Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cloud computing (3)
- Humans (3)
- Female (2)
- Internet of Things (2)
- Male (2)
-
- Adult (1)
- Age Factors (1)
- Age of Onset (1)
- Aged (1)
- Agreement (1)
- Alzheimer Disease (1)
- Apolipoproteins E (1)
- Ascertainment bias (1)
- Autocorrelation (1)
- Bias (1)
- Big Data (1)
- Big data (1)
- Big data research (1)
- Canonical Typology (1)
- Caregivers (1)
- Central Europe (1)
- Classifiers (1)
- Cohort studies (1)
- Communication (1)
- Communication barriers (1)
- Computational Biology (1)
- Cortisol (1)
- Data acquisition (1)
- EHealth (1)
- Eastern Europe (1)
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
Reducing Symptom Distress In Patients With Advanced Cancer Using An E-Alert System For Caregivers: Pooled Analysis Of Two Randomized Clinical Trials, David H. Gustafson, Lori L. Dubenske, Amy K. Atwood, Ming-Yuan Chih, Roberta A. Johnson, Fiona Mctavish, Andrew Quanbeck, Roger L. Brown, James F. Cleary, Dhavan Shah
Reducing Symptom Distress In Patients With Advanced Cancer Using An E-Alert System For Caregivers: Pooled Analysis Of Two Randomized Clinical Trials, David H. Gustafson, Lori L. Dubenske, Amy K. Atwood, Ming-Yuan Chih, Roberta A. Johnson, Fiona Mctavish, Andrew Quanbeck, Roger L. Brown, James F. Cleary, Dhavan Shah
Health and Clinical Sciences Faculty Publications
Background: Symptom distress in patients toward the end of life can change rapidly. Family caregivers have the potential to help patients manage those symptoms, as well as their own stress, if they are equipped with the proper resources. Electronic health (eHealth) systems may be able to provide those resources. Very sick patients may not be able to use such systems themselves to report their symptoms but family caregivers could.
Objective: The aim of this paper was to assess the effects on cancer patient symptom distress of an eHealth system that alerts clinicians to significant changes in the patient’s symptoms, as …
A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
Information Science Faculty Publications
No abstract provided.
Single Versus Concurrent Systems: Nominal Classification In Mian, Greville G. Corbett, Sebastian Fedden, Raphael Finkel
Single Versus Concurrent Systems: Nominal Classification In Mian, Greville G. Corbett, Sebastian Fedden, Raphael Finkel
Computer Science Faculty Publications
The Papuan language Mian allows us to refine the typology of nominal classification. Mian has two candidate classification systems, differing completely in their formal realization but overlapping considerably in their semantics. To determine whether to analyse Mian as a single system or concurrent systems we adopt a canonical approach. Our criteria – orthogonality of the systems (we give a precise measure), semantic compositionality, morphosyntactic alignment, distribution across parts of speech, exponence, and interaction with other features – point mainly to an analysis as concurrent systems. We thus improve our analysis of Mian and make progress with the typology of nominal …
Impact Of Home Visit Capacity On Genetic Association Studies Of Late-Onset Alzheimer's Disease, David W. Fardo, Laura E. Gibbons, Shubhabrata Mukherjee, M. Maria Glymour, Wayne Mccormick, Susan M. Mccurry, James D. Bowen, Eric B. Larson, Paul K. Crane
Impact Of Home Visit Capacity On Genetic Association Studies Of Late-Onset Alzheimer's Disease, David W. Fardo, Laura E. Gibbons, Shubhabrata Mukherjee, M. Maria Glymour, Wayne Mccormick, Susan M. Mccurry, James D. Bowen, Eric B. Larson, Paul K. Crane
Biostatistics Faculty Publications
INTRODUCTION—Findings for genetic correlates of late-onset Alzheimer's disease (LOAD) in studies that rely solely on clinic visits may differ from those with capacity to follow participants unable to attend clinic visits.
