152 resultados para Digital Identity
Resumo:
In many European countries, image quality for digital x-ray systems used in screening mammography is currently specified using a threshold-detail detectability method. This is a two-part study that proposes an alternative method based on calculated detectability for a model observer: the first part of the work presents a characterization of the systems. Eleven digital mammography systems were included in the study; four computed radiography (CR) systems, and a group of seven digital radiography (DR) detectors, composed of three amorphous selenium-based detectors, three caesium iodide scintillator systems and a silicon wafer-based photon counting system. The technical parameters assessed included the system response curve, detector uniformity error, pre-sampling modulation transfer function (MTF), normalized noise power spectrum (NNPS) and detective quantum efficiency (DQE). Approximate quantum noise limited exposure range was examined using a separation of noise sources based upon standard deviation. Noise separation showed that electronic noise was the dominant noise at low detector air kerma for three systems; the remaining systems showed quantum noise limited behaviour between 12.5 and 380 µGy. Greater variation in detector MTF was found for the DR group compared to the CR systems; MTF at 5 mm(-1) varied from 0.08 to 0.23 for the CR detectors against a range of 0.16-0.64 for the DR units. The needle CR detector had a higher MTF, lower NNPS and higher DQE at 5 mm(-1) than the powder CR phosphors. DQE at 5 mm(-1) ranged from 0.02 to 0.20 for the CR systems, while DQE at 5 mm(-1) for the DR group ranged from 0.04 to 0.41, indicating higher DQE for the DR detectors and needle CR system than for the powder CR phosphor systems. The technical evaluation section of the study showed that the digital mammography systems were well set up and exhibiting typical performance for the detector technology employed in the respective systems.
Resumo:
BACKGROUND AND STUDY AIMS: The current gold standard in Barrett's esophagus monitoring consists of four-quadrant biopsies every 1-2 cm in accordance with the Seattle protocol. Adding brush cytology processed by digital image cytometry (DICM) may further increase the detection of patients with Barrett's esophagus who are at risk of neoplasia. The aim of the present study was to assess the additional diagnostic value and accuracy of DICM when added to the standard histological analysis in a cross-sectional multicenter study of patients with Barrett's esophagus in Switzerland. METHODS: One hundred sixty-four patients with Barrett's esophagus underwent 239 endoscopies with biopsy and brush cytology. DICM was carried out on 239 cytology specimens. Measures of the test accuracy of DICM (relative risk, sensitivity, specificity, likelihood ratios) were obtained by dichotomizing the histopathology results (high-grade dysplasia or adenocarcinoma vs. all others) and DICM results (aneuploidy/intermediate pattern vs. diploidy). RESULTS: DICM revealed diploidy in 83% of 239 endoscopies, an intermediate pattern in 8.8%, and aneuploidy in 8.4%. An intermediate DICM result carried a relative risk (RR) of 12 and aneuploidy a RR of 27 for high-grade dysplasia/adenocarcinoma. Adding DICM to the standard biopsy protocol, a pathological cytometry result (aneuploid or intermediate) was found in 25 of 239 endoscopies (11%; 18 patients) with low-risk histology (no high-grade dysplasia or adenocarcinoma). During follow-up of 14 of these 18 patients, histological deterioration was seen in 3 (21%). CONCLUSION: DICM from brush cytology may add important information to a standard biopsy protocol by identifying a subgroup of BE-patients with high-risk cellular abnormalities.
Resumo:
Social identity is a double-edged sword. On the one hand, identifying with a social group is a prerequisite for the sharing of common norms and values, solidarity, and collective action. On the other hand, in-group identification often goes together with prejudice and discrimination. Today, these two sides of social identification underlie contradictory trends in the way European nations and European nationals relate to immigrants and immigration. Most European countries are becoming increasingly multicultural, and anti-discrimination laws have been adopted throughout the European Union, demonstrating a normative shift towards more social inclusion and tolerance. At the same time, racist and xenophobic attitudes still shape social relations, individual as well as collective behaviour (both informal and institutional), and political positions throughout Europe. The starting point for this chapter is Sanchez-Mazas' (2004) interactionist approach to the study of racism and xenophobia, which in turn builds on Axel Honneth's (1996) philosophical theory of recognition. In this view, the origin of attitudes towards immigrants cannot be located in one or the other group, but in a dynamic of mutual influence. Sanchez-Mazas' approach is used as a general framework into which we integrate social psychological approaches of prejudice and recent empirical findings examining minority-majority relations. We particularly focus on the role of national and European identities as antecedents of anti-immigrant attitudes held by national majorities. Minorities' reactions to denials of recognition are also examined. We conclude by delineating possible social and political responses to prejudice towards immigrants.
