996 resultados para Mobile Mapping
Resumo:
Multi-center studies using magnetic resonance imaging facilitate studying small effect sizes, global population variance and rare diseases. The reliability and sensitivity of these multi-center studies crucially depend on the comparability of the data generated at different sites and time points. The level of inter-site comparability is still controversial for conventional anatomical T1-weighted MRI data. Quantitative multi-parameter mapping (MPM) was designed to provide MR parameter measures that are comparable across sites and time points, i.e., 1 mm high-resolution maps of the longitudinal relaxation rate (R1 = 1/T1), effective proton density (PD(*)), magnetization transfer saturation (MT) and effective transverse relaxation rate (R2(*) = 1/T2(*)). MPM was validated at 3T for use in multi-center studies by scanning five volunteers at three different sites. We determined the inter-site bias, inter-site and intra-site coefficient of variation (CoV) for typical morphometric measures [i.e., gray matter (GM) probability maps used in voxel-based morphometry] and the four quantitative parameters. The inter-site bias and CoV were smaller than 3.1 and 8%, respectively, except for the inter-site CoV of R2(*) (<20%). The GM probability maps based on the MT parameter maps had a 14% higher inter-site reproducibility than maps based on conventional T1-weighted images. The low inter-site bias and variance in the parameters and derived GM probability maps confirm the high comparability of the quantitative maps across sites and time points. The reliability, short acquisition time, high resolution and the detailed insights into the brain microstructure provided by MPM makes it an efficient tool for multi-center imaging studies.
Resumo:
BACKGROUND: Carotid artery stenosis is associated with the occurrence of acute and chronic ischemic lesions that increase with age in the elderly population. Diffusion Imaging and ADC mapping may be an appropriate method to investigate patients with chronic hypoperfusion consecutive to carotid stenosis. This non-invasive technique allows to investigate brain integrity and structure, in particular hypoperfusion induced by carotid stenosis diseases. The aim of this study was to evaluate the impact of a carotid stenosis on the parenchyma using ADC mapping. METHODS: Fifty-nine patients with symptomatic (33) and asymptomatic (26) carotid stenosis were recruited from our multidisciplinary consultation. Both groups demonstrated a similar degree of stenosis. All patients underwent MRI of the brain including diffusion-weighted MR imaging with ADC mapping. Regions of interest were defined in the anterior and posterior paraventricular regions both ipsilateral and contralateral to the stenosis (anterior circulation). The same analysis was performed for the thalamic and occipital regions (posterior circulation). RESULTS: ADC values of the affected vascular territory were significantly higher on the side of the stenosis in the periventricular anterior (P<0.001) and posterior (P<0.01) area. There was no difference between ipsilateral and contralateral ADC values in the thalamic and occipital regions. CONCLUSIONS: We have shown that carotid stenosis is associated with significantly higher ADC values in the anterior circulation, probably reflecting an impact of chronic hypoperfusion on the brain parenchyma in symptomatic and asymptomatic patients. This is consistent with previous data in the literature.
Resumo:
Between 1995 and 2005, the number of aortic aneurysms treated annually using endovascular techniques (EVAR) increased from 0 to 50, including all aortic stages. Our organization includes a large team of surgeons, a stock of three complete families of endoprostheses (straight, conical and bifurcated), a mobile trolley with accessories (arterial introducer/introducer sheath, guide wire, catheters, balloons, etc.) and an appliance on wheels for intravascular ultrasound examination (IVUS). This appliance, together with a mobile fluoroscopy device (c-arm), allows endovascular aneurysms analysis of every operating room in our institution, usually without angiography or the use of contrast medium. In general, we are therefore not depending on substantial preoperative imaging in order to identify candidates for endovascular aneurysms repair and can treat abdominal and thoracic aortic ruptures without delay. For endovascular aortic aneurysms repair we distinguish between process steps on the one hand (determining indications, imaging of the access vessels, measurement using IVUS and road mapping via fluoroscopy, selection of implant, implant insertion, positioning, setting the implant, determining success, reconstruction of the access vessel and follow-up) and the level of competence on the other (assistant, senior and directing physicians). Our ultrasound supported technique for endovascular aneurysms repair has been successfully brought to other hospitals using an IVUS transporter and telementoring.
