scispace - formally typeset
Search or ask a question

Showing papers on "Personal computer published in 2008"


Journal ArticleDOI
TL;DR: This paper could serve as a general literature citation when one or more of the open-source SH ELX programs (and the Bruker AXS version SHELXTL) are employed in the course of a crystal-structure determination.
Abstract: An account is given of the development of the SHELX system of computer programs from SHELX-76 to the present day. In addition to identifying useful innovations that have come into general use through their implementation in SHELX, a critical analysis is presented of the less-successful features, missed opportunities and desirable improvements for future releases of the software. An attempt is made to understand how a program originally designed for photographic intensity data, punched cards and computers over 10000 times slower than an average modern personal computer has managed to survive for so long. SHELXL is the most widely used program for small-molecule refinement and SHELXS and SHELXD are often employed for structure solution despite the availability of objectively superior programs. SHELXL also finds a niche for the refinement of macromolecules against high-resolution or twinned data; SHELXPRO acts as an interface for macromolecular applications. SHELXC, SHELXD and SHELXE are proving useful for the experimental phasing of macromolecules, especially because they are fast and robust and so are often employed in pipelines for high-throughput phasing. This paper could serve as a general literature citation when one or more of the open-source SHELX programs (and the Bruker AXS version SHELXTL) are employed in the course of a crystal-structure determination.

81,116 citations


Patent
01 Feb 2008
TL;DR: In this article, various methods, systems and apparatus for displaying content associated with a point-of-interest (POI) in a digital mapping system, are disclosed, including detecting a change in the zoom level of an electronic map displayed on a computing device.
Abstract: Various methods, systems and apparatus for displaying content associated with a point-of-interest (“POI”) in a digital mapping system, are disclosed. One such method may include detecting a change in the zoom level of an electronic map displayed on a computing device, determining if the new zoom-level is at a pre-determined zoom level (e.g. at maximum zoom), identifying a POI on the map, retrieving content associated with the POI (“POI content”) and displaying the POI content. The method may further include detecting a change in the zoom, or pan, of the digital map while POI content is displayed, and removing the POI content in response. One apparatus, according to aspects of the present invention, may include means of detecting a change in the zoom level in a digital map displayed through an application (e.g. a web browser, an application on web-enabled cellular phones, etc., displaying a map generated by a service such as Google Maps®, Yahoo! Maps®, Windows Live Search Maps®, MapQuest®, etc.) on a computing device (e.g. personal computer, workstation, thin client, PDA, cellular phone/smart phone, GPS device, etc.) means of identifying a POI at the pre-determined zoom level, means of obtaining content associated with the POI, and means of displaying the POI content. POI content may be retrieved from a database (e.g. internet-based database); or, in an alternate embodiment, gathered by crawling websites associated with the POI. In one embodiment, POI content may be displayed as an image (e.g. a PNG file, GIF, Flash® component, etc.) superimposed on the digital map (e.g. as an overlay object on the map image.) In alternate embodiments, POI content may replace the digital map and may contain links to other content.

764 citations


Book
11 Aug 2008
TL;DR: This book teaches how to use web-based applications to collaborate on reports and presentations, share online calendars and to-do lists, manage large projects, and edit and store digital photographs.
Abstract: Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate On-Line Computing as you know it has changed. No longer are you tied to using expensive programs stored on your computer. No longer will you be able to only access your data from one computer. No longer will you be tied to doing work only from your work computer or playing only from your personal computer. Enter cloud computingan exciting new way to work with programs and data, collaborate with friends and family, share ideas with coworkers and friends, and most of all, be more productive! The cloud consists of thousands of computers and servers, all linked and accessible to you via the Internet. With cloud computing, everything you do is now web-based instead of being desktop-based; you can access all your programs and documents from any computer thats connected to the Internet. Whether you want to share photographs with your family, coordinate volunteers for a community organization, or manage a multi-faceted project in a large organization, cloud computing can help you do it more easily than ever before. Trust us. If you need to collaborate, cloud computing is the way to do it. Learn what cloud computing is, how it works, who should use it, and why its the wave of the future. Explore the practical benefits of cloud computing, from saving money on expensive programs to accessing your documents ANYWHERE. See just how easy it is to manage work and personal schedules, share documents with coworkers and friends, edit digital photos, and much more! Learn how to use web-based applications to collaborate on reports and presentations, share online calendars and to-do lists, manage largeprojects, and edit and store digital photographs. Michael Miller is known for his casual, easy-to-read writing style and his ability to explain a wide variety of complex topics to an everyday audience. Mr. Miller has written more than 80 nonfiction books over the past two decades, with more than a million copies in print. His books for Que include Absolute Beginners Guide to Computer Basics, Googlepedia: The Ultimate Google Resource, and Is It Safe?: Protecting Your Computer, Your Business, and Yourself Online. His website is located at www.molehillgroup.com. Covers the most popular cloud-based applications, including the following: Adobe Photoshop Express Apple MobileMe Glide OS Google Docs Microsoft Office Live Workspace Zoho Office CATEGORY: Web Applications COVERS: Cloud Computing USER LEVEL: Beginner-Intermediate

