND: Recipient antidonor cytotoxic T-cell activity has been associated with graft loss and acute rejection in renal allograft recipients. The role of immunologic mechanisms in the development of chronic graft rejection is controversial. We analyzed all living related renal transplants performed at Children's Hospital (Boston, MA) from 1983 to 1995 to assess whether cell-mediated cytotoxicity, determined in vitro and measured before transplantation, was predictive of chronic rejection. METHODS: Eighty-three patients were studied retrospectively. Fifty-seven patients with one haplotype-matched renal transplants from living related donors were studied to determine the association between cell-mediated lympholysis (CML) level, acute rejection, chronic rejection, and graft failure. Acute rejection was defined by the decision to treat. Chronic rejection was defined by histology and/or the absolute serum creatinine value using an increasing serum creatinine level >1.0 mg/dl for children less than 3, a creatinine level >1.5 mg/dl for children between 3 and 10 years of age, and a creatinine level >2.0 mg/dl for children above 10 years of age. Return to dialysis or retransplantation was considered graft failure. RESULTS: Of the 57 haploidentical patients, there were 33 males and 24 females. The mean age at transplant was 11.1 years (SD=6.7). Twelve patients developed chronic rejection, 24 patients developed acute rejection, and 7 patients had graft failure. Pretransplant cytotoxic T lymphocyte activity was associated with chronic rejection (P=0.001) and graft failure (P=0.013) but only marginally with acute rejection (P=0.058). Controlling for age and sex, Cox's proportional hazards model revealed that CML level was predictive of time to chronic rejection (P<0.01) but not acute rejection (P=0.11). It was estimated that every 1-unit increase in CML level raises the monthly risk of chronic rejection by 7%. Ten children received HLA-identical kidneys from their siblings. There were no episodes of chronic rejection after 5 years. Two patients with high CML levels had episodes of acute rejection; both patients responded to treatment. CONCLUSION: Our data demonstrate an association between pretransplant cell-mediated cytotoxicity and the occurrence of chronic rejection in living related one-haploidentical renal transplants in pediatric patients. 相似文献
Twenty-two cases of ameloblastoma and ten cases of adenomatoid odontogenic tumour (AOT) were analyzed comparatively by the AgNOR technique. Ameloblastomas were distributed into three groups according to their clinical behaviour: primary lesions without recurrences (PLWTR), 5 cases; primary lesions with recurrences (PLWR), 4 cases; and recurrences, 13 cases. The cases were also regrouped according to their histological pattern: follicular (9 cases), plexiform (7 cases), acanthomatous (4 cases) and unicystic (2 cases). Considering histological patterns, there was a significant statistical difference only between follicular and plexiform types. There were no significant differences between the group of ameloblastomas and the group of AOTs or between the three groups of ameloblastomas with different clinical behaviour. Our results strongly suggest that the distinct clinical behaviour of ameloblastomas and AOT is not correlated with their cellular proliferation ratio. Thus, the infiltrative ability of the ameloblastomas is probably not related to the cellular proliferation index of these tumours. 相似文献
Analyzing videos and images captured by unmanned aerial vehicles or aerial drones is an emerging application attracting significant attention from researchers in various areas of computer vision. Currently, the major challenge is the development of autonomous operations to complete missions and replace human operators. In this paper, based on the type of analyzing videos and images captured by drones in computer vision, we have reviewed these applications by categorizing them into three groups. The first group is related to remote sensing with challenges such as camera calibration, image matching, and aerial triangulation. The second group is related to drone-autonomous navigation, in which computer vision methods are designed to explore challenges such as flight control, visual localization and mapping, and target tracking and obstacle detection. The third group is dedicated to using images and videos captured by drones in various applications, such as surveillance, agriculture and forestry, animal detection, disaster detection, and face recognition. Since most of the computer vision methods related to the three categories have been designed for real-world conditions, providing real conditions based on drones is impossible. We aim to explore papers that provide a database for these purposes. In the first two groups, some survey papers presented are current. However, the surveys have not been aimed at exploring any databases. This paper presents a complete review of databases in the first two groups and works that used the databases to apply their methods. Vision-based intelligent applications and their databases are explored in the third group, and we discuss open problems and avenues for future research.
In Classical Bayesian approach, estimation of lifetime data usually is dealing with precise information. However, in real
world, some informations about an underlying system might be imprecise and represented in the form of vague quantities. In
these situations, we need to generalize classical methods to vague environment for studying and analyzing the systems of interest.
In this paper, we propose the Bayesian estimation of failure rate and mean time to failure based on vague set theory in the
case of complete and censored data sets. To employ the Bayesian approach, model parameters are assumed to be vague random
variables with vague prior distributions. This approach will be used to induce the vague Bayes estimate of failure rate and
mean time to failure by introducing and applying a theorem called “Resolution Identity” for vague sets. In order to evaluate
the membership degrees of vague Bayesian estimate for these quantities, a computational procedure is investigated. In the
proposed method, the original problem is transformed into a nonlinear programming problem which is then divided into eight
subproblems to simplifying computations. 相似文献
Wave absorbers are considered to be fundamental building blocks for the manipulation of light. Almost all optical systems exploit absorbers to realize some functions. A highly tunable wide-band THz absorber is presented herein. Utilizing a dual-bias scheme with a single graphene layer leads to greater freedom to control the absorption response, while a conventional periodic array of graphene ribbons and a layer of graphene sheet are also exploited. Also, a circuit model representation for all the constituent parts of the proposed absorber is developed with an evolved design methodology. According to the simulation results, wide-band absorption from 3.5 to 6 THz is achieved.
A robust Fault Diagnosis (FD) scheme for a real quadrotor Unmanned Aerial Vehicle (UAV) is proposed in this paper. Firstly, a novel Adaptive Thau observer (ATO) is developed to estimate the quadrotor system states and build a set of offset residuals to indicate actuators’ faults. Based on these residuals, some rules of Fault Diagnosis (FD) are designed to detect and isolate the faults as well as estimate the fault offset parameters. Secondly, a synthetic robust optimization scheme is presented to improve Fault Estimation (FE) accuracies, three key issues include modeling uncertainties, and magnitude order unbalances as well as noises are addressed. Finally, a typical fault of rotors is simulated and injected into one of four rotors of the quadrotor, and experiments for the FD scheme have been carried out. Unlike former research works on the FD schemes for quadrotors, our proposed FD scheme based on the ATO can not only detect and isolate the failed actuators, but also estimate the fault severities. Regardless of roughness of the real flying data, the FD results still have sufficient FE accuracies. 相似文献
An incubator is an organization that supports new ventures to grow and survive during the early stages. Mainly dedicated to information technology, life science may appear to be the next hot spot for incubators. Are there stabilized good practices? Are the business models in information technology and in life science comparable when it goes to start-ups' incubation? Leveraging our experience as practitioner in this field and using an inductive methodology, this paper tends to propose simple principles to help build robust incubators in life science, and to contribute to disseminate an entrepreneurial approach through an industry still dominated by blue chips. 相似文献
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan. 相似文献