1,599 research outputs found

    Toward a Standardized Strategy of Clinical Metabolomics for the Advancement of Precision Medicine

    Get PDF
    Despite the tremendous success, pitfalls have been observed in every step of a clinical metabolomics workflow, which impedes the internal validity of the study. Furthermore, the demand for logistics, instrumentations, and computational resources for metabolic phenotyping studies has far exceeded our expectations. In this conceptual review, we will cover inclusive barriers of a metabolomics-based clinical study and suggest potential solutions in the hope of enhancing study robustness, usability, and transferability. The importance of quality assurance and quality control procedures is discussed, followed by a practical rule containing five phases, including two additional "pre-pre-" and "post-post-" analytical steps. Besides, we will elucidate the potential involvement of machine learning and demonstrate that the need for automated data mining algorithms to improve the quality of future research is undeniable. Consequently, we propose a comprehensive metabolomics framework, along with an appropriate checklist refined from current guidelines and our previously published assessment, in the attempt to accurately translate achievements in metabolomics into clinical and epidemiological research. Furthermore, the integration of multifaceted multi-omics approaches with metabolomics as the pillar member is in urgent need. When combining with other social or nutritional factors, we can gather complete omics profiles for a particular disease. Our discussion reflects the current obstacles and potential solutions toward the progressing trend of utilizing metabolomics in clinical research to create the next-generation healthcare system.11Ysciescopu

    Surveying Persons with Disabilities: A Source Guide (Version 1)

    Get PDF
    As a collaborator with the Cornell Rehabilitation Research and Training Center on Disability Demographics and Statistics, Mathematica Policy Research, Inc. has been working on a project that identifies the strengths and limitations in existing disability data collection in both content and data collection methodology. The intended outcomes of this project include expanding and synthesizing knowledge of best practices and the extent existing data use those practices, informing the development of data enhancement options, and contributing to a more informed use of existing data. In an effort to provide the public with an up-to-date and easily accessible source of research on the methodological issues associated with surveying persons with disabilities, MPR has prepared a Source Guide of material related to this topic. The Source Guide contains 150 abstracts, summaries, and references, followed by a Subject Index, which cross references the sources from the Reference List under various subjects. The Source Guide is viewed as a “living document,” and will be periodically updated

    Enhancing System Transparency, Trust, and Privacy with Internet Measurement

    Full text link
    While on the Internet, users participate in many systems designed to protect their information’s security. Protection of the user’s information can depend on several technical properties, including transparency, trust, and privacy. Preserving these properties is challenging due to the scale and distributed nature of the Internet; no single actor has control over these features. Instead, the systems are designed to provide them, even in the face of attackers. However, it is possible to utilize Internet measurement to better defend transparency, trust, and privacy. Internet measurement allows observation of many behaviors of distributed, Internet-connected systems. These new observations can be used to better defend the system they measure. In this dissertation, I explore four contexts in which Internet measurement can be used to the aid of end-users in Internet-centric, adversarial settings. First, I improve transparency into Internet censorship practices by developing new Internet measurement techniques. Then, I use Internet measurement to enable the deployment of end-to-middle censorship circumvention techniques to a half-million users. Next, I evaluate transparency and improve trust in the Web public-key infrastructure by combining Internet measurement techniques and using them to augment core components of the Web public-key infrastructure. Finally, I evaluate browser extensions that provide privacy to users on the web, providing insight for designers and simple recommendations for end-users. By focusing on end-user concerns in widely deployed systems critical to end-user security and privacy, Internet measurement enables improvements to transparency, trust, and privacy.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/163199/1/benvds_1.pd

    Bridges Structural Health Monitoring and Deterioration Detection Synthesis of Knowledge and Technology

    Get PDF
    INE/AUTC 10.0

    Multi-Axis Machining Project Development

    Get PDF
    Multi-axis milling is a manufacturing material removal process in which computer numerically controlled (CNC) tools cut away excess material through movement in four or more axes. Compared to traditional three-axis machining, multi-axis machining greatly increases the capability and accuracy of the CNC machining processes by reducing the amount of operations required to completely machine a part. Currently, the Industrial and Manufacturing Engineering Department at Cal Poly lacks an advanced CNC class that incorporates fourth and fifth axis CNC machining in the curriculum. This report describes the process behind creating a project for such a class. The class will demonstrate the increased capability of multi-axis machining through a multi-axis positioning machining project. To create the project for the class, a demo part was designed on SolidWorks to be machined on a multi-axis CNC mill. The part required initial operations to create a machining blank and workholding for the multi-axis mill, so these items were developed prior to the fabrication of the part. Each operation required a computer-aided design, computer-aided manufacturing, post-processing files, and engineering documentation. The project resulted in a multi-sided demonstration part that reflects the increased capabilities of fourth and fifth axis machining to be used in a class project in Cal Poly’s IME 336 Computer Aided Manufacturing II course

    Management of electronic information

    Get PDF

    Remy: AR Assisted Cooking

    Get PDF
    Our project introduces the concept of “detached monitoring” in a context-adaptive cooking system. The system has two parts: the Rat, a device mounted above the stove and the Hat, an augmented reality (AR) headset worn by the user. The Rat provides information about the user\u27s actions and the food being cooked. This information, combined with information from the Hat, is used to determine the user\u27s context. Instructions and status information are then embedded in the user\u27s environment via the Hat. The system was piloted with 7 participants in a kitchen setting. The results indicated that users found the tasks easier the more detached monitoring it incorporated, and, overall, found detached monitoring to be intuitive

    A Study of Very Short Intermittent DDoS Attacks on the Performance of Web Services in Clouds

    Get PDF
    Distributed Denial-of-Service (DDoS) attacks for web applications such as e-commerce are increasing in size, scale, and frequency. The emerging elastic cloud computing cannot defend against ever-evolving new types of DDoS attacks, since they exploit various newly discovered network or system vulnerabilities even in the cloud platform, bypassing not only the state-of-the-art defense mechanisms but also the elasticity mechanisms of cloud computing. In this dissertation, we focus on a new type of low-volume DDoS attack, Very Short Intermittent DDoS Attacks, which can hurt the performance of web applications deployed in the cloud via transiently saturating the critical bottleneck resource of the target systems by means of external attack HTTP requests outside the cloud or internal resource contention inside the cloud. We have explored external attacks by modeling the n-tier web applications with queuing network theory and implementing the attacking framework based-on feedback control theory. We have explored internal attacks by investigating and exploiting resource contention and performance interference to locate a target VM (virtual machine) and degrade its performance

    The capture and integration of construction site data

    Get PDF
    The use of mobile computing on the construction site has been a well-researched area since the early 1990’s, however, there still remains a lack of computing on the construction site. Where computers are utilised on the site this tends to be by knowledge workers utilising a laptop or PC in the site office with electronic data collection being the exception rather than the norm. The problems associated with paper-based documentation on the construction site have long been recognised (Baldwin, et al, 1994; McCullough, 1993) yet there still seems to be reluctance to replace this with electronic alternatives. Many reasons exist for this such as; low profit margins, perceived high cost; perceived lack of available hardware and perceived inability of the workforce. However, the benefits that can be gained from the successful implementation of IT on the construction site and the ability to re-use construction site data to improve company performance, whilst difficult to cost, are clearly visible. This thesis represents the development and implementation of a data capture system for the management of the construction of rotary bored piles (SHERPA). Operated by the site workforce, SHERPA comprises a wireless network, site-based server and webbased data capture using tablet computers. This research intends to show that mobile computing technologies can be implemented on the construction site and substantial benefits can be gained for the company from the re-use and integration of the captured site data
    corecore