477 citations


Patent
28 Jul 2008
TL;DR: In this paper, a content guide for multiple sources is provided with hypertext type links to allow for the selection of various programs, such as television shows, related information or activities on online services or automatic telephone ordering of products or services being displayed.
Abstract: A integrated content guide for multiple sources is provided with hyper-text type links to allow for the selection of various programs. The hyper-text links are provided for a transmitted and then stored digital bit stream. This allows for the embedding within the content guide what could be additional commercial information. The embedding may also be as to additional information for other related television or radio shows or the like. Information can be additional television shows, related information or activities on on-line services or automatic telephone ordering of products or services being displayed.

411 citations


Journal ArticleDOI
TL;DR: This article argues for the benefits and feasibility of a generic yet tailorable approach to component-based systems-building that offers a uniform programming model that is applicable in a wide range of systems-oriented target domains and deployment environments.
Abstract: Component-based software structuring principles are now commonplace at the application level; but componentization is far less established when it comes to building low-level systems software. Although there have been pioneering efforts in applying componentization to systems-building, these efforts have tended to target specific application domains (e.g., embedded systems, operating systems, communications systems, programmable networking environments, or middleware platforms). They also tend to be targeted at specific deployment environments (e.g., standard personal computer (PC) environments, network processors, or microcontrollers). The disadvantage of this narrow targeting is that it fails to maximize the genericity and abstraction potential of the component approach. In this article, we argue for the benefits and feasibility of a generic yet tailorable approach to component-based systems-building that offers a uniform programming model that is applicable in a wide range of systems-oriented target domains and deployment environments. The component model, called OpenCom, is supported by a reflective runtime architecture that is itself built from components. After describing OpenCom and evaluating its performance and overhead characteristics, we present and evaluate two case studies of systems we have built using OpenCom technology, thus illustrating its benefits and its general applicability.

407 citations


Journal ArticleDOI
TL;DR: In this article, a discrete-choice model of limited consumer information is presented, where advertising influences the set of products from which consumers choose to purchase, and the model is applied to the U.S. personal computer market where top firms spend over $2 billion annually on advertising.
Abstract: Traditional discrete-choice models assume buyers are aware of all products for sale. In markets where products change rapidly, the full information assumption is untenable. I present a discrete-choice model of limited consumer information, where advertising influences the set of products from which consumers choose to purchase. I apply the model to the U.S. personal computer market where top firms spend over $2 billion annually on advertising. I find estimated markups of 19% over production costs, where top firms advertise more than average and earn higher than average markups. High markups are explained to a large extent by informational asymmetries across consumers, where full information models predict markups of one-fourth the magnitude. I find that estimated product demand curves are biased toward being too elastic under traditional models. I show how to use data on media exposure to improve estimated price elasticities in the absence of micro ad data.

343 citations


Journal ArticleDOI
TL;DR: In this paper, the authors summarized available information on emission rates and/or indoor concentrations of various pollutants that are related to office equipment use, briefly describe experimental methods used to characterize emissions and identify critical research needs in this field.

331 citations


Journal ArticleDOI
TL;DR: In this article, two alternative modes of operation for the current-source flyback inverter are investigated and compared in order to establish their advantages as well as their suitability for the development of an inverter for decentralized grid-connected PV applications.
Abstract: Two alternative modes of operation for the current-source flyback inverter are investigated in this paper. The discontinuous conduction mode (DCM), where a constant switching frequency (CSF) control method is applied, and the boundary between continuous and DCM (BCM) that is introduced for photovoltaic (PV) applications in this paper (where a variable switching frequency control method is applied). These two control methods are analytically studied and compared in order to establish their advantages as well as their suitability for the development of an inverter for decentralized grid-connected PV applications. An optimum design methodology is developed, aiming for an inverter with the smallest possible volume for the maximum power transfer to the public grid and wide PV energy exploitation. The main advantages of the current-source flyback inverter are very high-power density and high efficiency due to its simple structure, as well as high-power factor regulation. The design and control methodology are validated by personal computer simulation program with integrated circuit emphasis (PSPICE) simulation and experimental results, accomplished on a laboratory prototype.

