582 resultados para cancer detection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Children having chemotherapy for cancer are prone to developing influenza infections. Influenza virus infection may lead to hospitalization/prolonged hospitalization, interruption of treatment, and other severe adverse outcomes such as death. Although clinical guidelines recommend children who are being treated for cancer be vaccinated against influenza, evidence supporting this recommendation is unclear.--------- Objectives: The objectives of this review were to (1) assess the efficacy of influenza vaccination in stimulating immunologic response in children with cancer receiving chemotherapy, compared with other control groups; (2) assess the efficacy of influenza vaccination in preventing influenza infection; and (3) establish any adverse effects associated with influenza vaccines in children with cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE: We report our telephone-based system for selecting community control series appropriate for a complete Australia-wide series of Ewing's sarcoma cases. METHODS: We used electronic directory random sampling to select age-matched controls. The sampling has all listed telephone numbers on an up-dated CD-Rom. RESULTS: 95% of 2245 telephone numbers selected were successfully contacted. The mean number of attempts needed was 1.94, 58% answering at the first attempt. On average, we needed 4.5 contacts per control selected. Calls were more likely to be successful (reach a respondent) when made in the evening (except Saturdays). The overall response rate among contacted telephone numbers was 92.8%. Participation rates among female and male respondents were practically the same. The exclusion of unlisted numbers (13.5% of connected households) and unconnected households (3.7%) led to potential selection bias. However, restricting the case series to listed cases only, plus having external information on the direction of potential bias allow meaningful interpretation of our data. CONCLUSION: Sampling from an electronic directory is convenient, economical and simple, and gives a very good yield of eligible subjects compared to other methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Approaches with Vertical Guidance (APV) can provide greater safety and cost savings to general aviation through accurate GPS horizontal and vertical navigation. However, GPS needs augmentation to achieve APV fault detection requirements. Aircraft Based Augmentation Systems (ABAS) fuse GPS with additional sensors at the aircraft. Typical ABAS designs assume high-quality inertial sensors with Kalman filters but these are too expensive for general aviation. Instead of using high-quality (and expensive) sensors, the purpose of this paper is to investigate augmenting GPS with a low-quality MEMS IMU and Aircraft Dynamic Model (ADM). The IMU and ADM are fused together using a multiple model fusion strategy in a bank of Extended Kalman Filters (EKF) with the Normalized Solution Separation (NSS) fault detection scheme. A tightly-coupled configuration with GPS is used and frequent GPS updates are applied to the IMU and ADM to compensate for their errors. Based upon a simulated APV approach, the performance of this architecture in detecting a GPS ramp fault is investigated showing a performance improvement over a GPS-only “snapshot” implementation of the NSS method. The effect of fusing the IMU with the ADM is evaluated by comparing a GPS-IMU-ADM EKF with a GPS-IMU EKF where a small improvement in protection levels is shown.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Non-driving related cognitive load and variations of emotional state may impact a driver’s capability to control a vehicle and introduces driving errors. Availability of reliable cognitive load and emotion detection in drivers would benefit the design of active safety systems and other intelligent in-vehicle interfaces. In this study, speech produced by 68 subjects while driving in urban areas is analyzed. A particular focus is on speech production differences in two secondary cognitive tasks, interactions with a co-driver and calls to automated spoken dialog systems (SDS), and two emotional states during the SDS interactions - neutral/negative. A number of speech parameters are found to vary across the cognitive/emotion classes. Suitability of selected cepstral- and production-based features for automatic cognitive task/emotion classification is investigated. A fusion of GMM/SVM classifiers yields an accuracy of 94.3% in cognitive task and 81.3% in emotion classification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Gabor representations have been widely used in facial analysis (face recognition, face detection and facial expression detection) due to their biological relevance and computational properties. Two popular Gabor representations used in literature are: 1) Log-Gabor and 2) Gabor energy filters. Even though these representations are somewhat similar, they also have distinct differences as the Log-Gabor filters mimic the simple cells in the visual cortex while the Gabor energy filters emulate the complex cells, which causes subtle differences in the responses. In this paper, we analyze the difference between these two Gabor representations and quantify these differences on the task of facial action unit (AU) detection. In our experiments conducted on the Cohn-Kanade dataset, we report an average area underneath the ROC curve (A`) of 92.60% across 17 AUs for the Gabor energy filters, while the Log-Gabor representation achieved an average A` of 96.11%. This result suggests that small spatial differences that the Log-Gabor filters pick up on are more useful for AU detection than the differences in contours and edges that the Gabor energy filters extract.