Resumo:
Traditionally, the ventral occipito-temporal (vOT) area, but not the superior parietal lobules (SPLs), is thought as belonging to the neural system of visual word recognition. However, some dyslexic children who exhibit a visual attention span disorder - i.e. poor multi-element parallel processing - further show reduced SPLs activation when engaged in visual multi-element categorization tasks. We investigated whether these parietal regions further contribute to letter-identity processing within strings. Adult skilled readers and dyslexic participants with a visual attention span disorder were administered a letter-string comparison task under fMRI. Dyslexic adults were less accurate than skilled readers to detect letter identity substitutions within strings. In skilled readers, letter identity differs related to enhanced activation of the left vOT. However, specific neural responses were further found in the superior and inferior parietal regions, including the SPLs bilaterally. Two brain regions that are specifically related to substituted letter detection, the left SPL and the left vOT, were less activated in dyslexic participants. These findings suggest that the left SPL, like the left vOT, may contribute to letter string processing.
Resumo:
Digital holographic microscopy (DHM) is a noninvasive optical imaging technique that provides quantitative phase images of living cells. In a recent study, we showed that the quantitative monitoring of the phase signal by DHM was a simple label-free method to study the effects of glutamate on neuronal optical responses (Pavillon et al., 2010). Here, we refine these observations and show that glutamate produces the following three distinct optical responses in mouse primary cortical neurons in culture, predominantly mediated by NMDA receptors: biphasic, reversible decrease (RD) and irreversible decrease (ID) responses. The shape and amplitude of the optical signal were not associated with a particular cellular phenotype but reflected the physiopathological status of neurons linked to the degree of NMDA activity. Thus, the biphasic, RD, and ID responses indicated, respectively, a low-level, a high-level, and an "excitotoxic" level of NMDA activation. Moreover, furosemide and bumetanide, two inhibitors of sodium-coupled and/or potassium-coupled chloride movement strongly modified the phase shift, suggesting an involvement of two neuronal cotransporters, NKCC1 (Na-K-Cl) and KCC2 (K-Cl) in the genesis of the optical signal. This observation is of particular interest since it shows that DHM is the first imaging technique able to monitor dynamically and in situ the activity of these cotransporters during physiological and/or pathological neuronal conditions.
Resumo:
Identification is ever more important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity 'theft' or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity 'theft'. Commonly accepted definitions are lacking, thus blurring available statistics, and policies to combat this new crime are piecemeal at best. To assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects. As a first key step, this article introduces a typology of identity-related crime, consisting of conceptual, technical and legal categories, that can be used as a comprehensive framework for future research, countermeasures and policies related to identity related crime.
Resumo:
We present dual-wavelength Digital Holographic Microscopy (DHM) measurements on a certified 8.9 nm high Chromium thin step sample and demonstrate sub-nanometer axial accuracy. We introduce a modified DHM Reference Calibrated Hologram (RCH) reconstruction algorithm taking into account amplitude contributions. By combining this with a temporal averaging procedure and a specific dual-wavelength DHM arrangement, it is shown that specimen topography can be measured with an accuracy, defined as the axial standard deviation, reduced to at least 0.9 nm. Indeed, it is reported that averaging each of the two wavefronts recorded with real-time dual-wavelength DHM can provide up to 30% spatial noise reduction for the given configuration, thanks to their non-correlated nature. ©2008 COPYRIGHT SPIE
Resumo:
Developing a sense of identity is a crucial psychosocial task for young people. The purpose of this study was to evaluate identity development in French-speaking adolescents and emerging adults (in France and Switzerland) using a process-oriented model of identity formation including five dimensions (i.e., exploration in breadth, commitment making, exploration in depth, identification with commitment, and ruminative exploration). The study included participants from three different samples (total N = 2239, 66.7% women): two samples of emerging adult student and one sample of adolescents. Results confirmed the hypothesized five-factor dimensional model of identity in our three samples and provided evidence for convergent validity of the model. The results also indicated that exploration in depth might be subdivided in two aspects: a first form of exploration in depth leading to a better understanding and to an increase of the strength of current commitments and a second form of exploration in depth leading to a re-evaluation and a reconsideration of current commitments. Further, the identity status cluster solution that emerged is globally in line with previous literature (i.e., achievement, foreclosure, moratorium, carefree diffusion, diffused diffusion, undifferentiated). However, despite a structural similarity, we found variations in identity profiles because identity development is shaped by cultural context. These specific variations are discussed in light of social, educational and economic differences between France and the French-speaking part of Switzerland. Implications and suggestions for future research are offered.
Resumo:
A population register is an inventory of residents within a country, with their characteristics (date of birth, sex, marital status, etc.) and other socio-economic data, such as occupation or education. However, data on population are also stored in numerous other public registers such as tax, land, building and housing, military, foreigners, vehicles, etc. Altogether they contain vast amounts of personal and sensitive information. Access to public information is granted by law in many countries, but this transparency is generally subject to tensions with data protection laws. This paper proposes a framework to analyze data access (or protection) requirements, as well as a model of metadata for data exchange.