900 resultados para Chunk-based information diffusion
Resumo:
PURPOSE: To evaluate and compare the efficacy of proximal versus distal embolus protection devices (EPD) during carotid artery angioplasty/stenting (CAS) based on diffusion-weighted magnetic resonance imaging (DW-MRI). METHODS: Forty-four patients (31 men; mean age 68 years, range 48-85) underwent protected CAS and had DW-MRI before and after the intervention. The cohort was analyzed according to the type of EPD used: a proximal EPD was deployed in 25 (56.8%) patients (17 men; mean age 66 years, range 48-85) and a distal filter in 19 (14 men; mean age 70 years, range 58-79). Fifteen (60.0%) patients with proximal protection were symptomatic of the target lesion; in the distal protection group, 10 (52.6%) were symptomatic. RESULTS: New lesions were seen on the postinterventional DW-MRI in 28.0% (7/25) of the proximal EPD group versus 32.6% (6/19) of those with a distal filter (p = NS). The majority were clinically silent. The new lesions in the vascular territory of the stented carotid artery in the group as a whole and per patient were fewer in the proximal EPD group (p = NS). No significant differences were noted in the T(2) appearance of the new lesions or the number of new lesions observed away from the vascular territory of the stented artery. CONCLUSION: Proximal embolus protection devices show a nonsignificant trend toward fewer embolic events, which warrants large-scale studies. Furthermore, proximal protection devices can be useful to control and treat acute in-stent thrombosis.
Resumo:
In Switzerland there is a shortage of population-based information on heart failure (HF) incidence and case fatalities (CF). The aim of this study was to estimate HF event rates and both in- and out-of-hospital CF rates.
Resumo:
OBJECTIVE: In Switzerland there is a shortage of population-based information on stroke incidence and case fatalities (CF). The aim of this study was to estimate stroke event rates and both in- and out-of-hospital CF rates. METHODS: Data on stroke diagnoses, coded according to I60-I64 (ICD 10), were taken from the Federal Hospital Discharge Statistics database (HOST) and the Cause of Death database (CoD) for the year 2004. The number of total stroke events and of age- and gender-specific and agestandardised event rates were estimated; overall CF, in-hospital and out-of-hospital, were determined. RESULTS: Among the overall number of 13 996 hospital discharges from stroke (HOST) the number was lower in women (n = 6736) than in men (n = 7260). A total of 3568 deaths (2137 women and 1431 men) due to stroke were recorded in the CoD database. The number of estimated stroke events was 15 733, and higher in women (n = 7933) than in men (n = 7800). Men presented significantly higher age-specific stroke event rates and a higher age-standardised event rate (178.7/100 000 versus 119.7/100 000). Overall CF rates were significantly higher for women (26.9%) than for men (18.4%). The same was true of out-of-hospital CF but not of in-hospital CF rates. CONCLUSION: The data on estimated stroke events obtained indicate that stroke discharge rate underestimates the stroke event rate. Out-of-hospital deaths from stroke accounted for the largest proportion of total stroke deaths. Sex differences in both number of total stroke events and deaths could be explained by the higher proportion of women than men aged 55+ in the Swiss population.