266 citations


Journal ArticleDOI
01 Aug 2008-Proteins
TL;DR: A distance‐dependent knowledge‐based scoring function to predict protein–protein interactions and the binding scores predicted by ITScore‐PP correlated well with the experimentally determined binding affinities, yielding a correlation coefficient of R = 0.71.
Abstract: Using an efficient iterative method, we have developed a distance-dependent knowledge-based scoring function to predict protein-protein interactions. The function, referred to as ITScore-PP, was derived using the crystal structures of a training set of 851 protein-protein dimeric complexes containing true biological interfaces. The key idea of the iterative method for deriving ITScore-PP is to improve the interatomic pair potentials by iteration, until the pair potentials can distinguish true binding modes from decoy modes for the protein-protein complexes in the training set. The iterative method circumvents the challenging reference state problem in deriving knowledge-based potentials. The derived scoring function was used to evaluate the ligand orientations generated by ZDOCK 2.1 and the native ligand structures on a diverse set of 91 protein-protein complexes. For the bound test cases, ITScore-PP yielded a success rate of 98.9% if the top 10 ranked orientations were considered. For the more realistic unbound test cases, the corresponding success rate was 40.7%. Furthermore, for faster orientational sampling purpose, several residue-level knowledge-based scoring functions were also derived following the similar iterative procedure. Among them, the scoring function that uses the side-chain center of mass (SCM) to represent a residue, referred to as ITScore-PP(SCM), showed the best performance and yielded success rates of 71.4% and 30.8% for the bound and unbound cases, respectively, when the top 10 orientations were considered. ITScore-PP was further tested using two other published protein-protein docking decoy sets, the ZDOCK decoy set and the RosettaDock decoy set. In addition to binding mode prediction, the binding scores predicted by ITScore-PP also correlated well with the experimentally determined binding affinities, yielding a correlation coefficient of R = 0.71 on a test set of 74 protein-protein complexes with known affinities. ITScore-PP is computationally efficient. The average run time for ITScore-PP was about 0.03 second per orientation (including optimization) on a personal computer with 3.2 GHz Pentium IV CPU and 3.0 GB RAM. The computational speed of ITScore-PP(SCM) is about an order of magnitude faster than that of ITScore-PP. ITScore-PP and/or ITScore-PP(SCM) can be combined with efficient protein docking software to study protein-protein recognition.

233 citations


Journal ArticleDOI
TL;DR: An Environmental Air Pollution Monitoring System (EAPMS) for monitoring the concentrations of major air pollutant gases has been developed, complying with the IEEE 1451.2 standard as mentioned in this paper.
Abstract: An Environmental Air Pollution Monitoring System (EAPMS) for monitoring the concentrations of major air pollutant gases has been developed, complying with the IEEE 1451.2 standard. This system measures concentrations of gases such as CO, NO2, SO2, and O3 using semiconductor sensors. The smart transducer interface module (STIM) was implemented using the analog devices' ADuC812 microconverter. Network Capable Application Processor (NCAP) was developed using a personal computer and connected to the STIM via the transducer independent interface. Three gas sensors were calibrated using the standard calibration methods. Gas concentration levels and information regarding the STIM can be seen on the graphical user interface of the NCAP. Further, the EAPMS is capable of warning when the pollutant levels exceed predetermined maxima and the system can be developed into a low cost version for developing countries.

211 citations


Journal ArticleDOI
TL;DR: 6D spherical polar Fourier correlation expression is presented from which arbitrary multi-dimensional multi-property multi-resolution FFT correlations may be generated and it is shown that 5D correlations will be advantageous when calculating multi-term knowledge-based interaction potentials.
Abstract: Motivation: Predicting how proteins interact at the molecular level is a computationally intensive task. Many protein docking algorithms begin by using fast Fourier transform (FFT) correlation techniques to find putative rigid body docking orientations. Most such approaches use 3D Cartesian grids and are therefore limited to computing three dimensional (3D) translational correlations. However, translational FFTs can speed up the calculation in only three of the six rigid body degrees of freedom, and they cannot easily incorporate prior knowledge about a complex to focus and hence further accelerate the calculation. Furthemore, several groups have developed multi-term interaction potentials and others use multi-copy approaches to simulate protein flexibility, which both add to the computational cost of FFT-based docking algorithms. Hence there is a need to develop more powerful and more versatile FFT docking techniques. Results: This article presents a closed-form 6D spherical polar Fourier correlation expression from which arbitrary multi-dimensional multi-property multi-resolution FFT correlations may be generated. The approach is demonstrated by calculating 1D, 3D and 5D rotational correlations of 3D shape and electrostatic expansions up to polynomial order L=30 on a 2 GB personal computer. As expected, 3D correlations are found to be considerably faster than 1D correlations but, surprisingly, 5D correlations are often slower than 3D correlations. Nonetheless, we show that 5D correlations will be advantageous when calculating multi-term knowledge-based interaction potentials. When docking the 84 complexes of the Protein Docking Benchmark, blind 3D shape plus electrostatic correlations take around 30 minutes on a contemporary personal computer and find acceptable solutions within the top 20 in 16 cases. Applying a simple angular constraint to focus the calculation around the receptor binding site produces acceptable solutions within the top 20 in 28 cases. Further constraining the search to the ligand binding site gives up to 48 solutions within the top 20, with calculation times of just a few minutes per complex. Hence the approach described provides a practical and fast tool for rigid body protein-protein docking, especially when prior knowledge about one or both binding sites is available. Availability: http://www.csd.abdn.ac.uk/hex/ Contact: d.w.ritchie@abdn.ac.uk

