945 resultados para asymptotic preserving


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Four papers, written in collaboration with the author’s graduate school advisor, are presented. In the first paper, uniform and non-uniform Berry-Esseen (BE) bounds on the convergence to normality of a general class of nonlinear statistics are provided; novel applications to specific statistics, including the non-central Student’s, Pearson’s, and the non-central Hotelling’s, are also stated. In the second paper, a BE bound on the rate of convergence of the F-statistic used in testing hypotheses from a general linear model is given. The third paper considers the asymptotic relative efficiency (ARE) between the Pearson, Spearman, and Kendall correlation statistics; conditions sufficient to ensure that the Spearman and Kendall statistics are equally (asymptotically) efficient are provided, and several models are considered which illustrate the use of such conditions. Lastly, the fourth paper proves that, in the bivariate normal model, the ARE between any of these correlation statistics possesses certain monotonicity properties; quadratic lower and upper bounds on the ARE are stated as direct applications of such monotonicity patterns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The maximum principle is an important property of solutions to PDE. Correspondingly, it's of great interest for people to design a high order numerical scheme solving PDE with this property maintained. In this thesis, our particular interest is solving convection-dominated diffusion equation. We first review a nonconventional maximum principle preserving(MPP) high order finite volume(FV) WENO scheme, and then propose a new parametrized MPP high order finite difference(FD) WENO framework, which is generalized from the one solving hyperbolic conservation laws. A formal analysis is presented to show that a third order finite difference scheme with this parametrized MPP flux limiters maintains the third order accuracy without extra CFL constraint when the low order monotone flux is chosen appropriately. Numerical tests in both one and two dimensional cases are performed on the simulation of the incompressible Navier-Stokes equations in vorticity stream-function formulation and several other problems to show the effectiveness of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When a lung tumor arises in segment 6, the close anatomical relationship to the middle lobe bronchus may make a lower bilobectomy necessary. Sleeve lobectomy may be an alternative. These procedures were compared retrospectively in 36 patients operated on between January 2005 and December 2006 with non-small-cell lung cancer (stage I-IIIB) of the right lower lobe. Sleeve lobectomy was performed in 21 patients and bilobectomy in 15 (41%). Preoperative lung function was comparable in both groups. Radical resection was achieved in 34/36 patients. Operation time was 121 min for sleeve lobectomy and 144 min for bilobectomy. Chest tubes were removed after 5 days in both groups. Postoperative lung function was better after sleeve lobectomy than bilobectomy (forced expiratory volume in 1st sec: 78% vs. 69%). Preservation of the middle lobe by sleeve lobectomy is feasible. There was no evidence that this resection was less radical, and complication rates were similar in both groups.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The long-term preservation of complex works such as video games comes with many challenges. Emulation, currently the most adequate preservation strategy for video games, requires several acts that are technically possible, but closely governed and restricted by copyright law and technical protection measures. Without prior authorisation from the rightsholder(s), it is therefore difficult to legally emulate these works. However, games often have several rightsholders that are in some cases near impossible to identify or locate – particularly with regard to older games. This paper therefore focuses on these so-called orphan video games and examines whether (and to what extent) they are covered by the directive on certain permitted uses of orphan works 2012/28/EU (Orphan Works Directive). As complex works with software and audiovisual components, it is difficult to classify video games in their entirety. The Orphan Works Directive, however, only covers certain categories of works. This paper therefore analyses 1) whether video games in their entirety can be considered types of works that fall under the directive, i.e. audiovisual or cinematographic works, and 2) whether the provisions of the orphan work exception are suitable for the specifics of these complex, “multimedia” works.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This editorial provides an overview of how the articles in this issue contextualize the wide-range of perceptions and practices that support (and sometimes undermine) family strengths. Data on the challenges facing today’s families are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current (or preferred) locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to reveal their current (or preferred) locations to the service provider or to other, possibly untrusted, users. In this paper, we propose privacy-preserving algorithms for determining an optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifying privacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment, we implement and test their execution efficiency on Nokia smartphones. By means of a targeted user-study, we attempt to get an insight into the privacy-awareness of users in location-based services and the usability of the proposed solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the Schrödinger equation for a relativistic point particle in an external one-dimensional δ-function potential. Using dimensional regularization, we investigate both bound and scattering states, and we obtain results that are consistent with the abstract mathematical theory of self-adjoint extensions of the pseudodifferential operator H=p2+m2−−−−−−−√. Interestingly, this relatively simple system is asymptotically free. In the massless limit, it undergoes dimensional transmutation and it possesses an infrared conformal fixed point. Thus it can be used to illustrate nontrivial concepts of quantum field theory in the simpler framework of relativistic quantum mechanics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent studies have demonstrated that the improved prognosis derived from resection of gliomas largely depends on the extent and quality of the resection, making maximum but safe resection the ultimate goal. Simultaneously, technical innovations and refined neurosurgical methods have rapidly improved efficacy and safety. Because gliomas derive from intrinsic brain cells, they often cannot be visually distinguished from the surrounding brain tissue during surgery. In order to appreciate the full extent of their solid compartment, various technologies have recently been introduced. However, radical resection of infiltrative glioma puts neurological function at risk, with potential detrimental consequences for patients' survival and quality of life. The allocation of various neurological functions within the brain varies in each patient and may undergo additional changes in the presence of a tumour (brain plasticity), making intra-operative localisation of eloquent areas mandatory for preservation of essential brain functions. Combining methods that visually distinguish tumour tissue and detect tissues responsible for critical functions now enables resection of tumours in brain regions that were previously considered off-limits, and benefits patients by enabling a more radical resection, while simultaneously lowering the risk of neurological deficits. Here we review recent and expected developments in microsurgery for glioma and their respective benefits.