977 resultados para 3rd Ventriculostomy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wrist pulse signal contains more important information about the health status of a person and pulse signal diagnosis has been employed in oriental medicine since very long time. In this paper we have used signal processing techniques to extract information from wrist pulse signals. For this purpose we have acquired radial artery pulse signals at wrist position noninvasively for different cases of interest. The wrist pulse waveforms have been analyzed using spatial features. Results have been obtained for the case of wrist pulse signals recorded for several subjects before exercise and after exercise. It is shown that the spatial features show statistically significant changes for the two cases and hence they are effective in distinguishing the changes taking place due to exercise. Support vector machine classifier is used to classify between the groups, and a high classification accuracy of 99.71% is achieved. Thus this paper demonstrates the utility of the spatial features in studying wrist pulse signals obtained under various recording conditions. The ability of the model to distinguish changes occurring under two different recording conditions can be potentially used for health care applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is well known that wrist pulse signals contain information about the status of health of a person and hence diagnosis based on pulse signals has assumed great importance since long time. In this paper the efficacy of signal processing techniques in extracting useful information from wrist pulse signals has been demonstrated by using signals recorded under two different experimental conditions viz. before lunch condition and after lunch condition. We have used Pearson's product-moment correlation coefficient, which is an effective measure of phase synchronization, in making a statistical analysis of wrist pulse signals. Contour plots and box plots are used to illustrate various differences. Two-sample t-tests show that the correlations show statistically significant differences between the groups. Results show that the correlation coefficient is effective in distinguishing the changes taking place after having lunch. This paper demonstrates the ability of the wrist pulse signals in detecting changes occurring under two different conditions. The study assumes importance in view of limited literature available on the analysis of wrist pulse signals in the case of food intake and also in view of its potential health care applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present study discusses the photosensitivity of GeS2 chalcogenide glass in response to irradiation with femtosecond pulses at 1047 nm. Bulk GeS2 glasses are prepared by conventional melt quenching technique and the amorphous nature of the glass is confirmed using X-ray diffraction. Ultrafast laser inscription technique is used to fabricate the straight channel waveguides in the glass. Single scan and multi scan waveguides are inscribed in GeS2 glasses of length 0.65 cm using a master oscillator power amplifier Yb doped fiber laser (IMRA mu jewel D400) with different pulse energy and translation speed. Diameters of the inscribed waveguides are measured and its dependence on the inscription parameters such as translation speed and pulse energy is studied. Butt coupling method is used to characterize the loss measurement of the inscribed optical waveguides. The mode field image of the waveguides is captured using CCD camera and compared with the mode field image of a standard SMF-28 fibers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One-dimensional transient heat flow is interpreted as a procession of `macro-scale translatory motion of indexed isothermal surfaces'. A new analytical model is proposed by introducing velocity of isothermal surface in Fourier heat diffusion equation. The velocity dependent function is extracted by revisiting `the concept of thermal layer of heat conduction in solid' and `exact solution' to estimate thermal diffusivity. The experimental approach involves establishment of 1 D unsteady heat flow inside the sample through Step-temperature excitation. A novel self-reference interferometer is utilized to separate a `unique isothermal surface' in time-varying temperature field. The translatory motion of the said isothermal surface is recorded using digital camera to estimate its velocity. From the knowledge of thermo-optic coefficient, temperature of the said isothermal surface is predicted. The performance of proposed method is evaluated for Quartz sample and compared with literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-invasive, real-time dynamic monitoring of pressure inside a column with the aid of Fiber Bragg Grating (FBG) sensor is presented in the present work. A bare FBG sensor is adhered on the circumference of a pressure column normal to its axis, which has the ability to acquire the hoop strain induced by the pressure variation inside the column. Pressure induced hoop strain response obtained using FBG sensor is validated against the pressure measurements obtained from conventional pressure gauge. Further, a protrusion setup on the outer surface of the column has been proposed over which a secondary FBG sensor is bonded normal to its axis, in order to increase the gauge length of this FBG sensor. This is carried out in order to validate the variation in sensitivity of the protrusion bonded FBG sensor compared to the bare FBG sensor bonded over the surface. A comparative study is done between the two FBG sensors and a conventional pressure gauge in order to establish the capacity of FBG sensor obtained hoop strain response for pressure monitoring inside the column.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper deals with processing the EEG signals obtained from 16 spatially arranged electrodes to measure coupling or synchrony between the frontal, parietal, occipital and temporal lobes of the cerebrum under the eyes open and eyes closed conditions. This synchrony was measured using magnitude squared coherence, Short Time Fourier Transform and wavelet based coherences. We found a pattern in the time-frequency coherence as we moved from the nasion to the inion of the subject's head. The coherence pattern obtained from the wavelet approach was found to be far more capable of picking up peaks in coherence with respect to frequency when compared to the regular Fourier based coherence. We detected high synchrony between frontal polar electrodes that is missing in coherence plots between other electrode pairs. The study has potential applications in healthcare.