5,973 research outputs found
Utilization of CT scanning associated with complex spine surgery.
BackgroundDue to the risk associated with exposure to ionizing radiation, there is an urgent need to identify areas of CT scanning overutilization. While increased use of diagnostic spinal imaging has been documented, no previous research has estimated the magnitude of follow-up imaging used to evaluate the postoperative spine.MethodsThis retrospective cohort study quantifies the association between spinal surgery and CT utilization. An insurance database (Humana, Inc.) with ≈ 19 million enrollees was employed, representing 8 consecutive years (2007-2014). Surgical and imaging procedures were captured by anatomic-specific CPT codes. Complex surgeries included all cervical, thoracic and lumbar instrumented spine fusions. Simple surgeries included discectomy and laminectomy. Imaging was restricted to CT and MRI. Postoperative imaging frequency extended to 5-years post-surgery.ResultsThere were 140,660 complex spinal procedures and 39,943 discectomies and 49,889 laminectomies. MRI was the predominate preoperative imaging modality for all surgical procedures (median: 80%; range: 73-82%). Postoperatively, CT prevalence following complex procedures increased more than two-fold from 6 months (18%) to 5 years (≥40%), and patients having a postoperative CT averaged two scans. For simple procedures, the prevalence of postoperative CT scanning never exceeded 30%.ConclusionsCT scanning is used frequently for follow-up imaging evaluation following complex spine surgery. There is emerging evidence of an increased cancer risk due to ionizing radiation exposure with CT. In the setting of complex spine surgery, actions to mitigate this risk should be considered and include reducing nonessential scans, using the lowest possible radiation dose protocols, exerting greater selectivity in monitoring the developing fusion construct, and adopting non-ferromagnetic implant biomaterials that facilitate MRI postoperatively
Report on hydraulic model tests for Rihand Dam
CER47-52SDR5.April 1950.Includes bibliographical references.At head of title: United Province, India, Public Works Department, Irrigation Branch
Detecting a conditional extrme value model
In classical extreme value theory probabilities of extreme events are
estimated assuming all the components of a random vector to be in a domain of
attraction of an extreme value distribution. In contrast, the conditional
extreme value model assumes a domain of attraction condition on a
sub-collection of the components of a multivariate random vector. This model
has been studied in
\cite{heffernan:tawn:2004,heffernan:resnick:2007,das:resnick:2008a}.
In this paper we propose three statistics which act as tools to detect this
model in a bivariate set-up. In addition, the proposed statistics also help to
distinguish between two forms of the limit measure that is obtained in the
model.Comment: 21 pages, 4 figure
Dips in Partial Wave Amplitudes from Final State Interactions
We consider the dip-peak structures in the J=0 partial wave amplitudes for
processes \gamma\gamma\rightarrow W^+W^-~
\mbox{and}~\gamma\gamma,gg\rightarrow t\overline{t} taking into account the
corresponding Born term process and the rescattering process where the
intermediate state is rescattered through the exchange of Higgs resonance state
in the direct channel.Comment: 9 pages, CPP-93-21, 6 figures not include
Debris and micrometeorite impact measurements in the laboratory
A method was developed to simulate space debris in the laboratory. This method, which is an outgrowth of research in inertial confinement fusion (ICF), uses laser ablation to accelerate material. Using this method, single 60 micron aluminum spheres were accelerated to 15 km/sec and larger 500 micron aluminum spheres were accelerated to 2 km/sec. Also, many small (less than 10 micron diameter) irregularly shaped particles were accelerated to speeds of 100 km/sec
Advance directives in home health and hospice agencies: United States, 2007
This report provides nationally representative data on policies, storage, and implementation of advance directives (ADs) in home health and hospice (HHH) agencies in the United States using the National Home and Hospice Care Survey. Federally mandated ADs policies were followed in >93% of all agencies. Nearly all agencies stored ADs in a file at the agency, but only half stored them at the patient's residence. Nearly all agencies informed staff about the AD, but only 77% and 72% of home health agencies informed the attending physician and next-of-kin, respectively. Home health and hospice agencies are nearly universally compliant with ADs policies that are required in order to receive Medicare and Medicaid payments, but have much lower rates of adoption of ADs policies beyond federally mandated minimums
Second-order regular variation, convolution and the central limit theorem
AbstractSecond-order regular variation is a refinement of the concept of regular variation which is useful for studying rates of convergence in extreme value theory and asymptotic normality of tail estimators. For a distribution tail 1 − F which possesses second-order regular variation, we discuss how this property is inherited by 1 − F2 and 1 − F∗2. We also discuss the relationship of central limit behavior of tail empirical processes, asymptotic normality of Hill's estimator and second-order regular variation
Bayesian Networks for Max-linear Models
We study Bayesian networks based on max-linear structural equations as
introduced in Gissibl and Kl\"uppelberg [16] and provide a summary of their
independence properties. In particular we emphasize that distributions for such
networks are generally not faithful to the independence model determined by
their associated directed acyclic graph. In addition, we consider some of the
basic issues of estimation and discuss generalized maximum likelihood
estimation of the coefficients, using the concept of a generalized likelihood
ratio for non-dominated families as introduced by Kiefer and Wolfowitz [21].
Finally we argue that the structure of a minimal network asymptotically can be
identified completely from observational data.Comment: 18 page
First exit times of solutions of stochastic differential equations driven by multiplicative Levy noise with heavy tails
In this paper we study first exit times from a bounded domain of a gradient
dynamical system perturbed by a small multiplicative
L\'evy noise with heavy tails. A special attention is paid to the way the
multiplicative noise is introduced. In particular we determine the asymptotics
of the first exit time of solutions of It\^o, Stratonovich and Marcus canonical
SDEs.Comment: 19 pages, 2 figure
Heat Conduction Process on Community Networks as a Recommendation Model
Using heat conduction mechanism on a social network we develop a systematic
method to predict missing values as recommendations. This method can treat very
large matrices that are typical of internet communities. In particular, with an
innovative, exact formulation that accommodates arbitrary boundary condition,
our method is easy to use in real applications. The performance is assessed by
comparing with traditional recommendation methods using real data.Comment: 4 pages, 2 figure
- …