Patent
21 May 2008
TL;DR: In this paper, a powerline communications device is defined as an interface consisting of a power line communications interface and at least one other communications interface configured to communicate over a computing network.
Abstract: A powerline communications device comprises a powerline communications interface and at least one other communications interface configured to communicate over a computing network. The powerline communications interface is further configured to receive electrical power. The computing network may comprise mediums including powerlines, telephone lines, and/or coaxial cables. In some embodiments, the powerline communications interface may communicate with a network apparatus, such as a personal computer, via an Ethernet interface. The powerline interface, the telephone line interface, and/or the coaxial cable interface may all be associated with the same media access control (MAC) address. The powerline communications device may receive a message via a first medium and repeat the message via a second medium based on a quality of service (QoS) metric. In some embodiments, the powerline communications device maycommunicate using multiple frequency bands.

Journal ArticleDOI
TL;DR: In this article, the authors compared the performance of the HYDRUS package with other contemporary modeling approaches used to characterize vadose zone effects in groundwater models, and found that the HYdrUS package provided a much more efficient alternative to VSF for this large-scale groundwater problem and could better account for vaderose zone processes than the UZF1 and REC-ET packages.
Abstract: In the past, vadose zone processes in groundwater flow models were dramatically simplified (or even neglected) due to constraints on computational resources. The one-dimensional unsaturated flow package HYDRUS, recently developed for the groundwater model MODFLOW, was evaluated and compared with other contemporary modeling approaches used to characterize vadose zone effects in groundwater models. Being fully incorporated into the MODFLOW program, the HYDRUS package provides MODFLOW with recharge fluxes at the water table, while MODFLOW provides HYDRUS with the position of the groundwater table that is used as the bottom boundary condition in the package. The performance of the HYDRUS package was analyzed for three case studies of increasing complexity: (i) a one-dimensional infiltration experiment; (ii) a two-dimensional water table recharge experiment; and (iii) a hypothetical regional-scale groundwater flow problem. The computational need and modeling efficiency of the HYDRUS package was compared with other relevant MODFLOW packages (VSF, UZF1, and REC-ET). For smaller scale problems (up to two dimensions), the VSF process and the HYDRUS and UZF1 packages performed comparably well in terms of modeling efficiency and simulation times. Because of the high computational demand, it was not feasible to use the VSF process on a typical personal computer for the hypothetical large-scale groundwater problem. The HYDRUS package provided a much more efficient alternative to VSF for this large-scale groundwater problem and could better account for vadose zone processes than the UZF1 and REC-ET packages. For large-scale groundwater problems, the HYDRUS package provides an optimal tradeoff between computational effort and accuracy of model simulations for coupled vadose zone–groundwater problems.

Journal ArticleDOI
TL;DR: The THEMIS mission includes a comprehensive ground-based measurement network that adds two additional dimensions to the information gained in the night magnetosphere by the five THEMIS spacecraft, and this network provides necessary correlative data on the strength and extent of events, enables their onsets to be accurately timed, and provides an educational component in which students have an active participation in the program.
Abstract: The THEMIS mission includes a comprehensive ground-based measurement network that adds two additional dimensions to the information gained in the night magnetosphere by the five THEMIS spacecraft. This network provides necessary correlative data on the strength and extent of events, enables their onsets to be accurately timed, and provides an educational component in which students have an active participation in the program. This paper describes the magnetometers installed to obtain these ground-based North American magnetic measurements, including the magnetometers installed as part of the educational effort, and the support electronics provided by UCLA for the ground-based observatories. These magnetometers measure the Earth’s magnetic field with high resolution, and with precise timing provided by the Global Positioning System. They represent UCLA’s next generation of low-cost, ground-based magnetometers using an inexpensive personal computer for data collection, storage and distribution. These systems can be used in a stand-alone mode requiring only AC power. If there is Internet connectivity, they can be configured to provide near real-time data over the web. These data are provided at full resolution to the entire scientific community over the web with minimal delay.

