7 resultados para end to side anastomosis

em University of Queensland eSpace - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We demonstrate an end-to-end computational model of the HEG shock tunnel as a way to extract more precise test flow conditions and as a way of getting predictions of new operating conditions. For a selection of established operating conditions, the L1d program was used to simulate the one-dimensional gas-dynamic processes within the whole of the facility. The program reproduces the compression tube performance reliably and, with the inclusion of a loss factor near the upstream-end of the compression tube, it provides a good estimate of the equilibrium pressure in the shock-reflection region over the set of six standard operating conditions for HEG.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: The purpose of this study was to grow artificial blood vessels for autologous transplantation as arterial interposition grafts in a large animal model (dog). Method and results: Tubing up to 250 mm long, either bare or wrapped in biodegradable polyglycolic acid (Dexon) or nonbiodegradable polypropylene (Prolene) mesh, was inserted in the peritoneal or pleural cavity of dogs, using minimally invasive techniques, and tethered at one end to the wall with a loose suture. After 3 weeks the tubes and their tissue capsules were harvested, and the inert tubing was discarded. The wall of living tissue was uniformly 1-1.5 mm thick throughout its length, and consisted of multiple layers of myofibroblasts and matrix overlaid with a single layer of mesothelium. The myofibroblasts stained for a-smooth muscle actin, vimentin, and desmin. The bursting strength of tissue tubes with no biodegradable mesh scaffolds was in excess of 2500 mm Hg, and the suture holding strength was 11.5 N, both similar to that in dog carotid and femoral arteries. Eleven tissue tubes were transplanted as interposition grafts into the femoral artery of the same dog in which they were grown, and were harvested after 3 to 6.5 months. Eight remained patent during this time. At harvest, their lumens were lined with endothelium-like cells, and wall cells stained for alpha-actin, smooth muscle myosin, desmin and smoothelin; there was also a thick adventitia containing vasa vasorum. Conclusion: Peritoneal and pleural cavities of large animals can function as bioreactors to grow myofibroblast tubes for use as autologous vascular grafts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Signals transmit information to receivers about sender attributes, increase the fitness of both parties, and are selected for in cooperative interactions between species to reduce conflict [1, 2]. Marine cleaning interactions are known for stereotyped behaviors [3-6] that likely serve as signals. For example, dancing and tactile dancing in cleaner fish may serve to advertise cleaning services to client fish [7] and manipulate client behavior [8], respectively. Cleaner shrimp clean fish [9], yet are cryptic in comparison to cleaner fish. Signals, therefore, are likely essential for cleaner shrimp to attract clients. Here, we show that the yellow-beaked cleaner shrimp [110] Urocaridella sp. c [11] uses a stereotypical side-to-side movement, or rocking dance, while approaching potential client fish in the water column. This dance was followed by a cleaning interaction with the client 100% of the time. Hungry cleaner shrimp, which are more willing to clean than satiated ones [12], spent more time rocking and in closer proximity to clients Cephaiopholis cyanostigma than satiated ones, and when given a choice, clients preferred hungry, rocking shrimp. The rocking dance therefore influenced client behavior and, thus, appears to function as a signal to advertise the presence of cleaner shrimp to potential clients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams. Our no-switching protocol achieves high secret key rate via a post-selection protocol that utilizes both quadrature information simultaneously. We establish a secret key rate of 25 Mbits/s for a lossless channel and 1 kbit/s for 90% channel loss, per 17 MHz of detected bandwidth, assuming individual Gaussian eavesdropping attacks. Since our scheme is truly broadband, it can potentially deliver orders of magnitude higher key rates by extending the encoding bandwidth with higher-end telecommunication technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New copper(II) complexes of general empirical formula, Cu(mpsme)X center dot xCH(3)COCH(3) (mpsme = anionic form of the 6-methyl-2-formylpyridine Schiff base of S-methyldithiocarbazate; X = Cl, N-3, NCS, NO3; x = 0, 0.5) have been synthesized and characterized by IR, electronic, EPR and susceptibility measurements. Room temperature mu(eff) values for the complexes are in the range 1.75-2.1 mu(beta) typical of uncoupled or weakly coupled Cu(II) centres. The EPR spectra of the [Cu(mpsme)X] (X = Cl, N-3, NO3, NCS) complexes reveal a tetragonally distorted coordination sphere around the mononuclear Cu(II) centre. We have exploited second derivative EPR spectra in conjunction with Fourier filtering (sine bell and Hamming functions) to extract all of the nitrogen hyperfine coupling matrices. While the X-ray crystallography of [Cu(mpsme)NCS] reveals a linear polymer in which the thiocyanate anion bridges the two copper(II) ions, the EPR spectra in solution are typical of a magnetically isolated monomeric Cu(II) centres indicating dissociation of the polymeric chain in solution. The structures of the free ligand, Hmpsme and the {[Cu(mpsme)NO3] center dot 0.5CH(3)COCH(3)}(2) and [Cu(mpsme)NCS](n) complexes have been determined by X-ray diffraction. The {[Cu(mpsme)NO3]0.5CH(3)COCH(3)}(2) complex is a centrosymmetric dimer in which each copper atom adopts a five-coordinate distorted square-pyramidal geometry with an N2OS2 coordination environment, the Schiff base coordinating as a uninegatively charged tridentate ligand chelating through the pyridine and azomethine nitrogen atoms and the thiolate, an oxygen atom of a unidentate nitrato ligand and a bridging sulfur atom from the second ligand completing the coordination sphere. The [Cu(mpsme)(NCS)](n) complex has a novel staircase-like one dimensional polymeric structure in which the NCS- ligands bridge two adjacent copper(II) ions asymmetrically in an end-to-end fashion providing its nitrogen atom to one copper and the sulfur atom to the other. (c) 2005 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Behaviour Trees is a novel approach for requirements engineering. It advocates a graphical tree notation that is easy to use and to understand. Individual requirements axe modelled as single trees which later on are integrated into a model of the system as a whole. We develop a formal semantics for a subset of Behaviour Trees using CSP. This work, on one hand, provides tool support for Behaviour Trees. On the other hand, it builds a front-end to a subset of the CSP notation and gives CSP users a new modelling strategy which is well suited to the challenges of requirements engineering.