Company News

2001 ◽  
Vol 05 (14) ◽  
pp. 291-301

Cell Robotics' Medical Devices Well Received in China. US National Nutritional Foods Association and China's Sanjiu Pharmaceutical Establish Historic Partnership. Novacor LVAS Approved for Commercial Use in Japan. NOMOS and Lynmed to Jointly Distribute Medical Products in China and HK. Eli Lilly to Buy Out Ranbaxy's Stake. US-based Dragon Expands Business in Hong Kong and China. Australia's Global Doctor and US MedAire Announce Strategic Alliance. Taiwan's Gene Born Biotech Corp Adopts Thermogenesis's BioArchive System. Cepheid and BioSynTech Sign Distribution Agreement To Enter Life Sciences Research Market in Southeast Asia. Harbin Pharmaceutical Completes China's Largest Antibiotic Wastewater Recycling Project. Eli Lilly to Set Up State-of-the-Art Systems Biology R&D Center in Singapore. Varian Receives First Order for World's Most Powerful NMR Spectrometer from Japan.

2020 ◽  
Vol 73 (12) ◽  
pp. 2733-2736
Author(s):  
Pavlo S. Berzin ◽  
Ivan S. Demchenko ◽  
Anzhela B. Berzina

The aim: Medicrime Convention is a first international treaty against counterfeit medical products and similar crimes involving threats to public health. There are problems in criminalization of those acts that are listed in Art. 8 of the Medicrime Convention because the term of “similar crimes” is absent in the current criminal legislation of Ukraine. Materials and methods: The conducted study is based on the analysis of the provisions of the Medicrime Convention, the criminal legislation of Ukraine. The following methods: dialectical method; hermeneutic method; system-and-structural method; comparative-and-law method were used. Results: Comparison of the provisions of the Medicrime Convention allows to state that crimes in its Articles 5-8 that are different from those provided for in Art. 5-7 of this Convention and form independent types of actions, are at least “placing on the market” of medicinal products and medical devices provided in subparagraph “a” of paragraph 1 of Art. 8 and “commercial use of original documents” specified in subparagraph “b” of paragraph 1 of Art. 8. It's an assumption that Art. 5-8 of the Medicrime Convention provide for such independent types of crimes involving threats to public health as: 1) manufacturing of counterfeit medical products, active substances, excipients, parts, materials and accessories as well as medicinal products, medical devices, active substances and excipients; 2) the supplying, the offering to supply, the brokering, the trafficking, the keeping in stock, importing and exporting of counterfeit medical products, active substances, excipients, parts, materials and accessories; 3) the making of false documents or the act of tampering with documents; 4) placing on the market of medicinal products, medical devices; 5) the commercial use of false documents. Conclusions: The term of “similar crimes” in Art. 8 of the Medicrime Convention covers multi-ordinal intentional acts that constitute different types of independent crimes involving threats to public health, as well as special kinds of some of them. These types of crimes are not the same (identical).


Author(s):  
Rajnikant Kumar

NSDL was registered by the SEBI on June 7, 1996 as India’s first depository to facilitate trading and settlement of securities in the dematerialized form. NSDL has been set up to cater to the demanding needs of the Indian capital markets. NSDL commenced operations on November 08, 1996. NSDL has been promoted by a number of companies, the prominent of them being IDBI, UTI, NSE, SBI, HDFC Bank Ltd., etc. The initial paid up capital of NSDL was Rs. 105 crore which was reduced to Rs. 80 crore. During 2000-2001 through buy-back programme by buying back 2.5 crore shares @ 12 Rs./share. It was done to bring the size of its capital in better alignment with its financial operations and to provide same return to shareholders by gainfully deploying the excess cash available with NSDL. NSDL carries out its activities through service providers such as depository participants (DPs), issuing companies and their registrars and share transfer agents and clearing corporations/ clearing houses of stock exchanges. These entities are NSDL's business partners and are integrated in to the NSDL depository system to provide various services to investors and clearing members. The investor can get depository services through NSDL's depository participants. An investor needs to open a depository account with a depository participant to avail of depository facilities. Depository system essentially aims at eliminating the voluminous and cumbersome paper work involved in the scrip-based system and offers scope for ‘paperless’ trading through state-of-the-art technology. A depository can be compared to a bank. A depository holds securities of investors in the form of electronic accounts, in the same way as bank holds money in a saving account. Besides, holding securities, a depository also provides services related to transactions in securities.