Journal ArticleDOI
TL;DR: In this paper, a ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication is presented, and various active attacks on the GSM protocols are discussed.
Abstract: In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We first describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We extend this attack to a (more complex) ciphertext-only attack on A5/1. We then describe new (active) attacks on the protocols of networks that use A5/1, A5/3, or even GPRS (General Packet Radio Service). These attacks exploit flaws in the GSM protocols, and they work whenever the mobile phone supports a weak cipher such as A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for example, they are also applicable for attacking A5/3 networks using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known-plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. Furthermore, we describe how to fortify the attacks to withstand reception errors. As a result, our attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We present several attack scenarios such as call hijacking, altering of data messages and call theft.

Journal ArticleDOI
25 Jul 2008
TL;DR: A practical guide covering all procession steps beginning with anesthetization leading to the fi nal goal, 3D visualization of specimens, is provided, and the interpolate function is emphasized as most useful for completion of segmentation and also correction works.
Abstract: Recent increases in performance of personal computer hard- and software enabled a variety of 3D graphical applications, such as surface visualizations of biological specimens. This indirectly recalled an old morphological method back to life, the investigation of soft part anatomy by light microscopical serial section analysis. A practical guide covering all procession steps beginning with anesthetization leading to the fi nal goal, 3D visualization of specimens, is provided. Most useful for 3D procession—of particularly small specimens—are ribbon-forming serial resin (= “semithin”) sections. A reliable method for achievement of ribbon formation is described in detail for the fi rst time. Contact cement is applied only to the cutting surface of the block, which represents a modifi cation of an old protocol. Details on the materials and tools, such as embedding media (epoxy resins) and knives (Ralph glass or special diamond knife) used and general handling for the entire procedure are given and critically evaluated. 3D procession is explained for the software AMIRA® . The major processing steps, from section image capturing until refi ning of surfaces, are explained. Based on the experience of the author, practical aids that cannot be found in the user’s guide of the software or elsewhere for facilitating the process are given. These include preliminary calculation of resolution, calibration and strategies for facilitating the process and improvement of results. The interpolate function is emphasized as most useful for completion of segmentation and also correction works. Visualization examples are followed by an estimate of work expenditure for graphical processes involved

Journal IssueDOI
TL;DR: The Internet, in particular, has revolutionized the ability to search, especially in the commercial arena where the authors have the choice of using different search systems to search essentially the same electronic resources but with different interactive functionalities.
Abstract: Information retrieval is a fundamental component of human information behavior. The ability to extract useful information from large electronic resources not only is one of the main activities of individuals online but is an essential skill for most professional groups and a means of achieving competitive advantage. Our electronic information world is becoming increasingly complex with more sources of information, types of information, and ways to access information than ever before. Anyone who searches for information is required to make more decisions about searching and expected to engage with an increased number and variety of search systems. Even a standard desktop personal computer comes equipped with numerous search tools (desktop search, e-mail search, browsers to help search the Internet, embedded search tools for specific file formats such as PDF [portable document format] or Word, and specific document types such as help manuals). A standard day, if one is electronically enabled, may involve many searches across different search systems accessing different electronic resources for different purposes. The Internet, in particular, has revolutionized the ability to search, especially in the commercial arena where we have the choice of using different search systems to search essentially the same electronic resources but with different interactive functionalities. The search decisions a human is required to make before encountering any information involve not only how to search this resource using this system but also how to choose a system or resource to search in the first place. These decisions are complicated because skills learned using one type of system do not always transfer simply to searching a different type of system (Cool, Park, Belkin, Koenemann, & Ng, 1996). Neither does information literacy in one domain of expertise necessarily help when searching on unfamiliar topics. The variability of data available, and the explicit or implicit structures of the data, also place a burden on both the searchers and system designers. How does searching within a Weblog, for example, differ from searching within technical manuals; or does all searching involve the same activities and require the same user support? As research shows CHAPTER 2

Journal ArticleDOI
TL;DR: For example, this paper measured attitudes of young women to sexually objectified advertising and found that females were less offended by these portrayals than female respondents in 1991, and that females' attitudes toward the advertisement have little effect on purchase intention.
Abstract: This study measures attitudes of young women to sexually objectified advertising. A survey combining elements of two previous studies (Ford, LaTour, and Lundstrom, 1991; Mittal and Lassar, 2000) was administered to 94 female undergraduates. Results show significant (p < 0.001) changes in attitudes of young, educated women. Respondents agreed females were portrayed as sex objects in advertisements, but were less offended by these portrayals than female respondents in 1991. Results also show females' attitudes toward the advertisement have little effect on purchase intention, a highly significant change from attitudes of women in 1991. SINCE THE REBIRTH of the women's movement in the 1960s, critics consistently have raged against the way advertising treats women. Scantily clad, suggestively portrayed women sell every different type of product on television, in magazines, and now on personal computer screens, in increasing numbers, since the 1980s. In the past, young, educated women were the strongest critics of advertisements. Many of the changes in the advertising industry occurred because these women raised their voices in protest. This study examines how today's generation of young, educated females feels about the portrayal of women in advertisements and the consequences of those attitudes. For women born in the early 1980s, sex in the media has been a constant companion. Sex is everywhere, on prime time television programs, movies, and music videos. It is rare to view an hour of television and not see a suggestively dressed or undressed female, whether in a program or a commercial. Sexual imagery appears in magazine articles and advertisements. A recent issue of Cosmopolitan might contain hundreds of half-naked women, stories of sexual mishaps, and even instructions for the ancient art of Kama Sutra. The Kaiser Family Foundation, a nonprofit national health organization, found that sexual con

