GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    In: Stroke, Ovid Technologies (Wolters Kluwer Health), Vol. 53, No. 3 ( 2022-03), p. 769-778
    Abstract: The purpose of the COMPLETE (International Acute Ischemic Stroke Registry With the Penumbra System Aspiration Including the 3D Revascularization Device) registry was to evaluate the generalizability of the safety and efficacy of the Penumbra System (Penumbra, Inc, Alameda) in a real-world setting. Methods: COMPLETE was a global, prospective, postmarket, multicenter registry. Patients with large vessel occlusion–acute ischemic stroke who underwent mechanical thrombectomy using the Penumbra System with or without the 3D Revascularization Device as frontline approach were enrolled at 42 centers (29 United States, 13 Europe) from July 2018 to October 2019. Primary efficacy end points were successful postprocedure angiographic revascularization (modified Thrombolysis in Cerebral Infarction ≥2b) and 90-day functional outcome (modified Rankin Scale score 0–2). The primary safety end point was 90-day all-cause mortality. An imaging core lab determined modified Thrombolysis in Cerebral Infarction scores, Alberta Stroke Program Early CT Scores, clot location, and occurrence of intracranial hemorrhage at 24 hours. Independent medical reviewers adjudicated safety end points. Results: Six hundred fifty patients were enrolled (median age 70 years, 54.0% female, 49.2% given intravenous recombinant tissue-type plasminogen activator before thrombectomy). Rate of modified Thrombolysis in Cerebral Infarction 2b to 3 postprocedure was 87.8% (95% CI, 85.3%–90.4%). First pass and postprocedure rates of modified Thrombolysis in Cerebral Infarction 2c to 3 were 41.5% and 66.2%, respectively. At 90 days, 55.8% (95% CI, 51.9%–59.7%) had modified Rankin Scale score 0 to 2, and all-cause mortality was 15.5% (95% CI, 12.8%–18.3%). Conclusions: Using Penumbra System for frontline mechanical thrombectomy treatment of patients with large vessel occlusion–acute ischemic stroke in a real-world setting was associated with angiographic, clinical, and safety outcomes that were comparable to prior randomized clinical trials with stringent site and operator selection criteria. Registration: URL: https://www.clinicaltrials.gov ; Unique identifier: NCT03464565.
    Type of Medium: Online Resource
    ISSN: 0039-2499 , 1524-4628
    RVK:
    Language: English
    Publisher: Ovid Technologies (Wolters Kluwer Health)
    Publication Date: 2022
    detail.hit.zdb_id: 1467823-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Wireless Communications and Mobile Computing Vol. 2022 ( 2022-5-6), p. 1-9
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-5-6), p. 1-9
    Abstract: Through the use of blockchain technology, sensitive information may be securely communicated without the need to replicate it, which can assist in decreasing medical record mistakes and saving time by eliminating the need to duplicate information. Furthermore, the information is timestamped, which further enhances the security of the data even further. The deployment of blockchain technology in a range of healthcare situations may enhance the security and efficiency of payment transactions. In this way, only those who have been allowed access to patient medical information can see or modify such information. It is proposed in this study that blockchain technology be used to provide an accessible data storage and retrieval mechanism for patients and healthcare professionals in a healthcare system that is both safe and efficient. As of 1970, a variety of traditional knowledge-based approaches such as Personal Identification Recognition Number (PIRN), passwords, and other similar methods have been made available; however, many token-based approaches such as drivers’ licenses, passports, credit cards, bank accounts, ID cards, and keys have also been made available; however, they have all failed to establish a secure and reliable transaction channel. Because they are easily misplaced, stolen, or lost, they are usually unable to protect secrecy or authenticate the identity of a legitimate claimant. Aside from that, personally identifiable information such as passwords and PINs is very prone to fraud since they are easily forgotten or guessed by an imposter. Biometric identification and authentication (commonly known as biometrics) are attracting a great deal of attention these days, particularly in the realm of information security systems, due to its inherent potential and advantages over other conventional ways for identifying and authenticating. As a result of the device’s unique biological characteristics, which include features such as fingerprints, facepalms, hand geometry (including the iris), and the device’s iris, it can be used in a variety of contexts, such as consumer banking kiosks, airport security systems, international ports of entry, universities, office buildings, and forensics, to name a few. It is also used in several other contexts, including forensics and law enforcement. Consequently, every layer of the system—sensed data, computation, and processing of