Abstract: Some of strands of a stent are disposed using a strand made of a platinum alloy material. In the stent (10) formed by helicoidally braiding a plurality of strands, some even-numbered strands among the plurality of strands are disposed using a platinum alloy material.
Abstract: A tip end portion of a strand forming a stent is rounded off. In a stent 10 formed by helicoidally braiding a plurality of strands 20, the tip end portion of each of the strands 20 is rounded off.
Abstract: A strand made of a platinum alloy material is prevented from protruding from both ends of a stent when some strands of the stent are disposed using the strand made of the platinum alloy material. In a stent (10) which is formed by helicoidally braiding a plurality of strands, some strands among the plurality of strands are disposed using a strand made of a platinum alloy material, and a length of the strand made of the platinum alloy material is made shorter than lengths of other strands by a length of the strand made of the platinum alloy material which is estimated to protrude from the stent.
Abstract: A control device defines, for three-dimensional blood vessel data of a blood vessel corresponding to a branched center line, a cylindrical coordinate system, thereby converting this into blood vessel data in an orthogonal coordinate system. The control device uses a coordinate value of the coordinate axis in a radial direction at a first coordinate value of the coordinate axis in a center line direction and a coordinate value of the coordinate axis in the radial direction at a second coordinate value of the coordinate axis in the center line direction, thereby interpolating a coordinate value of the coordinate axis in the radial direction between the first coordinate value and the second coordinate value. The control device converts, after interpolation, the blood vessel data into blood vessel data in the cylindrical coordinate system.
Abstract: An apparatus and method for detecting and preventing the unauthorized use of computer programs. The program to be protected is arranged to store first key information and a key means which is physically separate from the program is provided to the customer with each program which is sold. The key means stores second key information, and is adapted for association with a computer in which the program is to be processed. Either the first program routine, or one which is performed before a significant part of the program, is arranged to access the first and second key information and to perform a comparison operation. If the first and second information bear a predetermined relationship to each other, then it is known that the appropriate key means has been deployed by the customer on the computer, and that the use of the program is authorized.