Patent
Pinaki Ray1, Greg Matian1, Aparna Srinivasan1, David Rodbard1, David Price1 
20 Mar 2008
TL;DR: In this article, a diabetes management system or process is described that may be used to analyze and recognize patterns for a large amount of blood glucose concentration measurements and other physiological parameters related to the glycemia of a patient.
Abstract: A diabetes management system or process is provided herein that may be used to analyze and recognize patterns for a large amount of blood glucose concentration measurements and other physiological parameters related to the glycemia of a patient. In particular, a method of monitoring glycemia in a patient may include storing a patient's data on a suitable device, such as, for example, a glucose meter. The patient's data may include blood glucose concentration measurements. The diabetes management system or process may be installed on, but is not limited to, a personal computer, an insulin pen, an insulin pump, or a glucose meter. The diabetes management system or process may identify a plurality of pattern types from the data including a testing/dosing pattern, a hypoglycemic pattern, a hyperglycemic pattern, a variability pattern, and a comparative pattern. After identifying a particular pattern with the data management system or process, a warning message may be displayed on a screen of a personal computer or a glucose meter. Other messages can also be provided to ensure compliance of any prescribed diabetes regiments or to guide the patient in managing the patient's diabetes.

Journal ArticleDOI
TL;DR: The phantom study showed that CBCT provides limited quantitative CT values for each pixel on sliced images for differentiating air, water and soft tissues, and the measurement of air spaces with CBCT was quite accurate.
Abstract: Objectives: To evaluate the reliability of cone beam CT (CBCT) values and dimensional measurements of oropharyngeal air spaces as compared with those of multidetector row CT (MDCT). Methods: A soft tissue equivalent phantom with different sized holes was used. The phantom was scanned using CBCT and MDCT. In addition, a volunteer was examined using both methods for clinical comparison. The CT data were retrieved to a personal computer and treated using image processing software for three-dimensional rendering and dimensional measurements. The CT values of air, water and soft tissues were measured experimentally and the CT values of air, fat and muscle were measured in a clinical case. The diameter of each hole drilled in the phantom was measured on CBCT and MDCT images using the software tool and digimatic callipers. Results: The CBCT values were quite different from the Hounsfield units obtained with a typical MDCT system. The standard deviations were almost ten times larger with CBCT. In vivo assessment ...

Journal ArticleDOI
TL;DR: In this paper, a theoretical and experimental study of various radial configurations, including hydrodynamic lubrication to improve dynamic performance of the magnetic bearing, was conducted to investigate the performance of bearing configurations under different operating conditions.
Abstract: A radial magnetic bearing, consisting of two permanent magnets, is an attractive choice because of its zero wear, negligible friction, and low cost, but it suffers from low load capacity, low radial stiffness, lack of damping, and high axial instability. To enhance the radial load and radial stiffness, and reduce the axial thrust, we have made a theoretical and experimental study of various radial configurations, including hydrodynamic lubrication to improve dynamic performance of the magnetic bearing. We developed an experimental setup to investigate the performance of bearing configurations under different operating conditions. The motion of a rotating shaft is mapped by two displacement sensors with a data acquisition system and personal computer. The first critical speed of each configuration is determined experimentally and verified through frequency analysis. We present a polar plot of displacement data.

Journal ArticleDOI
TL;DR: An automated method for multi-sector ultrasound imaging through retrospective electrocardiogram (ECG) gating on a clinically used open architecture system could expand the range of applications in cardiovascular elasticity imaging for quantitative, noninvasive diagnosis of myocardial ischemia or infarction, arrhythmia, abdominal aortic aneurysms, and early-stage atherosclerosis.
Abstract: High frame-rate ultrasound RF data acquisition has been proved to be critical for novel cardiovascular imaging techniques, such as high-precision myocardial elastography, pulse wave imaging (PWI), and electromechanical wave imaging (EWI). To overcome the frame-rate limitations on standard clinical ultrasound systems, we developed an automated method for multi-sector ultrasound imaging through retrospective electrocardiogram (ECG) gating on a clinically used open architecture system. The method achieved both high spatial (64 beam density) and high temporal resolution (frame rate of 481 Hz) at an imaging depth up to 11 cm and a 100% field of view in a single breath-hold duration. Full-view imaging of the left ventricle and the abdominal aorta of healthy human subjects was performed using the proposed technique in vivo. ECG and ultrasound RF signals were simultaneously acquired on a personal computer (PC). Composite, full-view frames both in RF- and B-mode were reconstructed through retrospective combination of seven small (20%) juxtaposed sectors using an ECG-gating technique. The axial displacement of the left ventricle, in both long-axis and short-axis views, and that of the abdominal aorta, in a long-axis view, were estimated using a RF-based speckle tracking technique. The electromechanical wave and the pulse wave propagation were imaged in a cineloop using the proposed imaging technique. Abnormal patterns of such wave propagation can serve as indicators of early cardiovascular disease. This clinical system could thus expand the range of applications in cardiovascular elasticity imaging for quantitative, noninvasive diagnosis of myocardial ischemia or infarction, arrhythmia, abdominal aortic aneurysms, and early-stage atherosclerosis.