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An abundance of spectrum access and sensing algorithms are available in the dynamic spectrum access (DSA) and cognitive radio (CR) literature. Often, however, the functionality and performance of such algorithms are validated against theoretical calculations using only simulations. Both the theoretical calculations and simulations come with their attendant sets of assumptions. For instance, designers of dynamic spectrum access algorithms often take spectrum sensing and rendezvous mechanisms between transmitter-receiver pairs for granted. Test bed designers, on the other hand, either customize so much of their design that it becomes difficult to replicate using commercial off the shelf (COTS) components or restrict themselves to simulation, emulation /hardware-in-Ioop (HIL), or pure hardware but not all three. Implementation studies on test beds sophisticated enough to combine the three aforementioned aspects, but at the same time can also be put together using COTS hardware and software packages are rare. In this paper we describe i) the implementation of a hybrid test bed using a previously proposed hardware agnostic system architecture ii) the implementation of DSA on this test bed, and iii) the realistic hardware and software-constrained performance of DSA. Snapshot energy detector (ED) and Cumulative Summation (CUSUM), a sequential change detection algorithm, are available for spectrum sensing and a two-way handshake mechanism in a dedicated control channel facilitates transmitter-receiver rendezvous.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wrist pulse signals contain important information about the health of a person and hence diagnosis based on pulse signals has assumed great importance. In this paper we demonstrate the efficacy of a two term Gaussian model to extract information from pulse signals. Results have been obtained by conducting experiments on several subjects to record wrist pulse signals for the cases of before exercise and after exercise. Parameters have been extracted from the recorded signals using the model and a paired t-test is performed, which shows that the parameters are significantly different between the two groups. Further, a recursive cluster elimination based support vector machine is used to perform classification between the groups. An average classification accuracy of 99.46% is obtained, along with top classifiers. It is thus shown that the parameters of the Gaussian model show changes across groups and hence the model is effective in distinguishing the changes taking place due to the two different recording conditions. The study has potential applications in healthcare.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Standard Susceptible-Infected-Susceptible (SIS) epidemic models assume that a message spreads from the infected to the susceptible nodes due to only susceptible-infected epidemic contact. We modify the standard SIS epidemic model to include direct recruitment of susceptible individuals to the infected class at a constant rate (independent of epidemic contacts), to accelerate information spreading in a social network. Such recruitment can be carried out by placing advertisements in the media. We provide a closed form analytical solution for system evolution in the proposed model and use it to study campaigning in two different scenarios. In the first, the net cost function is a linear combination of the reward due to extent of information diffusion and the cost due to application of control. In the second, the campaign budget is fixed. Results reveal the effectiveness of the proposed system in accelerating and improving the extent of information diffusion. Our work is useful for devising effective strategies for product marketing and political/social-awareness/crowd-funding campaigns that target individuals in a social network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we design a new dynamic packet scheduling scheme suitable for differentiated service (DiffServ) network. Designed dynamic benefit weighted scheduling (DBWS) uses a dynamic weighted computation scheme loosely based on weighted round robin (WRR) policy. It predicts the weight required by expedited forwarding (EF) service for the current time slot (t) based on two criteria; (i) previous weight allocated to it at time (t-1), and (ii) the average increase in the queue length of EF buffer. This prediction provides smooth bandwidth allocation to all the services by avoiding overbooking of resources for EF service and still providing guaranteed services for it. The performance is analyzed for various scenarios at high, medium and low traffic conditions. The results show that packet loss is minimized, end to end delay is minimized and jitter is reduced and therefore meet quality of service (QoS) requirement of a network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We prepose a 5-bit lattice Boltzmann model for KdV equation. Using Chapman-Enskog expansion and multiscale technique, we obtained high order moments of equilibrium distribution function, and the 3rd dispersion coefficient and 4th order viscosity. The parameters of this scheme can be determined by analysing the energy dissipation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increasing the field of view of a holographic display while maintaining adequate image size is a difficult task. To address this problem, we designed a system that tessellates several sub-holograms into one large hologram at the output. The sub-holograms we generate is similar to a kinoform but without the paraxial approximation during computation. The sub-holograms are loaded onto a single spatial light modulator consecutively and relayed to the appropriate position at the output through a combination of optics and scanning reconstruction light. We will review the method of computer generated hologram and describe the working principles of our system. Results from our proof-of-concept system are shown to have an improved field of view and reconstructed image size. ©2009 IEEE.