Search results for "pattern"

showing 10 items of 4203 documents

Adherence to antithrombotic therapy guidelines improves mortality among elderly patients with atrial fibrillation: insights from the REPOSI study

2016

Background: Atrial fibrillation (AF) is associated with a substantial risk of thromboembolism and mortality, significantly reduced by oral anticoagulation. Adherence to guidelines may lower the risks for both all cause and cardiovascular (CV) deaths. Methods: Our objective was to evaluate if antithrombotic prophylaxis according to the 2012 European Society of Cardiology (ESC) guidelines is associated to a lower rate of adverse outcomes. Data were obtained from REPOSI; a prospective observational study enrolling inpatients aged ≥65 years. Patients enrolled in 2012 and 2014 discharged with an AF diagnosis were analysed. Results: Among 2535 patients, 558 (22.0 %) were discharged with a diagnos…

Antithrombotic therapy; Atrial fibrillation; Elderly; Guidelines; Outcomes; Cardiology and Cardiovascular MedicineMaleRegistrieTime Factorsantithrombotic therapy; atrial fibrillation; elderly; guidelines; outcomesAtrial fibrillation (AF)Practice PatternsKaplan-Meier Estimate030204 cardiovascular system & hematologyGuidelineoutcomesCoronary artery disease0302 clinical medicineElderlyRisk FactorsAtrial FibrillationAntithrombotic80 and overAge Factor030212 general & internal medicineRegistriesguidelinesAntithrombotic therapy Atrial fibrillation Elderly Guidelines OutcomesPractice Patterns Physicians'OutcomeAged 80 and overFibrinolytic AgentAge FactorsAtrial fibrillationGeneral MedicineTreatment OutcomeItalyAtrial fibrillation (AF) thromboembolism antithrombotic prophylaxisPractice Guidelines as TopicCardiologyFemaleGuideline AdherenceCardiology and Cardiovascular MedicineHumanAntithrombotic therapy; Atrial fibrillation; Elderly; Guidelines; Outcomes; Age Factors; Aged; Aged 80 and over; Atrial Fibrillation; Chi-Square Distribution; Female; Fibrinolytic Agents; Guideline Adherence; Humans; Italy; Kaplan-Meier Estimate; Logistic Models; Male; Practice Patterns Physicians'; Proportional Hazards Models; Registries; Risk Assessment; Risk Factors; Thromboembolism; Time Factors; Treatment Outcome; Practice Guidelines as Topic; Cardiology and Cardiovascular Medicinemedicine.medical_specialtyLogistic ModelTime FactorSocio-culturaleLower riskRisk Assessment03 medical and health sciencesFibrinolytic AgentsInternal medicineThromboembolismmedicineHumansProportional Hazards ModelsAgedAntithrombotic therapyPhysicians'Chi-Square Distributionbusiness.industryProportional hazards modelRisk FactorSettore MED/09 - MEDICINA INTERNAGuidelinethromboembolismmedicine.diseaseAtrial fibrillationLogistic ModelsProportional Hazards Modelantithrombotic prophylaxisbusinessChi-squared distributionFibrinolytic agent
researchProduct

Multivariate analysis of the behavioral responses of rodents studied by means of different anxiety-inducing tests

Anxiety elevated plus maze hole-board multvariate analysis T-pattern analysis ratSettore BIO/09 - Fisiologia
researchProduct

Lensless object scanning holography for two-dimensional mirror-like and diffuse reflective objects

2013

Recently proposed lensless object scanning holography (LOSH) [Opt. Express 20, 9382 (2012)] is a fully lensless method capable of improving the image quality in digital Fourier holography applied to one-dimensional (1D) reflective objects and it involves a very simplified experimental setup. LOSH is based on the recording and digital postprocessing of a set of digital lensless Fourier transform holograms, which finally results in a synthetic image with improved resolution, field-of-view (FOV), signal-to-noise ratio (SNR), and depth of field. In this paper, LOSH is extended to the cases of two-dimensional (2D) mirror-like and 1D diffuse-based objects. For 2D mirror-like objects, the experime…

ApertureImage qualityComputer sciencebusiness.industryHolographyImage processingSuperresolutionAtomic and Molecular Physics and Opticslaw.inventionSpeckle patternOpticslawDigital image processingDepth of fieldElectrical and Electronic EngineeringbusinessEngineering (miscellaneous)Image resolutionDigital holographyFresnel diffractionApplied Optics
researchProduct

The importance of pattern similarity between Müllerian mimics in predator avoidance learning

2004

Müllerian mimicry, where unpalatable prey share common warning patterns, has long fascinated evolutionary biologists. It is commonly assumed that Müllerian mimics benefit by sharing the costs of predator education, thus reducing per capita mortality, although there has been no direct test of this assumption. Here, we specifically measure the selection pressure exerted by avian predators on unpalatable prey with different degrees of visual similarity in their warning patterns. Using wild-caught birds foraging on novel patterned prey in the laboratory, we unexpectedly found that pattern similarity did not increase the speed of avoidance learning, and even dissimilar mimics shared the educatio…