PatentDOI
TL;DR: In this paper, a transducer is tilted at an angle other than perpendicular to the skin surface generally towards or away from the direction in which the transducers are translated, and a component of the motion measured is angle corrected and used to determine a distance of travel.
Abstract: Methods and systems for measuring transducer movement are provided. For example, free-hand scanning for three-dimensional imaging is provided. An optical sensor within the transducer measures motion along the skin surface similar to measuring movement of a personal computer mouse with an optical sensor. Alternatively or additionally, the transducer is tilted at an angle other than perpendicular to the skin surface generally towards or away from the direction in which the transducer is translated. The transducer is then translated while maintaining the angle. Motion to or from the transducer is measured, and a component of the motion measured while the transducer is maintained at an angle is parallel to the direction of translation. The component of motion is angle corrected and used to determine a distance of travel.

Patent
14 May 2008
TL;DR: In this paper, an apparatus includes a monocular display with a wireless communications interface, a user input device, a transmitter, and a controller, positioned relative to the user's eye.
Abstract: An apparatus includes a monocular display with a wireless communications interface, a user input device, a transmitter, and a controller. The monocular display is positioned relative to the user's eye to display images to the user while occluding less than half of the user's maximum viewing space. The apparatus can incorporate a wireless communication controller that not only provides a video link to a host device, but also provides for control and management of a host device and other more devices. In this context, a host device may be any appropriate device that sources audio, video, text, office functionality and other information, such as a cell phone, personal computer, laptop, media player, and/or the like. The apparatus and the host may support Microsoft Windows SideShow, Remote Desktop Protocol (RDP), and Virtual Network Computing (VNC).

Journal ArticleDOI
TL;DR: Proactive computing and wearable computing working in tandem let computers fade into the woodwork, enriching quality of life and engendering independence.
Abstract: The commoditization of computer hardware and software has enabled a new computing paradigm whereby computers will sense, calculate, and act on our behalf, either with or without human interaction as best fits the circumstances. Further, this will occur in an everyday environment, not just when a person is working at a desk. This paradigm shift was made possible by the inexorable increase in computing capabilities as we moved from mainframes (one computer, many people) to the personal computer (one computer, one person) to ubiquitous computing (many computers, one person). It is not uncommon to find a single person managing a desktop PC, laptop, cell phone, PDA, and portable media player. Today, these devices are discrete and managed individually. But as ubiquitous computing evolves, the computers will become both more numerous and less visible; they will be integrated into everyday life in a way that does not call attention to their presence. In the context of medicine, ubiquitous computing presents an exciting challenge and a phenomenal opportunity. Proactive computing is a form of ubiquitous computing in which computers anticipate the needs of people around them. Wearable computing results from placing computers and sensors on the body to create a body area network (BAN) that can sense, process, and report on some set of the wearer's attributes. Proactive computing and wearable computing working in tandem let computers fade into the woodwork, enriching quality of life and engendering independence.