METHODS—We evaluated previously identified LOAD-risk single nucleotide variants in the prospective Adult Changes in Thought study, comparing hazard ratios (HRs) estimated using the full data set of both in-home and clinic visits (n = 1697) to HRs estimated using only data that were obtained from clinic visits (n = 1308). Models were adjusted for age, sex, principal components to account for ancestry, and additional health indicators.
RESULTS …
Nonmeteorological Influences On Severe Thunderstorm Warning Issuance: A Geographically Weighted Regression-Based Analysis Of County Warning Area Boundaries, Land Cover, And Demographic Variables, Megan L. White, J. Anthony Stallins
Nonmeteorological Influences On Severe Thunderstorm Warning Issuance: A Geographically Weighted Regression-Based Analysis Of County Warning Area Boundaries, Land Cover, And Demographic Variables, Megan L. White, J. Anthony Stallins
Geography Faculty Publications
Studies have shown that the spatial distribution of severe thunderstorm warnings demonstrates variation beyond what can be attributed to weather and climate alone. Investigating spatial patterns of these variations can provide insight into nonmeteorological factors that might lead forecasters to issue warnings. Geographically weighted regression was performed on a set of demographic and land cover descriptors to ascertain their relationships with National Weather Service (NWS) severe thunderstorm warning polygons issued by 36 NWS forecast offices in the central and southeastern United States from 2008 to 2015. County warning area (CWA) boundaries and cities were predominant sources of variability in warning …
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Information Science Faculty Publications
The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …
Parallel Design Of A Product And Internet Of Things (Iot) Architecture To Minimize The Cost Of Utilizing Big Data (Bd) For Sustainable Value Creation, Ryan Bradley, Ibrahim S. Jawahir, Niko Murrell, Julie Whitney
Parallel Design Of A Product And Internet Of Things (Iot) Architecture To Minimize The Cost Of Utilizing Big Data (Bd) For Sustainable Value Creation, Ryan Bradley, Ibrahim S. Jawahir, Niko Murrell, Julie Whitney
Institute for Sustainable Manufacturing Faculty Publications
Information has become today's addictive currency; hence, companies are investing billions in the creation of Internet of Things (IoT) frameworks that gamble on finding trends that reveal sustainability and/or efficiency improvements. This approach to “Big Data” can lead to blind, astronomical costs. Therefore, this paper presents a counter approach aimed at minimizing the cost of utilizing “Big Data” for sustainable value creation. The proposed approach leverages domain/expert knowledge of the system in combination with a machine learning algorithm in order to limit the needed infrastructure and cost. A case study of the approach implemented in a consumer electronics company is …
Intraindividual Variability In Cortisol: Approaches, Illustrations, And Recommendations, Suzanne C. Segerstrom, Sandra E. Sephton, Philip M. Westgate
Intraindividual Variability In Cortisol: Approaches, Illustrations, And Recommendations, Suzanne C. Segerstrom, Sandra E. Sephton, Philip M. Westgate
Psychology Faculty Publications
Most of the variance in diurnal cortisol is attributable to intraindividual variability (IIV), defined as relatively short-term, reversible changes. Multiple methods for measuring IIV have been proposed, and some have already been applied to cortisol IIV. In the present review, measurement methods are described and applied to simulated cortisol data with known underlying differences in IIV and to real cortisol data from first-year law students. More slope variance and more residual or net variance were well captured by their individual standard deviations. Explorations of reliability suggested that 10 slopes and 50 residuals result in reliable and stable estimates of the …
Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale
Ten Simple Rules For Responsible Big Data Research, Matthew Zook, Solon Barocas, Danah Boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale
Geography Faculty Publications
No abstract provided.
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Information Science Faculty Publications
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …
Environmental Challenges In Central And Eastern Europe, Bernhard Hennig
Environmental Challenges In Central And Eastern Europe, Bernhard Hennig
Superfund Research Center Faculty Publications
No abstract provided.