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND Record linkage of existing individual health care data is an efficient way to answer important epidemiological research questions. Reuse of individual health-related data faces several problems: Either a unique personal identifier, like social security number, is not available or non-unique person identifiable information, like names, are privacy protected and cannot be accessed. A solution to protect privacy in probabilistic record linkages is to encrypt these sensitive information. Unfortunately, encrypted hash codes of two names differ completely if the plain names differ only by a single character. Therefore, standard encryption methods cannot be applied. To overcome these challenges, we developed the Privacy Preserving Probabilistic Record Linkage (P3RL) method. METHODS In this Privacy Preserving Probabilistic Record Linkage method we apply a three-party protocol, with two sites collecting individual data and an independent trusted linkage center as the third partner. Our method consists of three main steps: pre-processing, encryption and probabilistic record linkage. Data pre-processing and encryption are done at the sites by local personnel. To guarantee similar quality and format of variables and identical encryption procedure at each site, the linkage center generates semi-automated pre-processing and encryption templates. To retrieve information (i.e. data structure) for the creation of templates without ever accessing plain person identifiable information, we introduced a novel method of data masking. Sensitive string variables are encrypted using Bloom filters, which enables calculation of similarity coefficients. For date variables, we developed special encryption procedures to handle the most common date errors. The linkage center performs probabilistic record linkage with encrypted person identifiable information and plain non-sensitive variables. RESULTS In this paper we describe step by step how to link existing health-related data using encryption methods to preserve privacy of persons in the study. CONCLUSION Privacy Preserving Probabilistic Record linkage expands record linkage facilities in settings where a unique identifier is unavailable and/or regulations restrict access to the non-unique person identifiable information needed to link existing health-related data sets. Automated pre-processing and encryption fully protect sensitive information ensuring participant confidentiality. This method is suitable not just for epidemiological research but also for any setting with similar challenges.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. METHODS We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. RESULTS A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. CONCLUSIONS The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine.Genet Med advance online publication 14 January 2016Genetics in Medicine (2016); doi:10.1038/gim.2015.167.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE Replacement of the torn anterior cruciate ligament (ACL) with a transplant is today`s gold standard. A new technique for preserving and healing the torn ACL is presented. HYPOTHESIS a dynamic intraligamentary stabilization (DIS) that provides continuous postinjury stability of the knee and ACL in combination with biological improvement of the healing environment [leucocyte- and platelet-rich fibrin (L-PRF) and microfracturing] should enable biomechanically stable ACL self-healing. METHODS Ten sportive patients were treated by DIS employing an internal stabilizer to keep the unstable knee in a posterior translation, combined with microfracturing and platelet-rich fibrin induction at the rupture site to promote self-healing. Postoperative clinical [Tegner, Lysholm, International Knee Documentation Committee (IKDC), visual analogue scale patient satisfaction score] and radiological evaluation, as well as assessment of knee laxity was performed at 6 weeks, 3, 6, 12, and 24 months. RESULTS One patient had a re-rupture 5 months postoperative and was hence excluded from further follow-ups. The other nine patients presented the following outcomes at 24 months: median Lysholm score of 100; IKDC score of 98 (97-100); median Tegner score of 6 (range 9-5); anterior translation difference of 1.4 mm (-1 to 3 mm); median satisfaction score of 9.8 (9-10). MRI showed scarring and continuity of the ligament in all patients. CONCLUSIONS DIS combined with microfracturing and L-PRF resulted in stable clinical and radiological healing of the torn ACL in all but one patient of this first series. They attained normal knee scores, reported excellent satisfaction and could return to their previous levels of sporting activity. LEVEL OF EVIDENCE Case series with no comparison group, Level IV.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the selection, implementation and stabilization phases, as well as the operations and optimization phase of an ERP system (ERP-lifecycle), numerous companies consider to utilize the support of an external service provider. This paper analyses how different categories of knowledge influence the sourcing decision of crucial tasks within the ERP lifecycle. Based on a review of the IS outsourcing literature, essential knowledge-related determinants for the IS outsourcing decision are presented and aggregated in a structural model. It will be hypothesized that internal deficits in technological knowledge in comparison to external vendors as well as the specificity of the synthesis of special technological and specific business knowledge have a profound impact on the outsourcing decision. Then, a classification framework will be developed which facilitates the assignment of various tasks within the ERP lifecycle to their respective knowledge categories and knowledge carriers which might be internal or external stakeholders. The configuaration task will be used as an example to illustrate how the structural model and the classification framework may be applied to evaluate the outsourcing of tasks within the ERP lifecycle.