Resumo:
Prospective comparative evaluation of patent V blue, fluorescein and (99m)TC-nanocolloids for intraoperative sentinel lymph node (SLN) mapping during surgery for non-small cell lung cancer (NSCLC). Ten patients with peripherally localised clinical stage I NSCLC underwent thoracotomy and peritumoral subpleural injection of 2 ml of patent V blue dye, 1 ml of 10% fluorescein and 1ml of (99m)Tc-nanocolloids (0.4 mCi). The migration and spatial distribution pattern of the tracers was assessed by direct visualisation (patent V blue), visualisation of fluorescence signalling by a lamp of Wood (fluorescein) and radioactivity counting with a hand held gamma-probe ((99m)Tc-nanocolloids). Lymph nodes at interlobar (ATS 11), hilar (ATS 10) and mediastinal (right ATS 2,4,7; left ATS 5,6,7) levels were systematically assessed every 10 min up to 60 min after injection, followed by lobectomy and formal lymph node dissection. Successful migration from the peritumoral area to the mediastinum was observed for all three tracers up to 60 min after injection. The interlobar lympho-fatty tissue (station ATS 11) revealed an early and preferential accumulation of all three tracers for all tumours assessed and irrespective of the tumour localisation. However, no preferential accumulation in one or two distinct lymph nodes was observed up to 60 min after injection for all three tracers assessed. Intraoperative SLN mapping revealed successful migration of the tracers from the site of peritumoral injection to the mediastinum, but in a diffuse pattern without preferential accumulation in sentinel lymph nodes.
Resumo:
This paper describes preliminary results of a qualitative case study on mobile communication conducted in an elders¿ retirement home in Toronto (Ontario, Canada) in May 2012. This is part of an international research project on the relationship between mobile communications and older people.Secondary data at a Canadian level contextualizes the case study. We focus ondemographic characteristics and on adoption and use of information and communication technologies (ICTs) broken by age.Participants in the study (21 individuals) are between 75 and 98 years of age, thereforewe can consider that the gathered evidence refers to the ¿old¿ older. Mobile phoneusers in the sample describe very specific uses of the mobile phone, while non-usersreport not facing external pressures for adopting that technology. The main channel formediated communication is the landline; in consequences mobile phones ¿when used¿ constitute an extra layer of communication. Finally, when members of the personal network of the individuals live abroad they are more prone to use Internet and Skype. We are also able to find ex-users of both mobile telephony and computers/internet who stopped using these technologies because they did not find any use for them.
Resumo:
This paper introduces a qualitative case study on mobile communication among the older population (60+ years old) conducted in Great Los Angeles (CA, USA) in autumn 2011. Methodology, fieldwork and preliminary results are discussed.Before, country-level data is presented to better understand the specific characteristics of the studied individuals. The section focus is on demographics and on acceptance and use of information and communication technologies (ICT).Preliminary results show that within the sample under study (20 individuals) there is a high number of mobile phone users (15) while among non-mobile users (5), three of them decide to stop using this technology. A majority of mobile phone adopters describe a very limited use of the device for everyday life communications. Finally,while Internet is really popular within the sample (14 users), just 3 individuals go online through their mobile telephone.
Resumo:
This paper explores the distinctive characteristics of mobile telephone use among the elderly population using the most recent European country-level data on individual use of mobile telephony and advanced mobile services, Eurostat 2008. Through a cluster analysis of mobile phone use data across 30 countries, it is possible to confirm that mobile telephone occupies a peripheral position for the elderly in Europe.
Resumo:
We characterize market traders at two rural fairs in Puno, Peru, based on quantitative and qualitative data gathered in 2008, to gain insight into types of traders and the information needs that influence the degree to which they use mobile phones to make decisions regarding which weekly fairs to attend. Using variables such as origin, type of goods sold, means of transportation to the market, and reliance on networks, we identify traders as full-time traders, part-time traders, or subsistence traders, that is, people trading solely to survive. We find that when traders are already familiar with the technology, regularly rely on endogenous networks to make decisions, and have more to lose from failing to trade (e.g., those selling perishable goods), they are more likely to use mobile phones to decide where to sell.
Resumo:
By means of a qualitative approach I bring insights on the relationship older people (60+) have with mobile communication in a low income district of Lima (Peru). The case study I conducted in September 2013 included interviews and one focus group with 20 inhabitants of San Juan de Miraflores district. The user/non-user dichotomous classification turned out to be too narrow in this context. While some participants reported a common, bidirectional use of the device, restrictions and discontinuities played a role. Some described an asymmetric use of the mobile phone, as they used it exclusively for receiving calls, while never making outgoing calls. Others described discontinuities in ownership, which was the case when their mobile was stolen and they could not replace it immediately. My initial hypothesis is that such restrictions are related to income, skills and age.
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.
Resumo:
Peer-reviewed
Resumo:
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.