首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 215 毫秒
1.
The depth of anesthesia estimation has been of great interest in recent decades. In this paper, we present a new methodology to quantify the levels of consciousness. Our algorithm takes advantage of the fractal and self-similarity properties of the electroencephalogram (EEG) signal. We have studied the effect of anesthetic agents on the rate of the signal fluctuations. By translating these fluctuations with detrended fluctuation analysis (DFA) algorithm to fractal exponent, we could describe the dynamics of brain during anesthesia. We found the optimum fractal-scaling exponent by selecting the best domain of box sizes, which have meaningful changes with different depth of anesthesia.Experimental results confirm that the optimal fractal-scaling exponent on the raw EEG data can clearly discriminate between awake to moderate and deep anesthesia levels and have robust relation with the well-known depth of anesthesia index (BIS). When the patient's cerebral states change from awake to moderate and deep anesthesia, the fractal-scaling exponent increases from 0.8 to 2 approximately. Moreover, our new algorithm significantly reduces computational complexity and produces faster reaction to transients in patients’ consciousness levels compared to other algorithms and technologies.  相似文献   

2.
In the online health community, the doctor-patient interaction is one of the most important functional modules. A large volume of unstructured text data has been generated in the doctor-patient interaction process. This development is worth exploring. In this paper, we mainly explore the influences of online doctor-patient interaction content on patient satisfaction. We collected the online doctor-patient interaction text data from a big online health community (http://haodf.com) in China from January 2015 to December 2016, followed by the use of text mining and econometrics to test our hypotheses. The results indicate that the patient's activeness has a positive effect on a doctor's informational and emotional support. Furthermore, both a doctor's informational and emotional support are known to have a positive effect on patient satisfaction. More significantly, the effect of emotional support on patient satisfaction is more significant than that of informational support. In addition, the patient's disease severity strengthens the link between a doctor's informational and emotional support and that of patient satisfaction. This study has far-reaching significance for a better understanding of the doctor-patient interaction mechanism.  相似文献   

3.
Surveillance cameras have a plethora of usages in newly born cities including smart traffic, healthcare, monitoring, and meeting security needs. One of the most famous new cites is the Egypt's new administration capital “New Cairo”. The new administration capital of Egypt mainly characterizes with the green life style via the "Green River ". In this paper, a new enhanced Artificial Intelligence (AI) algorithm is introduced for adjusting the orientation of Pan–Tilt–Zoom (PTZ) surveillance cameras in new Cairo. In other words, the new proposed algorithm is used for improving the field of view (FOV) coverage of PTZ cameras network. For validating the proposed algorithm, it is tested on many scenarios with different criterions. After that, the proposed algorithm is applied to adjust the PTZ monitoring cameras in the green river which locates on new administrative capital as an equivalent to the river Nile. In addition, it compared with several other AI algorithms through the appropriate statistical analysis. The overall experimental results indicate the prosperity of the proposed algorithm for increasing the coverage of the PTZ surveillance system.  相似文献   

4.
Depression is one of the most common mental health problems worldwide. The diagnosis of depression is usually done by clinicians based on mental status questionnaires and patient's self-reporting. Not only do these methods highly depend on the current mood of the patient, but also people who experience mental illness are often reluctantly seeking help. Social networks have become a popular platform for people to express their feelings and thoughts with friends and family. With the substantial amount of data in social networks, there is an opportunity to try designing novel frameworks to identify those at risk of depression. Moreover, such frameworks can provide clinicians and hospitals with deeper insights about depressive behavioral patterns, thereby improving diagnostic process. In this paper, we propose a big data analytics framework to detect depression for users of social networks. In addition to syntactic and syntax features, it focuses on pragmatic features toward modeling the intention of users. User intention represents the true motivation behind social network behaviors. Moreover, since the behaviors of user's friends in the network are believed to have an influence on the user, the framework also models the influence of friends on the user's mental states. We evaluate the performance of the proposed framework on a massive real dataset obtained from Facebook and show that the framework outperforms existing methods for diagnosing user-level depression in social networks.  相似文献   