2015 ◽  
Vol 3 (2) ◽  
pp. 1-7 ◽  
Author(s):  
Achin Jain ◽  
M P Venkatesh M P ◽  
Pramod T.M. Kumar

In Tanzania, Tanzania Food and Drugs Authority (TFDA), is a regulatory body responsible for controlling the quality,safety and effectiveness of food, drugs, herbal drugs, cosmetics and medical devices. The Authority has been ensuringsafety, efficacy and quality of medicines by quality control tests; in addition to other quality assessment mechanisms.The guidelines laid by TFDA have also emanated from commitment to democracy and gives strong emphasis to thefulfilment of the needs of the less privileged rural population.Tanzania is an emerging market; the pharmaceutical market is valued at over US$250 million, and is growing at anannual rate of around 16.5% and is expected to reach approximately US$550 billion in 2020. Currently, the market ishighly dependent on imports, which account for around 75% of the total pharmaceutical market.The procedures and approval requirements of new drugs, variations, import, export and disposal have been set up bythe TFDA, which help in maintaining quality of the drug products that are imported as well being produced locally 


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4666
Author(s):  
Zhiqiang Pan ◽  
Honghui Chen

Collaborative filtering (CF) aims to make recommendations for users by detecting user’s preference from the historical user–item interactions. Existing graph neural networks (GNN) based methods achieve satisfactory performance by exploiting the high-order connectivity between users and items, however they suffer from the poor training efficiency problem and easily introduce bias for information propagation. Moreover, the widely applied Bayesian personalized ranking (BPR) loss is insufficient to provide supervision signals for training due to the extremely sparse observed interactions. To deal with the above issues, we propose the Efficient Graph Collaborative Filtering (EGCF) method. Specifically, EGCF adopts merely one-layer graph convolution to model the collaborative signal for users and items from the first-order neighbors in the user–item interactions. Moreover, we introduce contrastive learning to enhance the representation learning of users and items by deriving the self-supervisions, which is jointly trained with the supervised learning. Extensive experiments are conducted on two benchmark datasets, i.e., Yelp2018 and Amazon-book, and the experimental results demonstrate that EGCF can achieve the state-of-the-art performance in terms of Recall and normalized discounted cumulative gain (NDCG), especially on ranking the target items at right positions. In addition, EGCF shows obvious advantages in the training efficiency compared with the competitive baselines, making it practicable for potential applications.


2021 ◽  
Vol 1 ◽  
pp. 3199-3208
Author(s):  
Emanuel Balzan ◽  
Pierre Vella ◽  
Philip Farrugia ◽  
Edward Abela ◽  
Glenn Cassar ◽  
...  

AbstractResearch funded projects are often concerned with the development of proof-of-concept products. Consequently, activities related to verification and validation testing (VVT) are often not considered in depth, even though various design iterations are carried out to refine an idea. Furthermore, the introduction of additive manufacturing (AM) has facilitated, in particular, the development of bespoke medical products. End bespoke products, which will be used by relevant stakeholders (e.g. patients and clinicians) are fabricated with the same manufacturing technologies used during prototyping. As a result, the detailed design stage of products fabricated by AM is much shorter. Therefore, to improve the market-readiness of bespoke medical devices, testing must be integrated within the development from an early stage, allowing better planning of resources. To address these issues, in this paper, a comprehensive VVT framework is proposed for research projects, which lack a VVT infrastructure. The framework builds up on previous studies and methods utilised in industry to enable project key experts to capture risks as early as the concept design stage.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Jingdian Ming ◽  
Yongbin Zhou ◽  
Huizhong Li ◽  
Qian Zhang

AbstractDue to its provable security and remarkable device-independence, masking has been widely accepted as a noteworthy algorithmic-level countermeasure against side-channel attacks. However, relatively high cost of masking severely limits its applicability. Considering the high tackling complexity of non-linear operations, most masked AES implementations focus on the security and cost reduction of masked S-boxes. In this paper, we focus on linear operations, which seems to be underestimated, on the contrary. Specifically, we discover some security flaws and redundant processes in popular first-order masked AES linear operations, and pinpoint the underlying root causes. Then we propose a provably secure and highly efficient masking scheme for AES linear operations. In order to show its practical implications, we replace the linear operations of state-of-the-art first-order AES masking schemes with our proposal, while keeping their original non-linear operations unchanged. We implement four newly combined masking schemes on an Intel Core i7-4790 CPU, and the results show they are roughly 20% faster than those original ones. Then we select one masked implementation named RSMv2 due to its popularity, and investigate its security and efficiency on an AVR ATMega163 processor and four different FPGA devices. The results show that no exploitable first-order side-channel leakages are detected. Moreover, compared with original masked AES implementations, our combined approach is nearly 25% faster on the AVR processor, and at least 70% more efficient on four FPGA devices.