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The detection of voice activity is a challenging problem, especially when the level of acoustic noise is high. Most current approaches only utilise the audio signal, making them susceptible to acoustic noise. An obvious approach to overcome this is to use the visual modality. The current state-of-the-art visual feature extraction technique is one that uses a cascade of visual features (i.e. 2D-DCT, feature mean normalisation, interstep LDA). In this paper, we investigate the effectiveness of this technique for the task of visual voice activity detection (VAD), and analyse each stage of the cascade and quantify the relative improvement in performance gained by each successive stage. The experiments were conducted on the CUAVE database and our results highlight that the dynamics of the visual modality can be used to good effect to improve visual voice activity detection performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The previous investigations have shown that the modal strain energy correlation method, MSEC, could successfully identify the damage of truss bridge structures. However, it has to incorporate the sensitivity matrix to estimate damage and is not reliable in certain damage detection cases. This paper presents an improved MSEC method where the prediction of modal strain energy change vector is differently obtained by running the eigensolutions on-line in optimisation iterations. The particular trail damage treatment group maximising the fitness function close to unity is identified as the detected damage location. This improvement is then compared with the original MSEC method along with other typical correlation-based methods on the finite element model of a simple truss bridge. The contributions to damage detection accuracy of each considered mode is also weighed and discussed. The iterative searching process is operated by using genetic algorithm. The results demonstrate that the improved MSEC method suffices the demand in detecting the damage of truss bridge structures, even when noised measurement is considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed Denial of Services DDoS, attacks has become one of the biggest threats for resources over Internet. Purpose of these attacks is to make servers deny from providing services to legitimate users. These attacks are also used for occupying media bandwidth. Currently intrusion detection systems can just detect the attacks but cannot prevent / track the location of intruders. Some schemes also prevent the attacks by simply discarding attack packets, which saves victim from attack, but still network bandwidth is wasted. In our opinion, DDoS requires a distributed solution to save wastage of resources. The paper, presents a system that helps us not only in detecting such attacks but also helps in tracing and blocking (to save the bandwidth as well) the multiple intruders using Intelligent Software Agents. The system gives dynamic response and can be integrated with the existing network defense systems without disturbing existing Internet model. We have implemented an agent based networking monitoring system in this regard.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVE: Parents coping with a diagnosis of advanced cancer experience distress and guilt about the impact of the disease on their children but report that there are few resources specific to advanced disease to guide and support them in discussions with their children. Although some resources have been developed to assist parents with advanced cancer, it appears that these are not widely disseminated. METHODS: To determine the need for a brief resource that could be given to parents at the point of diagnosis of advanced cancer, including its content, in-depth interviews were conducted with eight women with advanced breast cancer. RESULTS: Women confirmed that they had received minimal assistance from health professionals in discussing the diagnosis with their children, and even when professional counselors were accessed they were not always attuned to the specific needs of parents with advanced cancer. Women felt frustrated that information they did access focused on early disease and lacked the details women felt they needed in coping with advanced cancer. Women felt that there was a need for a brief resource that reassured parents about the impact of the cancer on their children, including practical strategies to help them cope and examples of the ways other parents had responded to difficult questions such as about parental death. A draft resource was developed, critically reviewed by the participants, and their comments incorporated