AposematismBiologyGeneral Biochemistry Genetics and Molecular BiologyMüllerian mimicryPredationSongbirdsFood PreferencesSimilarity (psychology)Avoidance LearningAnimalsPredator avoidanceDiscrimination learningSelection GeneticGeneral Environmental ScienceAnalysis of VarianceCommunicationGeneral Immunology and Microbiologybusiness.industryGeneral MedicineAdaptation PhysiologicalBiological EvolutionPattern Recognition VisualPredatory BehaviorMimicryGeneral Agricultural and Biological SciencesbusinessResearch ArticleProceedings of the Royal Society of London. Series B: Biological Sciences
researchProduct

Comparison and multiresolution analysis of irregular meshes with appearance attributes

2004

We present in this dissertation a method to compare and to analyse irregular meshes with appearance attributes. First, we propose a mesh comparison method using a new attribute deviation metric. Considered meshes contain geometric and appearance attributes (e.g. color, texture,temperature). The proposed deviation assessment allows the computation of local attribute differences between two meshes. We present an application of this method to mesh simplification algorithm quality assessment.Then we propose two multiresolution analysis schemes for irregular meshes with appearance attributes. First, a mesh is decomposed in a discret number of levels of detail. We introduce a surface geometry rel…

Appearance attributesIrregular meshes[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]analyse multirésolutionattributs d’apparenceMesh comparisondébruitage adaptatif[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]visualisation dépendante des détailscomparaison de maillagesMultiresolution analysismaillages irréguliers
researchProduct

Numerical Study of Blow-Up Mechanisms for Davey-Stewartson II Systems

2018

We present a detailed numerical study of various blow-up issues in the context of the focusing Davey-Stewartson II equation. To this end we study Gaussian initial data and perturbations of the lump and the explicit blow-up solution due to Ozawa. Based on the numerical results it is conjectured that the blow-up in all cases is self similar, and that the time dependent scaling is as in the Ozawa solution and not as in the stable blow-up of standard $L^{2}$ critical nonlinear Schr\"odinger equations. The blow-up profile is given by a dynamically rescaled lump.

Applied MathematicsGaussian010102 general mathematicsMathematics::Analysis of PDEsContext (language use)01 natural sciences010305 fluids & plasmasNonlinear systemsymbols.namesakeMathematics::Algebraic Geometry0103 physical sciencessymbolsApplied mathematics0101 mathematicsNonlinear Sciences::Pattern Formation and SolitonsScalingMathematicsStudies in Applied Mathematics
researchProduct

On the number of solutions of a Duffing equation

1991

The exact number of solutions of a Duffing equation with small forcing term and homogeneous Neumann boundary conditions is given. Several bifurcation diagrams are shown.

Applied MathematicsGeneral MathematicsMathematical analysisGeneral Physics and AstronomyDuffing equationBifurcation diagramNonlinear Sciences::Chaotic DynamicsBifurcation theoryNeumann boundary conditionInitial value problemCalculus of variationsBoundary value problemNonlinear Sciences::Pattern Formation and SolitonsBifurcationMathematicsZAMP Zeitschrift f�r angewandte Mathematik und Physik
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

The Academic Background of Youth Soccer Coaches Modulates Their Behavior During Training

2020

This investigation aims to explore the relationship between the academic backgrounds of youth soccer coaches (U10 and U12 age groups) in Spain and the type of verbal behavior used during training sessions. The sample consisted of 70 coaches divided into two groups, depending on whether or not they had engaged with a university-level academic studies related to Physical Education and or Sport Sciences. A modified version of the “Coach Analysis and Intervention System” (CAIS), developed by Cushion et al. (2012), was used to collect data. A total of 32,886 verbal behaviors were noted and analyzed. Our results suggest that the coaches with university academic backgrounds frequently use more ver…

Applied psychologyeducationlcsh:BF1-990feedbackCoaching050105 experimental psychologyPhysical education03 medical and health sciences0302 clinical medicinecoachingAge groupsIntervention (counseling)Psychology0501 psychology and cognitive sciencesGeneral PsychologyOriginal Researchbiologybusiness.industryAthletes05 social sciencesbiology.organism_classificationcoach traininglcsh:PsychologyNotational analysisnotational analysiscommunication patternbusinessPsychologyhuman activities030217 neurology & neurosurgeryFrontiers in Psychology
researchProduct

On spline methods of approximation under L-fuzzy information

2011

This work is closely related to our previous papers on algorithms of approximation under L-fuzzy information. In the classical theory of approximation central algorithms were worked out on the basis of usual, that is crisp splines. We describe central methods for solution of linear problems with balanced L-fuzzy information and develop the concept of L-fuzzy splines.

Approximation theoryClassical theorySpline (mathematics)Mathematical optimizationComputingMethodologies_PATTERNRECOGNITIONBox splineFuzzy setLinear problemApplied mathematicsApproximation algorithmFuzzy logicMathematics2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)
researchProduct