Journal ArticleDOI
TL;DR: This paper empirically examines the diffusion of hospital information systems, specifically, pharmacy, laboratory, and radiology systems, and finds that IS adoption is related to multi-hospital system membership, payer mix, and hospital scale.
Abstract: This paper empirically examines the diffusion of hospital information systems (ISs), specifically, pharmacy, laboratory, and radiology systems. Given the policy significance of health IS and the widespread perception that it's diffusion is slow, a better understanding of the mechanisms driving IS adoption is needed. A novel data set incorporating both IS adoption and hospital characteristics was constructed. These data follow the behavior of 1965 hospitals for the years 1990–2000. Hypotheses pertaining to hospital characteristics, hospital competition, and strategic behavior are tested utilizing proportional hazard models. I find that IS adoption is related to multi-hospital system membership, payer mix, and hospital scale. The role of scale, however, significantly diminishes throughout the time period, likely reflecting improved personal computer performance and improved IT scalability. Conversely, I find little that strategic behavior or hospital competition affects IS adoption. Likewise, hospital ownership does not affect the adoption of these systems. Overall, these results suggest that hospital IS diffusion has not been normatively slow. Copyright © 2007 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: The IB-IVUS system provides high diagnostic accuracy for analysis of tissue characteristics of coronary plaques and classified fibrous, lipid-rich and fibrocalcific plaque components with a high accuracy of 93%, 90% and 96%, respectively.
Abstract: Tissue characterization of plaques of coronary arteries is important to clarify the process of acute coronary syndrome and prevent it. The purpose of this study is to develop an online integrated backscatter intravascular ultrasound (IB-IVUS) system and validate the diagnostic accuracy for the characterization of coronary plaques. A personal computer equipped with custom software was connected to an IVUS imaging system. Images were acquired from 242 segments of 46 coronary arteries from 25 cadavers obtained at autopsy. In the training study, a total of 724 regions-of-interests on color-coded maps were compared with histologic images. In the validation study, a total of 192 cross-sections of coronary arteries were evaluated. Receiver operating characteristic curve analysis showed that the cut-off points of −49 dB (area under curve = 0.98) and −29 dB (area under curve = 0.99) were the most reliable predictors of lipid pools, fibrosis and calcification. In the validation study, the analysis using IB values classified fibrous, lipid-rich and fibrocalcific plaque components with a high accuracy of 93%, 90% and 96%, respectively. The overall agreement between histologic and IB-IVUS diagnoses (n = 175) was high (Cohen’s κ = 0.81). The IB-IVUS system provides high diagnostic accuracy for analysis of tissue characteristics of coronary plaques. (E-mail: masanori@ya2.so-net.ne.jp )

Journal ArticleDOI
TL;DR: The authors describe the implementation of a psychoeducational intervention using a hybrid model combining computer‐ and web‐based delivery with professional intervention via phone calls, electronic messages, and home visits to promote behavioral change in parents and children.
Abstract: Increases in personal computer ownership and Internet use patterns provide a potential avenue for dissemination of evidence-based prevention and treatment interventions. The authors describe the implementation of a psychoeducational intervention (the Incredible Years parenting program, which is designed to promote behavioral change in parents and children) using a hybrid model combining computer- and web-based delivery with professional intervention via phone calls, electronic messages, and home visits. The model attempted to simulate many of the parent training methods shown to be successful in the original program. The intervention was implemented with 90 Head Start families who reported elevated levels of child behavior problems. Of the 45 families offered the intervention in the final year of the project, 37 (82%) completed at least half the program and 34 (76%) completed the entire intervention using procedures refined in light of the initial year's experience. These participants reported high achievement of their self-determined goals and were highly satisfied with the intervention. The combination of technology with professional coaching represents a potential model for adapting and disseminating evidence-based interventions.

Journal ArticleDOI
TL;DR: The goal of this development is to provide a new diagnostic tool that offers the user a reproducible, easy access to a fast and spatially resolved diagnostic 'heart view'.
Abstract: Capacitive sensors can be employed for measuring the electrocardiogram of a human heart without electric contact with the skin. This configuration avoids contact problems experienced by conventional electrocardiography. In our studies, we integrated these capacitive electrocardiogram electrodes in a 15-sensor array and combined this array with a tablet personal computer. By placing the system on the patient's body, we can measure a 15-channel electrocardiogram even through clothes and without any preparation. The goal of this development is to provide a new diagnostic tool that offers the user a reproducible, easy access to a fast and spatially resolved diagnostic 'heart view'.

Journal ArticleDOI
TL;DR: Technology provides students at DSST with high-quality tools to explore scientific concepts and the experiences of teachers and students illustrate effective uses of digital technology for high school physics.
Abstract: 1:1 laptop programs, in which every student is provided with a personal computer to use during the school year, permit increased and routine use of powerful, user-friendly computer-based tools. Growing numbers of 1:1 programs are reshaping the roles of teachers and learners in science classrooms. At the Denver School of Science and Technology, a public charter high school where a large percentage of students come from low-income families, 1:1 laptops are used often by teachers and students. This article describes the school’s use of laptops, the Internet, and related digital tools, especially for teaching and learning physics. The data are from teacher and student surveys, interviews, classroom observations, and document analyses. Physics students and teachers use an interactive digital textbook; Internet-based simulations (some developed by a Nobel Prize winner); word processors; digital drop boxes; email; formative electronic assessments; computer-based and stand-alone graphing calculators; probes and associated software; and digital video cameras to explore hypotheses, collaborate, engage in scientific inquiry, and to identify strengths and weaknesses of students’ understanding of physics. Technology provides students at DSST with high-quality tools to explore scientific concepts and the experiences of teachers and students illustrate effective uses of digital technology for high school physics.