Event marker compliance in actigraphy
نویسندگان
چکیده
منابع مشابه
Abducing Compliance of Incomplete Event Logs
The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of han...
متن کاملJMS Compliance in the Narada Event Brokering System
Narada is a distributed event brokering system based on the publish/subscribe paradigm and is designed to run on a very large network of broker nodes. This paper describes the process of achieving Java Message Service (JMS) compliance in the Narada system. The paper also describes our strategy for bringing Narada’s benefits – scaling, availability, routing efficiencies and failure resiliency – ...
متن کاملActigraphy and Accelerometry
Actigraphy testing consists of a small portable device (actigraph) that senses physical motion and stores the resulting information. Actigraphy testing has been predominantly used in research studies to evaluate rest-activity cycles in patients with sleep disorders, to determine circadian rhythm activity cycles, and to determine the effect of a treatment on sleep. The actigraph is most commonly...
متن کاملActigraphy, the Alternative Way?
The gold standards for measurement of sleep and wake are polysomnography (PSG) and the multiple sleep latency test (MSLT) and will remain so. Both tests are labor intensive and expensive when seen from the viewpoint of the sleep laboratory and a heavy burden for the patient, in particular for children and their parents. Furthermore, the use of MSLT in children is hampered by the lack of reliabl...
متن کاملService-oriented Event Assessment – Closing the Gap of Compliance Management
Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks. Since the Enron bankruptcy, monitoring of privileged access to financial data has become a legal requirement stipulated for example in the Sarbanes-Oxley Act (SOX 404). Monitoring of privileged access requires evaluat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sleep Research
سال: 2019
ISSN: 0962-1105,1365-2869
DOI: 10.1111/jsr.12933