Resumo:
Tobacco use is a major health hazard, and the onset of tobacco use occurs almost entirely in the teenage years. For this reason, schools are an ideal site for tobacco prevention programs. Although studies have shown that effective school-based tobacco prevention programs exist, all too frequently these programs are not used. In order for effective programs to achieve their potential impact, strategies for speeding the diffusion of these programs to school districts and seeing that, once adopted, programs are implemented as they are intended, must be developed and tested.^ This study (SC2) set out to replicate the findings of an earlier quasi-experimental study (The Smart Choices Diffusion Study, or SC1) in which strategies based on diffusion theory and social learning theory were found to be effective in encouraging adoption and implementation of an effective tobacco prevention program in schools. To increase awareness and encourage adoption, intervention strategies in both studies utilized opinion leaders, messages highlighting positive aspects of the program, and modeling of benefits and effective use through videotape and newsletters. To encourage accurate implementation of the curriculum, teacher training for the two studies utilized videotaped modeling and practice of activities by teachers. SC2 subjects were 38 school districts that make up one of Texas' 20 education service regions. These districts had served as the comparison group in SC1, and findings for the SC1 comparison and intervention groups were utilized as historic controls.^ SC2 achieved a 76.3% adoption rate and found that an average of 84% of the curriculum was taught with an 82% fidelity to methods utilized by the curriculum. These rates and rates for implementation of dissemination strategies were equal to or greater than corresponding rates for SC1. The proportion of teachers implementing the curriculum in SC2 was found to be equal to SC1's video-trained districts but lower than the SC1 workshop-trained group.^ SC2's findings corroborate and support the findings from the earlier study, and increase our confidence in its findings. Taken together, the findings from SC2 and SC1 point to the effectiveness of their theory-based intervention strategies in encouraging adoption and accurate implementation of the tobacco prevention curriculum. ^
Resumo:
Computational network analysis provides new methods to analyze the brain's structural organization based on diffusion imaging tractography data. Networks are characterized by global and local metrics that have recently given promising insights into diagnosis and the further understanding of psychiatric and neurologic disorders. Most of these metrics are based on the idea that information in a network flows along the shortest paths. In contrast to this notion, communicability is a broader measure of connectivity which assumes that information could flow along all possible paths between two nodes. In our work, the features of network metrics related to communicability were explored for the first time in the healthy structural brain network. In addition, the sensitivity of such metrics was analysed using simulated lesions to specific nodes and network connections. Results showed advantages of communicability over conventional metrics in detecting densely connected nodes as well as subsets of nodes vulnerable to lesions. In addition, communicability centrality was shown to be widely affected by the lesions and the changes were negatively correlated with the distance from lesion site. In summary, our analysis suggests that communicability metrics that may provide an insight into the integrative properties of the structural brain network and that these metrics may be useful for the analysis of brain networks in the presence of lesions. Nevertheless, the interpretation of communicability is not straightforward; hence these metrics should be used as a supplement to the more standard connectivity network metrics.
Resumo:
Sensor networks are increasingly becoming one of the main sources of Big Data on the Web. However, the observations that they produce are made available with heterogeneous schemas, vocabularies and data formats, making it difficult to share and reuse these data for other purposes than those for which they were originally set up. In this thesis we address these challenges, considering how we can transform streaming raw data to rich ontology-based information that is accessible through continuous queries for streaming data. Our main contribution is an ontology-based approach for providing data access and query capabilities to streaming data sources, allowing users to express their needs at a conceptual level, independent of implementation and language-specific details. We introduce novel query rewriting and data translation techniques that rely on mapping definitions relating streaming data models to ontological concepts. Specific contributions include: • The syntax and semantics of the SPARQLStream query language for ontologybased data access, and a query rewriting approach for transforming SPARQLStream queries into streaming algebra expressions. • The design of an ontology-based streaming data access engine that can internally reuse an existing data stream engine, complex event processor or sensor middleware, using R2RML mappings for defining relationships between streaming data models and ontology concepts. Concerning the sensor metadata of such streaming data sources, we have investigated how we can use raw measurements to characterize streaming data, producing enriched data descriptions in terms of ontological models. Our specific contributions are: • A representation of sensor data time series that captures gradient information that is useful to characterize types of sensor data. • A method for classifying sensor data time series and determining the type of data, using data mining techniques, and a method for extracting semantic sensor metadata features from the time series.
Resumo:
Computer display height and desk design to allow forearm support are two critical design features of workstations for information technology tasks. However there is currently no 3D description of head and neck posture with different computer display heights and no direct comparison to paper based information technology tasks. There is also inconsistent evidence on the effect of forearm support on posture and no evidence on whether these features interact. This study compared the 3D head, neck and upper limb postures of 18 male and 18 female young adults whilst working with different display and desk design conditions. There was no substantial interaction between display height and desk design. Lower display heights increased head and neck flexion with more spinal asymmetry when working with paper. The curved desk, designed to provide forearm support, increased scapula elevation/protraction and shoulder flexion/abduction.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
In this paper we consider a computer information system and a way to realize the security of the data in it with digital watermarking. A technique for spread spectrum watermarking is presented and its realization with MathLAB 6.5 is shown.