data, as well as the storage and administration of data—is susceptible to a broad variety of threats and weaknesses (cloud). There does not seem to be any suitable methods for dealing with the large volumes of data created by the fog computing architecture when normal data storage and security technologies are used. Because of this, the major objective of this research is to design security countermeasures against medical data mining vulnerabilities that originate from the sensing layer and data storage in the Internet of Things’ cloud database, both of which are discussed in more depth further down. A key allows for the creation of a distributed ledger database and provides an immutable security solution, transaction transparency, and the prohibition of tampering with patient information. This mechanism is particularly useful in healthcare settings, where patient information must be kept confidential. When used in a hospital environment, this method is extremely beneficial. As a result of incorporating blockchain technology into the fog paradigm, it is possible to alleviate some of the current concerns associated with latency, centralization, and scalability.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Wireless Communications and Mobile Computing Vol. 2022 ( 2022-6-11), p. 1-12
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-6-11), p. 1-12
    Abstract: Clustering, also known as unsupervised learning, is one of the most significant topics of machine learning because it divides data into groups based on similarity with the aim of extracting or summarizing new information. It is one of the most often used machine learning techniques. The most significant problem encountered in this subject is the sheer volume of electronic text documents accessible, which is increasing at an exponential rate, necessitating the development of efficient ways for dealing with these papers. Furthermore, it is not practicable to consolidate all of the papers from numerous locations into a single area for processing. In this study, the primary goal is to enhance the performance of the distributed document clustering approach for clustering big, high-dimensional distributed document datasets. For distributed storage and analysis, one of the most prominent open-source implementations of the big data analytic-based MapReduce model, such as the Hadoop framework, is used in conjunction with a distributed file system and is known as the Hadoop Distributed File System, to achieve the desired results. This necessitates an improvement in the approach of the clustering operation with Elephant Herding Optimization, which will be accomplished by applying a hybridized clustering procedure. In conjunction with the MapReduce framework, this hybridized strategy is able to solve the obstacles associated with the K -means clustering method, including the initial centroids difficulty and the dimensionality problem. In this paper, we analyze the performance of the whole distributed document clustering technique for big document datasets by using a distributed document clustering framework such as Hadoop and the associated MapReduce methodology. In the end, this decides how quickly computations may be completed.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Journal of Healthcare Engineering, Hindawi Limited, Vol. 2022 ( 2022-3-28), p. 1-14
    Abstract: The discipline of computer vision is becoming more popular as a research subject. In a surveillance-based computer vision application, item identification and tracking are the core procedures. They consist of segmenting and tracking an object of interest from a sequence of video frames, and they are both performed using computer vision algorithms. In situations when the camera is fixed and the backdrop remains constant, it is possible to detect items in the background using more straightforward methods. Aerial surveillance, on the other hand, is characterized by the fact that the target, as well as the background and video camera, are all constantly moving. It is feasible to recognize targets in the video data captured by an unmanned aerial vehicle (UAV) using the mean shift tracking technique in combination with a deep convolutional neural network (DCNN). It is critical that the target detection algorithm maintains its accuracy even in the presence of changing lighting conditions, dynamic clutter, and changes in the scene environment. Even though there are several approaches for identifying moving objects in the video, background reduction is the one that is most often used. An adaptive background model is used to create a mean shift tracking technique, which is shown and implemented in this work. In this situation, the background model is provided and updated frame-by-frame, and therefore, the problem of occlusion is fully eliminated from the equation. The target tracking algorithm is fed the same video stream that was used for the target identification algorithm to work with. In MATLAB, the works are simulated, and their performance is evaluated using image-based and video-based metrics to establish how well they operate in the real world.