into a final version. SIGNIFICANCE OF RESULTS: This article expands on the themes highlighted by women as important to assist parents with advanced cancer, including the final resource that was developed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: This study examined the quality of life (QOL), measured by the Functional Assessment of Cancer Therapy (FACT) questionnaire, among urban (n=277) and non-urban (n=323) breast cancer survivors and women from the general population (n=1140) in Queensland, Australia. ---------- Methods: Population-based samples of breast cancer survivors aged <75 years who were 12 months post-diagnosis and similarly-aged women from the general population were recruited between 2002 and 2007. ---------- Results: Age-adjusted QOL among urban and non-urban breast cancer survivors was similar, although QOL related to breast cancer concerns was the weakest domain and was lower among non-urban survivors than their urban counterparts (36.8 versus 40.4, P<0.01). Irrespective of residence, breast cancer survivors, on average, reported comparable scores on most QOL scales as their general population peers, although physical well-being was significantly lower among non-urban survivors (versus the general population, P<0.01). Overall, around 20%-33% of survivors experienced lower QOL than peers without the disease. The odds of reporting QOL below normative levels were increased more than two-fold for those who experienced complications following surgery, reported upper-body problems, had higher perceived stress levels and/or a poor perception of handling stress (P<0.01 for all). ---------- Conclusions: Results can be used to identify subgroups of women at risk of low QOL and to inform components of tailored recovery interventions to optimize QOL for these women following cancer treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To describe quality of life (QOL) over a 12-month period among women with breast cancer, consider the association between QOL and overall survival (OS), and explore characteristics associated with QOL declines. Methods A population-based sample of Australian women (n=287) with invasive, unilateral breast cancer (Stage I+), was observed prospectively for a median of 6.6 years. QOL was assessed at six, 12 and 18 months post-diagnosis, using the Functional Assessment of Cancer Therapy, Breast (FACT-B+4) questionnaire. Raw scores for the FACT-B+4 and subscales were computed and individuals were categorized according to whether QOL declined, remained stable or improved between six and 18 months. Kaplan-Meier and Cox proportional hazards survival methods were used to estimate OS and its associations with QOL. Logistic regression models identified factors associated with QOL decline. Results Within FACT-B+4 sub-scales, between 10% and 23% of women showed declines in QOL. Following adjustment for established prognostic factors, emotional wellbeing and FACT-B+4 scores at six months post-diagnosis were associated with OS (p<0.05). Declines in physical (p<0.01) or functional (p=0.02) well-being between six and 18 months post-diagnosis were also associated significantly with OS. Receiving multiple forms of adjuvant treatment, a perception of not handling stress well and reporting one or more other major life events at six months post-diagnosis were factors associated with declines in QOL in multivariable analyses. Conclusions Interventions targeted at preventing QOL declines may ultimately improve quantity as well as quality of life following breast cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Emerging evidence supports that prostate cancer originates from a rare sub-population of cells, namely prostate cancer stem cells (CSCs). Conventional therapies for prostate cancer are believed to mainly target the majority of differentiated tumor cells but spare CSCs, which may account for the subsequent disease relapse after treatment. Therefore, successful elimination of CSCs may be an effective strategy to achieve complete remission from this disease. Gamma-tocotrienols (-T3) is one of the vitamin-E constituents which have been shown to have anticancer effects against a wide-range of human cancers. Recently, we have reported that -T3 treatment not only inhibits prostate cancer cell invasion but also sensitizes the cells to docetaxel-induced apoptosis, suggesting that -T3 may be an effective therapeutic agent against advanced stage prostate cancer. Here, we demonstrate for the first time that -T3 can down-regulate the expression of prostate CSC markers (CD133/CD44) in androgen independent (AI) prostate cancer cell lines (PC-3 & DU145), as evident from western blotting analysis. Meanwhile, the spheroid formation ability of the prostate cancer cells was significantly hampered by -T3 treatment. In addition, pre-treatment of PC-3 cells with -T3 was found to suppress tumor initiation ability of the cells. More importantly, while CD133-enriched PC-3 cells were highly resistant to docetaxel treatment, these cells were as sensitive to -T3 treatment as the CD133-depleted population. Our data suggest that -T3 may be an effective agent in targeting prostate CSCs, which may account for its anticancer and chemosensitizing effects reported in previous studies.