2016 ◽  
Vol 23 (4) ◽  
pp. 319-330
Author(s):  
Jean-Louis Le Mouël ◽  
Vladimir G. Kossobokov ◽  
Frederic Perrier ◽  
Pierre Morat

Abstract. We report the results of heating experiments carried out in an abandoned limestone quarry close to Paris, in an isolated room of a volume of about 400 m3. A heat source made of a metallic resistor of power 100 W was installed on the floor of the room, at distance from the walls. High-quality temperature sensors, with a response time of 20 s, were fixed on a 2 m long bar. In a series of 24 h heating experiments the bar had been set up horizontally at different heights or vertically along the axis of the plume to record changes in temperature distribution with a sampling time varying from 20 to 120 s. When taken in averages over 24 h, the temperatures present the classical shape of steady-state plumes, as described by classical models. On the contrary, the temperature time series show a rich dynamic plume flow with intermittent trains of oscillations, spatially coherent, of large amplitude and a period around 400 s, separated by intervals of relative quiescence whose duration can reach several hours. To our knowledge, no specific theory is available to explain this behavior, which appears to be a chaotic interaction between a turbulent plume and a stratified environment. The observed behavior, with first-order factorization of a smooth spatial function with a global temporal intermittent function, could be a universal feature of some turbulent plumes in geophysical environments.


2017 ◽  
Vol 3 (2) ◽  
pp. 405-407
Author(s):  
Sebastian Buhl ◽  
Carina Werner ◽  
Clemens Bulitta

AbstractA current FDA guidance demands the validation of cleaning and disinfecting protocols even for non-sterile medical devices. The aim of this work is to clarify whether this is already possible using the guidance itself as well as the German DIN EN ISO 17664. An angiography system (Artis Zeego / Pheno - Siemens) was selected as a test object for the validation of a cleaning and disinfection protocol for medical devices in a hybrid operating room. In pilot study prior to the trial, critical points of the system were evaluated by means of questionnaires to clinical users (OTA, surgical technicians). An initial assessment of the in-house cleaning protocols used in the hospitals was done by using a fluorescence assay. The microbiological examination took place subsequently by contact plates and swabbing to determine the amount and type of germs on the surfaces of the system. These experiments were done at three different clinical sites. It was found that there was a significant germ count on several surfaces of the product even after in-house cleaning and disinfection (C&D). After application of an enhanced C&D plan, these germs could be greatly reduced at all verified sites. In addition, it could be shown that DIN EN ISO 17664 can in principle be applied to non-sterile medical products.


1973 ◽  
Vol 40 (2) ◽  
pp. 464-470
Author(s):  
M. Holt ◽  
T. M. Lee

An improved calculation of the supersonic panel flutter characteristics of a thin cylindrical shell of finite length is presented. The aerodynamic load is determined with account taken of first-order terms in vibration frequency, and when this is introduced into the elastic shell equation an integro differential equation results. An equivalent eigenvalue problem is set up by applying Galerkin’s method to this equation. The flutter boundary, for given Mach number and circumferential mode n, corresponds to the shell thickness ratio at which the real part of any one of the eigenvalues first becomes non-negative. It is found that the most severe flutter condition, for given Mach number, occurs for a circumferential mode n = 7. The present calculations exclude second-order frequency terms in the elastic part of the flutter equation, even though they may have a first-order effect. A subsequent calculation referred to here shows that these terms indeed have no significant influence on the first-order analysis.


2017 ◽  
Vol 147 (5) ◽  
pp. 1041-1089 ◽  
Author(s):  
Georgy Kitavtsev ◽  
Stephan Luckhaus ◽  
Angkana Rüland

In this paper we are interested in the microscopic modelling of a two-dimensional two-well problem that arises from the square-to-rectangular transformation in (two-dimensional) shape-memory materials. In this discrete set-up, we focus on the surface energy scaling regime and further analyse the Hamiltonian that was introduced by Kitavtsev et al. in 2015. It turns out that this class of Hamiltonians allows for a direct control of the discrete second-order gradients and for a one-sided comparison with a two-dimensional spin system. Using this and relying on the ideas of Conti and Schweizer, which were developed for a continuous analogue of the model under consideration, we derive a (first-order) continuum limit. This shows the emergence of surface energy in the form of a sharp-interface limiting model as well the explicit structure of the minimizers to the latter.


Sign in / Sign up

Export Citation Format

Share Document