    Type of Medium: Online Resource
    ISSN: 2040-2309 , 2040-2295
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2545054-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Springer Science and Business Media LLC ; 2012
    In:  Nature Structural & Molecular Biology Vol. 19, No. 5 ( 2012-5), p. 485-491
    In: Nature Structural & Molecular Biology, Springer Science and Business Media LLC, Vol. 19, No. 5 ( 2012-5), p. 485-491
    Type of Medium: Online Resource
    ISSN: 1545-9993 , 1545-9985
    Language: English
    Publisher: Springer Science and Business Media LLC
    Publication Date: 2012
    detail.hit.zdb_id: 2131437-8
    SSG: 12
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Wireless Communications and Mobile Computing Vol. 2022 ( 2022-2-28), p. 1-13
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-2-28), p. 1-13
    Abstract: The level of difficulty that can be envisioned in a cloud data center will not grow with convention. As a result, all hosts should have a standard and pervasive collection of memory and communication characteristics in order to lower ownership costs and operate virtual machine instances. This solution includes fundamental foundations and integrated component basics that will allow an IT or federal agency to embrace cloud computing domestically via private virtual cloud data centers. These private cloud data centers would later be developed to purchase and develop IT services on the outside. They are well aware of the obstacles to cloud computing’s acceptance, including concerns about credibility, privacy, interoperability, and marketplaces. In addition, this procedure describes critical standards and collaborations to address these issues. Ultimately, it offers a coherent response to deploying safe data centers using cloud computing services from both a technological and an IT strategic standpoint. To foster creativity, invention, learning, and enterprise, a private data center and cloud computing must be established to combine the activities of different research teams. In the framework of energy-efficient distribution of resources in private cloud data center architecture, we focus on system structure investigations. On the other hand, we want to equip private cloud providers with the current design and performance analysis for energy-efficient resource allocation. The methodology should be adaptable enough to support a wide range of computing systems, as well as on-demand and extensive resource providing approaches, cloud environment scheduling, and bridging the gap between private cloud users and a complete image of offers.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-5-25), p. 1-9
    Abstract: In analyzing project regressions, automation has emerged as a major agenda in managing changes in software which requires minimum manual intervention. For rapid testing environment, software development processes such as Agile, Scrum, and XP processes depend on continuous integration tools. There is no single tool to handle the project automation, and the main challenge is dependency on multiple tools. The proposed automation tool should support configuration, execution, and debugging facility. Integrating the project automation works such as software configuration management tools Mercurial and Git, job scheduling tools like Jenkins and Apache Continuum, test management tools like TestNG and Selenium need tight integration which is a challenge. The existing PKI infrastructure for access control does not share data among the software tools and processes increasing the complexity when an organization needs to leverage the existing cloud services. The proposed approach optimizes the execution time by taking single CSV with input test case and metadata information and efficiently group and executes the tests automatically. The proposed method includes implementation of security access control mechanism for the jobs execution platform in cloud environment.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    In: Computational Intelligence and Neuroscience, Hindawi Limited, Vol. 2022 ( 2022-3-2), p. 1-7
    Abstract: Sleep apnea is a serious sleep disorder that occurs when a person's breathing is interrupted during sleep. People with untreated sleep apnea stop breathing repeatedly during their sleep. This study provides an empirical analysis of apnea syndrome using the AI-based Granger panel model approach. Data were collected from the MIT-BIH polysomnographic database (SLPDB). The panel is composed of eighteen patients, while the implementation was done using MATLAB software. The results show that, for the eighteen patients with sleep apnea, there was a significant relationship between ECG-blood pressure (BP), ECG-EEG, and EEG-blood pressure (BP). The study concludes that the long-term interaction between physiological signals can help the physician to understand the risks associated with these interactions. The study would assist physicians to understand the mechanisms underlying obstructive sleep apnea early and also to select the right treatment for the patients by leveraging the potential of artificial intelligence. The researchers were motivated by the need to reduce the morbidity and mortality arising from sleep apnea using AI-enabled technology.
    Type of Medium: Online Resource
    ISSN: 1687-5273 , 1687-5265
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2388208-6
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Wiley ; 2018
    In:  Applied Economic Perspectives and Policy Vol. 40, No. 2 ( 2018-06), p. 240-258
    In: Applied Economic Perspectives and Policy, Wiley, Vol. 40, No. 2 ( 2018-06), p. 240-258
    Abstract: We employ a choice experiment to examine producer preferences for contracts to produce a risky bioenergy crop. We develop a framework accounting for subjective risk preferences and perceptions, and heterogeneous status‐quo alternatives. Results indicate that price, biorefinery harvest, and establishment cost‐share have significant positive effects, whereas contract length has a negative effect. We also find evidence of significant heterogeneity in preferences for biorefinery harvest, yield insurance, and contract length. Incorporating subjective risk perception and risk preference information, as well as accounting for heterogeneous status quo alternatives improves overall model performance.
    Type of Medium: Online Resource
    ISSN: 2040-5790 , 2040-5804
    Language: English
    Publisher: Wiley
    Publication Date: 2018
    detail.hit.zdb_id: 2529839-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Springer Science and Business Media LLC ; 2021
    In:  DNP - Der Neurologe & Psychiater Vol. 22, No. 1 ( 2021-02), p. 28-34
    In: DNP - Der Neurologe & Psychiater, Springer Science and Business Media LLC, Vol. 22, No. 1 ( 2021-02), p. 28-34
    Type of Medium: Online Resource
    ISSN: 1616-2455 , 2196-6427
    Language: German
    Publisher: Springer Science and Business Media LLC
    Publication Date: 2021
    detail.hit.zdb_id: 2127222-0
    detail.hit.zdb_id: 3130206-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...