5.
A novel analytical algorithm called Principal Discriminative Component Analysis (PDCA) is proposed to implement just-in-time feature extraction, so that the deviation between the online monitored data and the normal operating dataset can be timely uncovered. Instead of extracting representative signature inherited in the dataset given from the normal operating condition, the PDCA algorithm can always force the extracted latent features to be extremely discriminative to the inconsistency between the online sampled data and the given dataset. Therefore, the application of the PDCA algorithm in Multi-variate Statistical Process Monitoring (MSPM) can consistently guarantee its salient efficiency in contrast to the counterparts. The superiority and effectiveness of the PDCA-based MSPM approach are demonstrated through comparisons in monitoring both static and dynamic processes.  相似文献   

6.
The advent of new information technology has radically changed the end-user computing environment over the past decade. To enhance their management decision-making capability, many organizations have made significant investments in business intelligence (BI) systems. The realization of business benefits from BI investments depends on supporting effective use of BI systems and satisfying their end user requirements. Even though a lot of attention has been paid to the decision-making benefits of BI systems in practice, there is still a limited amount of empirical research that explores the nature of end-user satisfaction with BI systems. End-user satisfaction and system usage have been recognized by many researchers as critical determinants of the success of information systems (IS). As an increasing number of companies have adopted BI systems, there is a need to understand their impact on an individual end-user's performance. In recent years, researchers have considered assessing individual performance effects from IS use as a key area of concern. Therefore, this study aims to empirically test a framework identifying the relationships between end-user computing satisfaction (EUCS), system usage, and individual performance. Data gathered from 330 end users of BI systems in the Taiwanese electronics industry were used to test the relationships proposed in the framework using the structural equation modeling approach. The results provide strong support for our model. Our results indicate that higher levels of EUCS can lead to increased BI system usage and improved individual performance, and that higher levels of BI system usage will lead to higher levels of individual performance. In addition, this study's findings, consistent with DeLone and McLean's IS success model, confirm that there exists a significant positive relationship between EUCS and system usage. Theoretical and practical implications of the findings are discussed.  相似文献   

7.
以航海英语听力评估训练课程为例,论述了使用Moodle课程管理平台,建设公共机房学习资源的方法,为自主学习资源的建设和开发提供了一个切实可行的模式。  相似文献   

8.
Annemarie Jutel 《Endeavour》2021,45(1-2):100764
One common contemporary usage of the term “diagnostic uncertainty” is to refer to cases for which a diagnosis is not, or cannot, be applied to the presenting case. This is a paradoxical usage, as the absence of diagnosis is often as close to a certainty as can be a human judgement. What makes this sociologically interesting is that it represents an “epistemic defence,” or a means of accounting for a failure of medicine’s explanatory system. This system is based on diagnosis, or the classification of individual complaints into recognizable diagnostic categories. Diagnosis is pivotal to medicine’s epistemic setting, for it purports to explain illness via diagnosis, and yet is not always able to do so. This essay reviews this paradoxical use, and juxtaposes it to historical explanations for non-diagnosable illnesses. It demonstrates how representing non-diagnosis as uncertainty protects the epistemic setting by positioning the failure to locate a diagnosis in the individual, rather than in the medical paradigm.  相似文献   

9.
本文论述了Web用户访问模式挖掘中的数据预处理,主要提出了数据预处理中如何识别会话的一种改进算法。该方法通过使用三个因素来构造会话:①根据先验知识,确定会话时间阈值识别会话;②根据页面访问时间统计分布,确定相邻网页访问时间间隔阈值识别会话;③页面内容及站点结构确定页面重要程度识别会话。实验结果表明,相对于传统的单一方法进行会话识别的方法,该方法能够准确的识别会话,更为合理有效。  相似文献   

10.
This paper presents a novel switching predefined-time parameter identification algorithm with a relaxed excitation condition based on the dynamic regressor extension and mixing (DREM) method. DREM often requires the persistent excitation (PE) of the extended square regressor's determinant to ensure exponential parameter convergence. Unlike the classical DREM method, a new parameter identification algorithm configured with a two-layer filter technique is proposed under a relaxed initial excitation (IE) condition, rather than strict PE. A key point in choosing IE instead of PE is the introduction of a smooth switching function that dominates the pure integral action and filter behavior of the extended square regressor. The proposed algorithm relies on the predefined-time stability theorem and the settling-time of the identification algorithm is set a priori as a system parameter. The contributions of this paper are a novel switching predefined-time parameter estimation algorithm that 1) relaxes the stringent PE condition, 2) achieves predefined-time convergence, and 3) guarantees the monotonicity of each element of the parameter error inherited from the classical DREM method. Comparative simulation results are presented to illustrate the effectiveness of the proposed algorithm.  相似文献   