Resumo:
With the development of social media tools such as Facebook and Twitter, mainstream media organizations including newspapers and TV media have played an active role in engaging with their audience and strengthening their influence on the recently emerged platforms. In this paper, we analyze the behavior of mainstream media on Twitter and study how they exert their influence to shape public opinion during the UK's 2010 General Election. We first propose an empirical measure to quantify mainstream media bias based on sentiment analysis and show that it correlates better with the actual political bias in the UK media than the pure quantitative measures based on media coverage of various political parties. We then compare the information diffusion patterns from different categories of sources. We found that while mainstream media is good at seeding prominent information cascades, its role in shaping public opinion is being challenged by journalists since tweets from them are more likely to be retweeted and they spread faster and have longer lifespan compared to tweets from mainstream media. Moreover, the political bias of the journalists is a good indicator of the actual election results. Copyright 2013 ACM.
Resumo:
Postprint
Resumo:
Trade credit is an important source of finance for SMEs and this study investigates the use of the financial statements and other information in making trade credit decisions in smaller entities in Finland, the UK, USA and South Africa. The study adds to the literature by examining the information needs of unincorporated entities as a basis for making comparisons with small, unlisted companies. In-depth, semi-structured interviews in each country were used to collect data from the owner-managers of SMEs and from credit rating agencies and credit insurers. The findings provide insights into similarities and differences between countries and between developed and developing economies. The evidence suggests that there are three main influences on the trade credit decision: formal and report-based information, soft information relating to social capital and contingency factors. The latter dictate the extent to which hard/formal information versus soft/informal information is used.
Resumo:
Objective: While in many Western affluent countries there is widespread awareness of chronic fatigue syndrome (CFS), also known as myalgic encephalomyelitis (ME), little is known about the awareness of CFS/ME in low- and middle-income countries. We compared the awareness of CFS in Brazil and the United Kingdom. Methods: Recognition and knowledge of CFS were assessed among 120 Brazilian specialist doctors in two major university hospitals using a typical case vignette of CFS. We also surveyed 3914 and 2435 consecutive attenders in Brazilian and British primary care clinics, respectively, concerning their awareness of CFS. Results: When given a typical case vignette of CFS, only 30.8% [95% confidence interval (CI), 22.7-39.9%] of Brazilian specialist doctors mentioned chronic fatigue or CFS as a possible diagnosis, a proportion substantially lower than that observed in Western affluent countries. Similarly, only 16.2% (95% CI, 15.1-17.4%) of Brazilian primary care attenders were aware of CFS, in contrast to 55.1% (95% CI, 53.1-57.1%) of their British counterparts (P <.001). This difference remained highly significant after controlling for patients` sociodemographic and socioeconomic characteristics (P <.001). Conclusions: The awareness of CFS was substantially lower in Brazil than the United Kingdom. The observed difference may influence patients` help-seeking behavior and both doctors` and patients` beliefs and attitudes in relation to fatigue-related syndromes. Attempts to promote the awareness of CFS should be considered in Brazil, but careful plans are required to ensure the delivery of sound evidence-based information. (c) 2008 Elsevier Inc. All rights reserved.
Resumo:
OBJECTIVES: Estimate the frequency of online searches on the topic of smoking and analyze the quality of online resources available to smokers interested in giving up smoking. METHODS: Search engines were used to revise searches and online resources related to stopping smoking in Brazil in 2010. The number of searches was determined using analytical tools available on Google Ads; the number and type of sites were determined by replicating the search patterns of internet users. The sites were classified according to content (advertising, library of articles and other). The quality of the sites was analyzed using the Smoking Treatment Scale- Content (STS-C) and the Smoking Treatment Scale - Rating (STS-R). RESULTS: A total of 642,446 searches was carried out. Around a third of the 113 sites encountered were of the 'library' type, i.e. they only contained articles, followed by sites containing clinical advertising (18.6) and professional education (10.6). Thirteen of the sites offered advice on quitting directed at smokers. The majority of the sites did not contain evidence-based information, were not interactive and did not have the possibility of communicating with users after the first contact. Other limitations we came across were a lack of financial disclosure as well as no guarantee of privacy concerning information obtained and no distinction made between editorial content and advertisements. CONCLUSIONS: There is a disparity between the high demand for online support in giving up smoking and the scarcity of quality online resources for smokers. It is necessary to develop interactive, customized online resources based on evidence and random clinical testing in order to improve the support available to Brazilian smokers.