5,391 research outputs found

    Neural plasticity in common forms of chronic headaches

    Get PDF
    Headaches are universal experiences and among the most common disorders. While headache may be physiological in the acute setting, it can become a pathological and persistent condition.The mechanisms underlying the transition from episodic to chronic pain have been the subject of intense study. Using physiological and imaging methods, researchers have identified a number of different forms of neural plasticity associated with migraine and other headaches, including peripheral and central sensitization, and alterations in the endogenous mechanisms of pain modulation. While these changes have been proposed to contribute to headache and pain chronification, some findings are likely the results of repetitive noxious stimulation, such as atrophy of brain areas involved in pain perception and modulation. In this review, we provide a narrative overview of recent advances on the neuroimaging, electrophysiological and genetic aspects of neural plasticity associated with the most common forms of chronic headaches, including migraine, cluster headache, tension-type headache, and medication overuse headache

    Merged Search Algorithms for Radio Frequency Identification Anticollision

    Get PDF
    Nowadays, the Radio Frequency Identification (RFID) system enables the control of many devices over an open communication infrastructure ranging from a small home area network to the global Internet. Moreover, a variety of consumer products are tagged with remotely low-cost readable identification electromagnetic tags to replace Bar Codes. Applications such as automatic object tracking, inventory and supply chain management, and Web appliances were adopted for years in many companies. The arbitration algorithm for RFID system is used to arbitrate all the tags to avoid the collision problem with the existence of multiple tags in the interrogation field of a transponder. A splitting algorithm which is called Binary Search Tree (BST) is well known for multitags arbitration. In the current study, a splitting-based schema called Merged Search Tree is proposed to capture identification codes correctly for anticollision. Performance of the proposed algorithm is compared with the original BST according to time and power consumed during the arbitration process. The results show that the proposed model can reduce searching time and power consumed to achieve a better performance arbitration

    A self-evaluation system of quality planning for tourist attractions in Taiwan: an integrated AHP-Delphi approach from career professionals

    Get PDF
    This study seeks to identify a set of key indicators along with weightings for tourist attractions in Taiwan, and develop a quality management self-evaluation mechanism for tourism businesses, using an advanced integrated Analytic Hierarchy Process and Delphi (AHP-Delphi) approach derived from the supply side perspective. This research study comprises two phases: (1) Delphi method analysis that involves 17 experts, providing confirmation about the evaluation criteria; and (2) Analytical Hierarchical Process (AHP) method which aims to allocate weightings to the evaluation criteria from the experts. Findings from the Delphi method analysis revealed the acceptance of two dimensions, six sub-dimensions and 17 indicators as key evaluation criteria. The AHP method analysis indicated that the most significant dimension was managing quality, with tourism services and public sector facilities being the most important sub-dimension and indicator respectively. The self-evaluation mechanism proposed in this planning perspectives can assist tourism businesses and national/regional Destination Management Organization to identify quality management problems and possible ways of enhancing quality tourism, so that tourism experience, and tourist’s satisfaction can be further improved effectively between the conflicting views by career professionals

    Supporting Service Management with Service Encounters Analysis: A Case on Call Centre Outsourcing Operations

    Get PDF
    Background. A service encounter is the moment that a client directly interacts with a service firm. It is a social-oriented activity that an in-depth analysis of how the client behaved can contribute to the service quality. Objective. The primary objective of this study was to cluster the CLT into groups. The secondary objective was to discover the sequence of question types that asked in each group. Method. A real world call centre outsourcing practice and data mining techniques are used to discover client behaviour. Results. A total of 100,703 inbound calls from the call centre operational database are analyzed. 90.4% of the total calls were made by 85% of clients who used up to three business applications. 72.03% of the total calls were made by a group of clients who involved two to five question types. The clients were clustered into four groups by three behaviour variables. The sequences discovered in this study were mainly on two question types. Conclusion. The service encounter is a complex business process that an integrated perspective should be taken to analyze the dynamics among the entities involved. The client behaviour can be discovered and used as the feedback information for turning the operations in different organizational levels

    Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach

    Full text link
    Abstract. Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now cre-ate polymorphic phishing pages to breach the defense of those detectors. We call this kind of countermeasure phishing page polymorphism. Poly-morphic pages are visually similar to genuine pages they try to mimic, but they use different representation techniques. It increases the level of difficulty to detect phishing pages. In this paper, we propose an effective detection mechanism to detect polymorphic phishing pages. In contrast to existing approaches, we analyze the layout of webpages rather than the HTML codes, colors, or content. Specifically, we compute the sim-ilarity degree of a suspect page and an authentic page through image processing techniques. Then, the degrees of similarity are ranked by a classifier trained to detect phishing pages. To verify the efficacy of our phishing detection mechanism, we collected 6, 750 phishing pages and 312 mimicked targets for the performance evaluation. The results show that our method achieves an excellent detection rate of 99.6%.
    corecore