11.
The food industry is composed of a complex network of processing food and supply to the market. Supplying the food product to the market requires logistics with its operations. Nowadays the management of the food supply chain plays a vital role. In the food industry, supplying food with high quality and minimizing cost is required throughout the implementation of supply chain management. The quality of food is an essential thing for tracing the issues in food safety. Due to the increase in demand for quality food products by consumers IoT-based Food Supply Chain Management (FCM) is required for satisfying the consumer's needs. The IoT-based FCM helps the suppliers in the aspects of managing food safety procedures and tackling the issues in food safety, monitoring the lifespan of food on the manufacturing side, analyzing the process of reproduction or farming of raw material, warehousing, transporting the food product, sales in wholesaler etc. The main aim of using IoT is to receive sensor signals for monitoring the proper growth of crops in good quality soil, weather status, and so on. Also, in the transporting of food products, the sensors, and Radio-Frequency Identification (RFID) tags transmit the information to the server for monitoring the food safety parameters like temperature level, frozen level, etc. The issues are unsafe, ambiguous, the cost is high, low quality, and inaccurate. To overcome these issues, this paper proposed Internet of Things (IoT) based Food Supply Chain management is implemented. This paper proposes Tree-Augmented Naïve Bayes (TANB) with particle swarm optimization algorithm (TANB-PSO). This proposed work uses IoT which track, trace and manages the operations of food supply chain management. TANB-PSO handles optimized chronological data with IoT. The accuracy rate of three models in the FSCM of our proposed work TANB-PSO produces a higher accuracy rate of 95.02%. TANB got 92.44%, and PSO got 93.68%. The error rate of root mean square error (RMSE) and mean error (MAE) for the proposed work TANB-PSO is 0.017 and 0.031.  相似文献   

12.
压缩感知理论是利用信号的稀疏性,采用重构算法通过少量的观测值就可以实现对该信号的精确重构。SL0(Smoothed l0)算法是基于l0范数的稀疏信号重构算法,通过控制参数逐步逼近最优解。针对平滑函数的选取问题,文章提出一种新的平滑函数序列近似l0范数,实现稀疏信号的精确重构。仿真结果表明,在相同实验条件下文章算法较传统算法有着较高的重构概率。  相似文献   

13.
In this paper, we propose a numerically robust blind equalization scheme to mitigate cochannel and intersymbol interferences and separate signals from a convolutive mixture in multiple-input multiple-output (MIMO) communication systems. The robustness of the proposed scheme is achieved through a particular dual-mode operation applied to a constant-modulus-based space-time algorithm that corrects phase rotations. In the first mode of operation, the consistency in the nonlinear estimates of the transmitted signals is ensured. In the second mode, the Euclidean norms of the equalizer coefficient vectors decrease along the iterations, which allows the algorithm to return to the first mode of operation, where the estimation of the transmitted signals really occurs. In particular, we apply this scheme to a multimodulus version of the multiuser Shalvi-Weinstein algorithm (MU-SWA). By means of a deterministic stability analysis assuming the persistence of excitation condition, we show that the dual-mode MU-SWA does not diverge.  相似文献   

14.
Statistics show that the number of identity theft victims in the US increased by 12% in 2009, to 11.1 million adults, while the total annual fraud amount increased by 12.5%, to $54 billion. As the e-commerce volume is increasing and various online services are becoming more popular, the number of sites to which an average Internet user subscribes is increasing rapidly. Given the limited memory capacity of human beings, an Internet user's login credentials (in the form of a combination of a user ID and a password) are usually reused over multiple accounts, which can cause significant security problems. In this study, we address the vulnerability of login credentials. First, based on a unique Internet user data set, we analyze the behavioral characteristics of login credentials usage. We find that the same login credentials are used for many more accounts and reused much more often than previously expected. Furthermore, usage patterns are found to be quite skewed. Second, building on a network perspective of login credentials usage, we suggest a vulnerability measure of an individual's login credentials and analyze the vulnerability of current Internet users. The resulting information is valuable not only to the research community but also to managers and policy makers striving to reduce security vulnerability.  相似文献   

