281 research outputs found

    Status of Airway Reactivity among Small Airway Diseases with Regular Users Substance Abuse of Inhaling Opium; Preliminary Results of a Survey of Indirect Provocation Test

    Get PDF
    Background:Opium is an oldest recreational abuse substance with dependency.  Small airway diseases (SAD) were established within opium user’s population.  Bronchial hyper-responsiveness (BHR) reflects airway reactivity and inflammation. Opium can induce airway inflammation and following airway reactivity.The objective of the study assessed status of BHR among SAD with regular inhaled opium users. It performed with hypertonic normal saline provocation challenge test.Methods: Target population enrolled among SAD with inhaled regular opium users. In the next step, standard hypertonic normal saline provocation test carried out on the sample study.Results:A total of 46 subjects followed the study. The mean age±SD was 50.1±1.2 years, with median 48 years. 91% of those were male. A positive result of BHR was distributed more frequently in thechronic obstructive pulmonary disease(COPD) with the asthma phenotype.  In addition, it was more market in the youngest and advanced age classes equally.Conclusion:hypertonic normal saline provocation test result was quite noticeable between regular inhaled opium users. BHR was detected more frequently in COPD with asthma phenotype, COPD, chronic bronchitis, and bronchial asthma disease, respectively. The outcome indirectly revealedthat there was a relation between airway inflammation and opium inhalation in population. It may be reflected an added effect on the predisposing risk factors of induced airway inflammation and hyperreactivity of airway in target populations

    A Review of Applicability of Banning (Hajre) in Jurisprudence from the Perspective of Forensic Medicine

    Get PDF
    The topic of ward is among the important topics in jurisprudence and Forensic Medicine. Banning literally means prohibiting. The term of prohibition means preventing someone from being involved in financial or non-financial affairs and is called being banned. A person is banned from all affairs such as an unlettered person or some of the affairs such as a dying person. Banning has two forms; it sometimes is in the interests of the one banned from and his/her rights and sometimes for the benefit and the right of others. The objective of this brief article is an evaluation of extent banning applicability in Forensic Medicine topics and its relation with concepts and logics of the Islamic law

    Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation

    Get PDF
    Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. Methods We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. Results The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. Conclusions The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians

    A Systematic Review of Re-Identification Attacks on Health Data

    Get PDF
    Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods.Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013.The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods

    Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods and C functions

    Get PDF
    Measuring the internal quality of source code is one of the traditional goals of making software development into an engineering discipline. Cyclomatic Complexity (CC) is an often used source code quality metric, next to Source Lines of Code (SLOC). However, the use of the CC metric is challenged by the repeated claim that CC is redundant with respect to SLOC due to strong linear correlation. We conducted an extensive literature study of the CC/SLOC correlation results. Next, we tested correlation on large Java (17.6 M methods) and C (6.3 M functions) corpora. Our results show that linear correlation between SLOC and CC is only moderate as caused by increasingly high variance. We further observe that aggregating CC and SLOC as well as performing a power transform improves the correlation. Our conclusion is that the observed linear correlation between CC and SLOC of Java methods or C functions is not strong enough to conclude that CC is redundant with SLOC. This conclusion contradicts earlier claims from literature, but concurs with the widely accepted practice of measuring of CC next to SLOC

    A comparison of weather variables linked to infectious disease patterns using laboratory addresses and patient residence addresses

    Get PDF
    Background: To understand the impact of weather on infectious diseases, information on weather parameters at patient locations is needed, but this is not always accessible due to confidentiality or data availability. Weather parameters at nearby locations are often used as a proxy, but the accuracy of this practice is not known. Methods: Daily Campylobacter and Cryptosporidium cases across England and Wales were linked to local temperature and rainfall at the residence postcodes of the patients and at the corresponding postcodes of the laboratory where the patient’s specimen was tested. The paired values of daily rainfall and temperature for the laboratory versus residence postcodes were interpolated from weather station data, and the results were analysed for agreement using linear regression. We also assessed potential dependency of the findings on the relative geographic distance between the patient’s residence and the laboratory. Results: There was significant and strong agreement between the daily values of rainfall and temperature at diagnostic laboratories with the values at the patient residence postcodes for samples containing the pathogens Campylobacter or Cryptosporidium. For rainfall, the R-squared was 0.96 for the former and 0.97 for the latter, and for maximum daily temperature, the R-squared was 0.99 for both. The overall mean distance between the patient residence and the laboratory was 11.9 km; however, the distribution of these distances exhibited a heavy tail, with some rare situations where the distance between the patient residence and the laboratory was larger than 500 km. These large distances impact the distributions of the weather variable discrepancies (i.e. the differences between weather parameters estimated at patient residence postcodes and those at laboratory postcodes), with discrepancies up to ±10 °C for the minimum and maximum temperature and 20 mm for rainfall. Nevertheless, the distributions of discrepancies (estimated separately for minimum and maximum temperature and rainfall), based on the cases where the distance between the patient residence and the laboratory was within 20 km, still exhibited tails somewhat longer than the corresponding exponential fits suggesting modest small scale variations in temperature and rainfall. Conclusion: The findings confirm that, for the purposes of studying the relationships between meteorological variables and infectious diseases using data based on laboratory postcodes, the weather results are sufficiently similar to justify the use of laboratory postcode as a surrogate for domestic postcode. Exclusion of the small percentage of cases where there is a large distance between the residence and the laboratory could increase the precision of estimates, but there are generally strong associations between daily weather parameters at residence and laboratory

    Measurement of high-p_T Single Electrons from Heavy-Flavor Decays in p+p Collisions at sqrt(s) = 200 GeV

    Get PDF
    The momentum distribution of electrons from decays of heavy flavor (charm and beauty) for midrapidity |y| < 0.35 in p+p collisions at sqrt(s) = 200 GeV has been measured by the PHENIX experiment at the Relativistic Heavy Ion Collider (RHIC) over the transverse momentum range 0.3 < p_T < 9 GeV/c. Two independent methods have been used to determine the heavy flavor yields, and the results are in good agreement with each other. A fixed-order-plus-next-to-leading-log pQCD calculation agrees with the data within the theoretical and experimental uncertainties, with the data/theory ratio of 1.72 +/- 0.02^stat +/- 0.19^sys for 0.3 < p_T < 9 GeV/c. The total charm production cross section at this energy has also been deduced to be sigma_(c c^bar) = 567 +/- 57^stat +/- 224^sys micro barns.Comment: 375 authors from 57 institutions, 6 pages, 3 figures. Submitted to Physical Review Letters. Plain text data tables for the points plotted in figures for this and previous PHENIX publications are (or will be) publicly available at http://www.phenix.bnl.gov/papers.htm
    • …
    corecore