Event marker compliance in actigraphy

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Abducing Compliance of Incomplete Event Logs

The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of han...

متن کامل

JMS Compliance in the Narada Event Brokering System

Narada is a distributed event brokering system based on the publish/subscribe paradigm and is designed to run on a very large network of broker nodes. This paper describes the process of achieving Java Message Service (JMS) compliance in the Narada system. The paper also describes our strategy for bringing Narada’s benefits – scaling, availability, routing efficiencies and failure resiliency – ...

متن کامل

Actigraphy and Accelerometry

Actigraphy testing consists of a small portable device (actigraph) that senses physical motion and stores the resulting information. Actigraphy testing has been predominantly used in research studies to evaluate rest-activity cycles in patients with sleep disorders, to determine circadian rhythm activity cycles, and to determine the effect of a treatment on sleep. The actigraph is most commonly...

متن کامل

Actigraphy, the Alternative Way?

The gold standards for measurement of sleep and wake are polysomnography (PSG) and the multiple sleep latency test (MSLT) and will remain so. Both tests are labor intensive and expensive when seen from the viewpoint of the sleep laboratory and a heavy burden for the patient, in particular for children and their parents. Furthermore, the use of MSLT in children is hampered by the lack of reliabl...

متن کامل

Service-oriented Event Assessment – Closing the Gap of Compliance Management

Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks. Since the Enron bankruptcy, monitoring of privileged access to financial data has become a legal requirement stipulated for example in the Sarbanes-Oxley Act (SOX 404). Monitoring of privileged access requires evaluat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sleep Research

سال: 2019

ISSN: 0962-1105,1365-2869

DOI: 10.1111/jsr.12933