560 research outputs found
Ureteroscopic treatment of larger renal calculi (\u3e2 cm).
OBJECTIVES: To evaluate the current status of ureteroscopic lithotripsy (UL) for treating renal calculi of \u3e2 cm, as advances in flexible ureteroscope design, accessory instrumentation and lithotrites have revolutionised the treatment of urinary calculi. While previously reserved for ureteric and small renal calculi, UL has gained an increasing role in the selective management of larger renal stone burdens.
METHODS: We searched the available databases, including PubMed, Google Scholar, and Scopus, for relevant reports in English, and the article bibliographies to identify additional relevant articles. Keywords included ureteroscopy, lithotripsy, renal calculi, and calculi \u3e2 cm. Retrieved articles were reviewed to consider the number of patients, mean stone size, success rates, indications and complications.
RESULTS: In all, nine studies (417 patients) were eligible for inclusion. After one, two or three procedures the mean (range) success rates were 68.2 (23-84)%, 87.1 (79-91)% and 94.4 (90.1-96.7)%, respectively. Overall, the success rate was \u3e90% with a mean of 1.2-2.3 procedures per patient. The overall complication rate was 10.3%, including six (1.4%) intraoperative and 37 (8.9%) postoperative complications, most of which were minor. The most common indications for UL were a failed previous treatment (46%), comorbidities (18.2%), and technical and anatomical factors (12.3%).
CONCLUSIONS: UL is safe and effective for treating large renal calculi. While several procedures might be required for total stone clearance, UL should be considered a standard approach in the urologist\u27s options treating renal calculi of \u3e2 cm
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage
On the generalization of quantum state comparison
We investigate the unambiguous comparison of quantum states in a scenario
that is more general than the one that was originally suggested by Barnett et
al. First, we find the optimal solution for the comparison of two states taken
from a set of two pure states with arbitrary a priori probabilities. We show
that the optimal coherent measurement is always superior to the optimal
incoherent measurement. Second, we develop a strategy for the comparison of two
states from a set of N pure states, and find an optimal solution for some
parameter range when N=3. In both cases we use the reduction method for the
corresponding problem of mixed state discrimination, as introduced by Raynal et
al., which reduces the problem to the discrimination of two pure states only
for N=2. Finally, we provide a necessary and sufficient condition for
unambiguous comparison of mixed states to be possible.Comment: 8 pages, 4 figures, Proposition 1 corrected, appendix adde
Purifying and Reversible Physical Processes
Starting from the observation that reversible processes cannot increase the
purity of any input state, we study deterministic physical processes, which map
a set of states to a set of pure states. Such a process must map any state to
the same pure output, if purity is demanded for the input set of all states.
But otherwise, when the input set is restricted, it is possible to find
non-trivial purifying processes. For the most restricted case of only two input
states, we completely characterize the output of any such map. We furthermore
consider maps, which combine the property of purity and reversibility on a set
of states, and we derive necessary and sufficient conditions on sets, which
permit such processes.Comment: 5 pages, no figures, v2: only minimal change
Commutator Relations Reveal Solvable Structures in Unambiguous State Discrimination
We present a criterion, based on three commutator relations, that allows to
decide whether two self-adjoint matrices with non-overlapping support are
simultaneously unitarily similar to quasidiagonal matrices, i.e., whether they
can be simultaneously brought into a diagonal structure with 2x2-dimensional
blocks. Application of this criterion to unambiguous state discrimination
provides a systematic test whether the given problem is reducible to a solvable
structure. As an example, we discuss unambiguous state comparison.Comment: 5 pages, discussion of related work adde
On the Dirac Structure of the Nucleon Selfenergy in Nuclear Matter
The relativistic structure of the self-energy of a nucleon in nuclear matter
is investigated including the imaginary and real components which arise from
the terms of first and second order in the NN interaction. A parameterized form
of Brueckner matrix is used for the NN interaction. The effects of the
terms beyond the DBHF approximation on quasiparticle energies and the optical
potential for nucleon-nucleus scattering are discussed.Comment: 18 pages, Latex including 10 figures using psfi
Physical Purification of Quantum States
We introduce the concept of a physical process that purifies a mixed quantum
state, taken from a set of states, and investigate the conditions under which
such a purification map exists. Here, a purification of a mixed quantum state
is a pure state in a higher-dimensional Hilbert space, the reduced density
matrix of which is identical to the original state. We characterize all sets of
mixed quantum states, for which perfect purification is possible. Surprisingly,
some sets of two non-commuting states are among them. Furthermore, we
investigate the possibility of performing an imperfect purification.Comment: 5 pages, 1 figure; published versio
Finite key analysis for symmetric attacks in quantum key distribution
We introduce a constructive method to calculate the achievable secret key
rate for a generic class of quantum key distribution protocols, when only a
finite number n of signals is given. Our approach is applicable to all
scenarios in which the quantum state shared by Alice and Bob is known. In
particular, we consider the six state protocol with symmetric eavesdropping
attacks, and show that for a small number of signals, i.e. below the order of
10^4, the finite key rate differs significantly from the asymptotic value for n
approaching infinity. However, for larger n, a good approximation of the
asymptotic value is found. We also study secret key rates for protocols using
higher-dimensional quantum systems.Comment: 9 pages, 5 figure
The Axial Charge Renormalization in a Relativistic Description of Finite Nuclei
Starting from a realistic One-Boson-Exchange model of the nucleon nucleon interaction the relativistic mean field for nucleons is determined within the Dirac Brueckner Hartree Fock approach for finite nuclei. The matrix elements of the axial charge operator evaluated for the solutions of the Dirac equation with this selfenergy are investigated. These matrix elements are enhanced with respect to the equivalent non relativistic ones obtained from the solutions of the Schr\'odinger equation with the non relativistic equivalent potential. The present results confirm at a qualitative level the results for the axial charge renormalization obtained with perturbative approaches. However, the results obtained differ in size from those of the perturbative approach and are nucleus and state dependent
- …
