5,946 research outputs found

    Utilization of CT scanning associated with complex spine surgery.

    Get PDF
    BackgroundDue to the risk associated with exposure to ionizing radiation, there is an urgent need to identify areas of CT scanning overutilization. While increased use of diagnostic spinal imaging has been documented, no previous research has estimated the magnitude of follow-up imaging used to evaluate the postoperative spine.MethodsThis retrospective cohort study quantifies the association between spinal surgery and CT utilization. An insurance database (Humana, Inc.) with ≈ 19 million enrollees was employed, representing 8 consecutive years (2007-2014). Surgical and imaging procedures were captured by anatomic-specific CPT codes. Complex surgeries included all cervical, thoracic and lumbar instrumented spine fusions. Simple surgeries included discectomy and laminectomy. Imaging was restricted to CT and MRI. Postoperative imaging frequency extended to 5-years post-surgery.ResultsThere were 140,660 complex spinal procedures and 39,943 discectomies and 49,889 laminectomies. MRI was the predominate preoperative imaging modality for all surgical procedures (median: 80%; range: 73-82%). Postoperatively, CT prevalence following complex procedures increased more than two-fold from 6 months (18%) to 5 years (≥40%), and patients having a postoperative CT averaged two scans. For simple procedures, the prevalence of postoperative CT scanning never exceeded 30%.ConclusionsCT scanning is used frequently for follow-up imaging evaluation following complex spine surgery. There is emerging evidence of an increased cancer risk due to ionizing radiation exposure with CT. In the setting of complex spine surgery, actions to mitigate this risk should be considered and include reducing nonessential scans, using the lowest possible radiation dose protocols, exerting greater selectivity in monitoring the developing fusion construct, and adopting non-ferromagnetic implant biomaterials that facilitate MRI postoperatively

    Report on hydraulic model tests for Rihand Dam

    Get PDF
    CER47-52SDR5.April 1950.Includes bibliographical references.At head of title: United Province, India, Public Works Department, Irrigation Branch

    Detecting a conditional extrme value model

    Full text link
    In classical extreme value theory probabilities of extreme events are estimated assuming all the components of a random vector to be in a domain of attraction of an extreme value distribution. In contrast, the conditional extreme value model assumes a domain of attraction condition on a sub-collection of the components of a multivariate random vector. This model has been studied in \cite{heffernan:tawn:2004,heffernan:resnick:2007,das:resnick:2008a}. In this paper we propose three statistics which act as tools to detect this model in a bivariate set-up. In addition, the proposed statistics also help to distinguish between two forms of the limit measure that is obtained in the model.Comment: 21 pages, 4 figure

    Dips in Partial Wave Amplitudes from Final State Interactions

    Full text link
    We consider the dip-peak structures in the J=0 partial wave amplitudes for processes \gamma\gamma\rightarrow W^+W^-~ \mbox{and}~\gamma\gamma,gg\rightarrow t\overline{t} taking into account the corresponding Born term process and the rescattering process where the intermediate state is rescattered through the exchange of Higgs resonance state in the direct channel.Comment: 9 pages, CPP-93-21, 6 figures not include

    Debris and micrometeorite impact measurements in the laboratory

    Get PDF
    A method was developed to simulate space debris in the laboratory. This method, which is an outgrowth of research in inertial confinement fusion (ICF), uses laser ablation to accelerate material. Using this method, single 60 micron aluminum spheres were accelerated to 15 km/sec and larger 500 micron aluminum spheres were accelerated to 2 km/sec. Also, many small (less than 10 micron diameter) irregularly shaped particles were accelerated to speeds of 100 km/sec

    Advance directives in home health and hospice agencies: United States, 2007

    Get PDF
    This report provides nationally representative data on policies, storage, and implementation of advance directives (ADs) in home health and hospice (HHH) agencies in the United States using the National Home and Hospice Care Survey. Federally mandated ADs policies were followed in >93% of all agencies. Nearly all agencies stored ADs in a file at the agency, but only half stored them at the patient's residence. Nearly all agencies informed staff about the AD, but only 77% and 72% of home health agencies informed the attending physician and next-of-kin, respectively. Home health and hospice agencies are nearly universally compliant with ADs policies that are required in order to receive Medicare and Medicaid payments, but have much lower rates of adoption of ADs policies beyond federally mandated minimums

    Second-order regular variation, convolution and the central limit theorem

    Get PDF
    AbstractSecond-order regular variation is a refinement of the concept of regular variation which is useful for studying rates of convergence in extreme value theory and asymptotic normality of tail estimators. For a distribution tail 1 − F which possesses second-order regular variation, we discuss how this property is inherited by 1 − F2 and 1 − F∗2. We also discuss the relationship of central limit behavior of tail empirical processes, asymptotic normality of Hill's estimator and second-order regular variation

    Bayesian Networks for Max-linear Models

    Full text link
    We study Bayesian networks based on max-linear structural equations as introduced in Gissibl and Kl\"uppelberg [16] and provide a summary of their independence properties. In particular we emphasize that distributions for such networks are generally not faithful to the independence model determined by their associated directed acyclic graph. In addition, we consider some of the basic issues of estimation and discuss generalized maximum likelihood estimation of the coefficients, using the concept of a generalized likelihood ratio for non-dominated families as introduced by Kiefer and Wolfowitz [21]. Finally we argue that the structure of a minimal network asymptotically can be identified completely from observational data.Comment: 18 page

    First exit times of solutions of stochastic differential equations driven by multiplicative Levy noise with heavy tails

    Full text link
    In this paper we study first exit times from a bounded domain of a gradient dynamical system Y˙t=U(Yt)\dot Y_t=-\nabla U(Y_t) perturbed by a small multiplicative L\'evy noise with heavy tails. A special attention is paid to the way the multiplicative noise is introduced. In particular we determine the asymptotics of the first exit time of solutions of It\^o, Stratonovich and Marcus canonical SDEs.Comment: 19 pages, 2 figure

    Heat Conduction Process on Community Networks as a Recommendation Model

    Get PDF
    Using heat conduction mechanism on a social network we develop a systematic method to predict missing values as recommendations. This method can treat very large matrices that are typical of internet communities. In particular, with an innovative, exact formulation that accommodates arbitrary boundary condition, our method is easy to use in real applications. The performance is assessed by comparing with traditional recommendation methods using real data.Comment: 4 pages, 2 figure
    corecore