15.
伊蔚  金文光  沈建民  周斌 《科技通报》2006,22(6):855-859
块匹配全局搜索算法(FSBM)是效果最好的运动估计算法,但是由于它庞大的运算量限制了它的应用,特别是在数字多媒体终端等对实时性和功耗要求比较高的应用场合。针对这种情况,作者提出的处理结构结合了数据重用和低功耗技术,使得该结构的功耗比传统的全局搜索结构降低50%的功耗,数据可重用性大为提高,确保了每个数据只需被读取一次,这样就确保了较少的I/O端口数和片上内存,同时实现100%的硬件资源利用率。  相似文献   

16.
针对用户浏览的Web页面内容进行用户兴趣挖掘,并采用多元线性回归分析法进行用户浏览行为分析,得到用户兴趣特征矩阵,隐式地创建了用户兴趣描述文件,最后通过基于有效指数的K-M eans聚类算法得到了改进的用户兴趣模型。实际应用表明,该模型能有效地表达用户的兴趣偏好,提高了个性化服务质量。  相似文献   

17.
The increasing popularity of Web 2.0 has dramatically changed the way in which people communicate with others in their daily life or work. However, the use of social media is fundamentally different from that of traditional information technologies. Specifically, it requires collective efforts and interdependence between two or more people, and thus the usage behavior is no longer an individual's own decision or plan. Built on critical mass theory and social influence processes, this study tries to make an attempt to understand the determinants of collective intention (we-intention), which represents one's perception of a group of people acting as a unit. Instant messaging, one of the most popular social media platforms, has been chosen for investigation, and findings from a survey showed that perceived critical mass influenced we-intention both directly and indirectly through group norm and social identity. Recognizing the importance and relevance of collective intention will advance current understanding beyond individual intention-based models which are widely adopted in prior IS research. This study may be limited by having not included other alternative social technologies, but we leave this work for future research.  相似文献   

18.
This paper describes an integrated microfluidic chip that is capable of rapidly and quantitatively measuring the concentration of a bladder cancer biomarker, apolipoprotein A1, in urine samples. All of the microfluidic components, including the fluid transport system, the micro-valve, and the micro-mixer, were driven by negative pressure, which simplifies the use of the chip and facilitates commercialization. Magnetic beads were used as a solid support for the primary antibody, which captured apolipoprotein A1 in patients'' urine. Because of the three-dimensional structure of the magnetic beads, the concentration range of the target that could be detected was as high as 2000 ng ml−1. Because this concentration is 100 times higher than that quantifiable using a 96-well plate with the same enzyme-linked immunosorbent assay (ELISA) kit, the dilution of the patient''s urine can be avoided or greatly reduced. The limit of detection was determined to be approximately 10 ng ml−1, which is lower than the cutoff value for diagnosing bladder cancer (11.16 ng ml−1). When the values measured using the microfluidic chip were compared with those measured using conventional ELISA using a 96-well plate for five patients, the deviations were 0.9%, 6.8%, 9.4%, 1.8%, and 5.8%. The entire measurement time is 6-fold faster than that of conventional ELISA. This microfluidic device shows significant potential for point-of-care applications.  相似文献   

19.
DES算法已被应用于许多需要安全加密的场合(如信用卡持卡人的PIN加密传输、IC卡与POS间的双向认证、金融数据包校验等),深入地分析了DES算法的思想、加密过程及应用,并指出了DES算法的优势和不足。  相似文献   

20.
This paper develops a distributed reconstruction algorithm, that can be implemented efficiently, for time-varying graph signals. The reconstruction problem is formulated as an unconstrained optimization problem that minimizes the weighted sum of the data fidelity term and the regularization term. The regularizer used is the nonsmoothness measure of the temporal difference signal. The classical Newton’s method can be used to solve the optimization problem. However, computation of the Hessian matrix inverse is required, and this does not scale well with the graph size. Furthermore, a distributed implementation is not possible. An approximation to the inverse Hessian, that exploits the graph topology, is developed here. The resulting iterative algorithm can be implemented in a distributed manner, and scales well with the graph size. Convergence analysis of the algorithm is presented, which shows convergence to the global optimum. Numerical results, using both synthetic and real world datasets, will demonstrate the superiority of the proposed reconstruction algorithm over existing methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号