6,522 research outputs found
In vitro determination of hemoglobin A1c for diabetes diagnosis and management: technology update
It is fascinating to consider the analytical improvements that have occurred since glycated hemoglobin was first used in routine clinical laboratories for diabetes monitoring around 1977; at that time methods displayed poor precision, there were no calibrators or material with assayed values for quality control purposes. This review outlines the major improvements in hemoglobin A1c (HbA1c) measurement that have occurred since its introduction, and reflects on the increased importance of this hemoglobin fraction in the monitoring of glycemic control. The use of HbA1c as a diagnostic tool is discussed in addition to its use in monitoring the patient with diabetes; the biochemistry of HbA1c formation is described, and how these changes to the hemoglobin molecule have been used to develop methods to measure this fraction. Standardization of HbA1c is described in detail; the development of the IFCC Reference Measurement Procedure for HbA1c has enabled global standardization to be achieved which has allowed global targets to be set for glycemic control and diagnosis. The importance of factors that may interfere in the measurement of HbA1c are highlighted
On trust and privacy in context-aware systems
Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit
Trust-based model for privacy control in context aware systems
In context-aware systems, there is a high demand on providing privacy solutions to users when they are interacting and exchanging personal information. Privacy in this context encompasses reasoning about trust and risk involved in interactions between users. Trust, therefore, controls the amount of information that can be revealed, and risk analysis allows us to evaluate the expected benefit that would motivate users to participate in these interactions. In this paper, we propose a trust-based model for privacy control in context-aware systems based on incorporating trust and risk. Through this approach, it is clear how to reason about trust and risk in designing and implementing context-aware systems that provide mechanisms to protect users' privacy. Our approach also includes experiential learning mechanisms from past observations in reaching better decisions in future interactions. The outlined model in this paper serves as an attempt to solve the concerns of privacy control in context-aware systems. To validate this model, we are currently applying it on a context-aware system that tracks users' location. We hope to report on the performance evaluation and the experience of implementation in the near future
Privacy, security, and trust issues in smart environments
Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning
Numerical modelling of the lobes of radio galaxies in cluster environments -- IV. Remnant radio galaxies
© 2019 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society.We examine the remnant phase of radio galaxies using three-dimensional hydrodynamical simulations of relativistic jets propagating through cluster environments. By switching the jets off once the lobes have reached a certain length we can study how the energy distribution between the lobes and shocked intra-cluster medium compares to that of an active source, as well as calculate synchrotron emission properties of the remnant sources. We see that as a result of disturbed cluster gas beginning to settle back into the initial cluster potential, streams of dense gas are pushed along the jet axis behind the remnant lobes, causing them to rise out of the cluster faster than they would due to buoyancy. This leads to increased adiabatic losses and a rapid dimming. The rapid decay of total flux density and surface brightness may explain the small number of remnant sources found in samples with a high flux density limit and may cause analytic models to overestimate the remnant fraction expected in sensitive surveys such as those now being carried out with LOFAR.Peer reviewedFinal Accepted Versio
A study of characteristics of intercity transportation systems. Phase 1: Definition of transportation comparison methodology
Decision making in early transportation planning must be responsive to complex value systems representing various policies and objectives. The assessment of alternative transportation concepts during the early initial phases of the system life cycle, when supportive research and technology development activities are defined, requires estimates of transportation, environmental, and socio-economic impacts throughout the system life cycle, which is a period of some 40 or 50 years. A unified methodological framework for comparing intercity passenger and freight transportation systems is described and is extended to include the comparison of long term transportation trends arising from implementation of the various R & D programs. The attributes of existing and future transportation systems are reviewed in order to establish measures for comparison, define value functions, and attribute weightings needed for comparing alternative policy actions for furthering transportation goals. Comparison criteria definitions and an illustrative example are included
The SECURE collaboration model
The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems
Rings and Jets around PSR J2021+3651: the `Dragonfly Nebula'
We describe recent Chandra ACIS observations of the Vela-like pulsar PSR
J2021+3651 and its pulsar wind nebula (PWN). This `Dragonfly Nebula' displays
an axisymmetric morphology, with bright inner jets, a double-ridged inner
nebula, and a ~30" polar jet. The PWN is embedded in faint diffuse emission: a
bow shock-like structure with standoff ~1' brackets the pulsar to the east and
emission trails off westward for 3-4'. Thermal (kT=0.16 +/-0.02 keV) and power
law emission are detected from the pulsar. The nebular X-rays show spectral
steepening from Gamma=1.5 in the equatorial torus to Gamma=1.9 in the outer
nebula, suggesting synchrotron burn-off. A fit to the `Dragonfly' structure
suggests a large (86 +/-1 degree) inclination with a double equatorial torus.
Vela is currently the only other PWN showing such double structure. The >12 kpc
distance implied by the pulsar dispersion measure is not supported by the X-ray
data; spectral, scale and efficiency arguments suggest a more modest 3-4 kpc.Comment: 22 pages, 5 figures, 3 tables, Accepted to Ap
Computer-aided display control Final report
Human composition and modification of computer driven cathode ray tube displa
- …
