560 research outputs found

    Ureteroscopic treatment of larger renal calculi (\u3e2 cm).

    Get PDF
    OBJECTIVES: To evaluate the current status of ureteroscopic lithotripsy (UL) for treating renal calculi of \u3e2 cm, as advances in flexible ureteroscope design, accessory instrumentation and lithotrites have revolutionised the treatment of urinary calculi. While previously reserved for ureteric and small renal calculi, UL has gained an increasing role in the selective management of larger renal stone burdens. METHODS: We searched the available databases, including PubMed, Google Scholar, and Scopus, for relevant reports in English, and the article bibliographies to identify additional relevant articles. Keywords included ureteroscopy, lithotripsy, renal calculi, and calculi \u3e2 cm. Retrieved articles were reviewed to consider the number of patients, mean stone size, success rates, indications and complications. RESULTS: In all, nine studies (417 patients) were eligible for inclusion. After one, two or three procedures the mean (range) success rates were 68.2 (23-84)%, 87.1 (79-91)% and 94.4 (90.1-96.7)%, respectively. Overall, the success rate was \u3e90% with a mean of 1.2-2.3 procedures per patient. The overall complication rate was 10.3%, including six (1.4%) intraoperative and 37 (8.9%) postoperative complications, most of which were minor. The most common indications for UL were a failed previous treatment (46%), comorbidities (18.2%), and technical and anatomical factors (12.3%). CONCLUSIONS: UL is safe and effective for treating large renal calculi. While several procedures might be required for total stone clearance, UL should be considered a standard approach in the urologist\u27s options treating renal calculi of \u3e2 cm

    Stealthy Deception Attacks Against SCADA Systems

    Full text link
    SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above mentioned anomaly detection. After hijacking the communication channels between the Human Machine Interface (HMI) and Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a fake view of the industrial process, deceiving the human operator into taking manual actions. Our most advanced attack also manipulates the messages generated by the operator's actions, reversing their semantic meaning while causing the HMI to present a view that is consistent with the attempted human actions. The attacks are totaly stealthy because the message sizes and timing, the command sequences, and the data values of the ICS's state all remain legitimate. We implemented and tested several attack scenarios in the test lab of our local electric company, against a real HMI and real PLCs, separated by a commercial-grade firewall. We developed a real-time security assessment tool, that can simultaneously manipulate the communication to multiple PLCs and cause the HMI to display a coherent system--wide fake view. Our tool is configured with message-manipulating rules written in an ICS Attack Markup Language (IAML) we designed, which may be of independent interest. Our semantic attacks all successfully fooled the operator and brought the system to states of blackout and possible equipment damage

    On the generalization of quantum state comparison

    Full text link
    We investigate the unambiguous comparison of quantum states in a scenario that is more general than the one that was originally suggested by Barnett et al. First, we find the optimal solution for the comparison of two states taken from a set of two pure states with arbitrary a priori probabilities. We show that the optimal coherent measurement is always superior to the optimal incoherent measurement. Second, we develop a strategy for the comparison of two states from a set of N pure states, and find an optimal solution for some parameter range when N=3. In both cases we use the reduction method for the corresponding problem of mixed state discrimination, as introduced by Raynal et al., which reduces the problem to the discrimination of two pure states only for N=2. Finally, we provide a necessary and sufficient condition for unambiguous comparison of mixed states to be possible.Comment: 8 pages, 4 figures, Proposition 1 corrected, appendix adde

    Purifying and Reversible Physical Processes

    Get PDF
    Starting from the observation that reversible processes cannot increase the purity of any input state, we study deterministic physical processes, which map a set of states to a set of pure states. Such a process must map any state to the same pure output, if purity is demanded for the input set of all states. But otherwise, when the input set is restricted, it is possible to find non-trivial purifying processes. For the most restricted case of only two input states, we completely characterize the output of any such map. We furthermore consider maps, which combine the property of purity and reversibility on a set of states, and we derive necessary and sufficient conditions on sets, which permit such processes.Comment: 5 pages, no figures, v2: only minimal change

    Commutator Relations Reveal Solvable Structures in Unambiguous State Discrimination

    Full text link
    We present a criterion, based on three commutator relations, that allows to decide whether two self-adjoint matrices with non-overlapping support are simultaneously unitarily similar to quasidiagonal matrices, i.e., whether they can be simultaneously brought into a diagonal structure with 2x2-dimensional blocks. Application of this criterion to unambiguous state discrimination provides a systematic test whether the given problem is reducible to a solvable structure. As an example, we discuss unambiguous state comparison.Comment: 5 pages, discussion of related work adde

    On the Dirac Structure of the Nucleon Selfenergy in Nuclear Matter

    Full text link
    The relativistic structure of the self-energy of a nucleon in nuclear matter is investigated including the imaginary and real components which arise from the terms of first and second order in the NN interaction. A parameterized form of Brueckner GG matrix is used for the NN interaction. The effects of the terms beyond the DBHF approximation on quasiparticle energies and the optical potential for nucleon-nucleus scattering are discussed.Comment: 18 pages, Latex including 10 figures using psfi

    Physical Purification of Quantum States

    Full text link
    We introduce the concept of a physical process that purifies a mixed quantum state, taken from a set of states, and investigate the conditions under which such a purification map exists. Here, a purification of a mixed quantum state is a pure state in a higher-dimensional Hilbert space, the reduced density matrix of which is identical to the original state. We characterize all sets of mixed quantum states, for which perfect purification is possible. Surprisingly, some sets of two non-commuting states are among them. Furthermore, we investigate the possibility of performing an imperfect purification.Comment: 5 pages, 1 figure; published versio

    Finite key analysis for symmetric attacks in quantum key distribution

    Get PDF
    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e. below the order of 10^4, the finite key rate differs significantly from the asymptotic value for n approaching infinity. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.Comment: 9 pages, 5 figure

    The Axial Charge Renormalization in a Relativistic Description of Finite Nuclei

    Get PDF
    Starting from a realistic One-Boson-Exchange model of the nucleon nucleon interaction the relativistic mean field for nucleons is determined within the Dirac Brueckner Hartree Fock approach for finite nuclei. The matrix elements of the axial charge operator evaluated for the solutions of the Dirac equation with this selfenergy are investigated. These matrix elements are enhanced with respect to the equivalent non relativistic ones obtained from the solutions of the Schr\'odinger equation with the non relativistic equivalent potential. The present results confirm at a qualitative level the results for the axial charge renormalization obtained with perturbative approaches. However, the results obtained differ in size from those of the perturbative approach and are nucleus and state dependent
    corecore