Search or add a thesis

Advanced Search (Beta)
Home > Correlating Carotid Imaging and Phylogenetic Trees for the Pre and Post Analysis of Genetic Ischemic Strokes

Correlating Carotid Imaging and Phylogenetic Trees for the Pre and Post Analysis of Genetic Ischemic Strokes

Thesis Info

Access Option

External Link

Author

Iftikhar, Huma

Program

PhD

Institute

Lahore College for Women University

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/6678/1/Huma_Iftikhar_Computer_Sciences_2015_LCWU_lahore.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727722426

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Ischemic stroke is the most commonly occurring type of stroke and one of the most communal causes for disability and death in the world as per World Health Organization. Multiple factors such as hypertension, diabetes, arterial fibrillation, heart diseases, transient ischemic strokes, etc. contribute to ischemic stroke susceptibility. There is a compelling need for follow up checkups and post analysis to prevent further strokes. Apart from clinical tests, a lot of research is being carried out on computer based automated techniques and mechanisms for estimation of ischemic stroke risk. Ultrasound images of the carotid artery are used for development of noninvasive image based methods for stroke risk estimation however; carotid artery morphology, noise and artifacts in the ultrasound images can lead to false classification. Carotid intima media thickness is an indicator of future ischemic stroke. In this research, we have proposed an automatic ischemic stroke risk estimation approach using carotid intima media thickness from longitudinal carotid B-mode ultrasound images. Based on carotid intima media thickness, a classification scheme is proposed to associate the carotid artery stenosis with ischemic stroke risk. The proposed approach is tested and clinically validated on a data set of 100 longitudinal ultrasound images of the carotid artery. There is no significant difference between intima media thickness measurements obtained using our approach and the manual measurements by experts. The intra-observer error of 0.088, a Coefficient of Variation of 12.99%, Bland-Altman plots with small differences between experts (0.01 and 0.03 for Expert 1 and Expert 2, respectively) and Figure of Merit of 98.5% are obtained. The proposed approach makes the risk estimation process automatic and yet reduces the risk of subjectivity and operator variability for intima media thickness measurement. Additionally, some of stroke cases are suspected to be genetic as the patients do not suffer from the conventional risk factors. Extensive research has been conducted to investigate the unknown factors other than the conventional ones and their relationship with genetics. We have analyzed genotype data for stroke risk estimation. Nine classification models are used on the SNPs data to analyze and classify individuals. An accuracy of 88.16% is achieved by the proposed approach. Ischemic stroke risk has been correlated with genetic distances. For this purpose phylogenetic trees have been used. Analysis suggests that given two populations might be genetically close but they might be far with respect to ischemic stroke risk. Proposed research has addressed both the medical image analysis and genetic data analysis for stroke risk estimation. The proposed approach has achieved higher accuracy, specificity and sensitivity values when compared to existing approaches.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

المبحث السادس: وفاتها

المبحث السادس: وفاتها
خرجت بروین شاکر في صباح 26 دیسمبر 1994م في الساعۃ التاسعۃ حسب الروتین الیومي من بیتھا ذاھبۃ إلی عملھا، ولکن بسبب انقطاع الکھرباء کانت الإشارات (إشارات المرور، أو إشارات الطریق) لا تعمل، وکان سائقھا أراد أن یقطع الطریق فاصطدم بالباص الممتلئ بالمسافرین، توفي السائق في مکان الحادث علی الفور، ونُقلت الشاعرۃ في حالۃ خطرۃ إلی مستشفی إسلام آباد، حاول الأطباء مداواتها ولكن لم يفلحوا۔
وبوفاۃ الشاعرۃ المعروفۃ بروین شاکر قامت ضجۃ في الأدب الأردو، وقد فقد الأدب والشعر الأردو أکبر منتج لدیهما۔ وھذا الموت المفاجيء قد أصاب علی الشعر الحديث بمسحة من الیأس والحرمان۔ ودُفنت الشاعرۃ في26 دیسمبر في مقبرۃ (H.8) ایتش، ایت في إسلام آباد. تقول الشاعرۃ:
مر بھی جاؤں تو کہاں لوگ بُھلا ہی دیں گے
لفظ میرے، مرے ہونے کی گواہی دیں گے

الترجمہ: إ ذا متت، فالناس لن تنساني
کلماتي، ستشھد علی وفاتي

مسیحیت، اناجیل اربعہ اور بنیادی مسیحی عقائد کا مختصر تعارف

Christianity is the top most practiced religion on earth and has over a billion followers across the nations. It is therefore a very important topic of interest in the field of comparative religious studies. To understand the ideology of this religion, it is very important to get familiarize with the name, introduction to its believes, the important scriptures and references. This article encompasses the Introduction of: Christianity, Canonical Gospels and 3.         Basic believes/ belief system of Christianity

Protection of Client Data Confidentiality and Computation Integrity in Infrastructure As a Service Based Cloud

One of the most critical issue to the wide adoption of cloud-based services is the concern about the client data confidentiality and computation integrity. Research work [Wang et al., 2015][Vasudevan et al., 2016] in the past on cloud platforms security has predominantly focused either on protecting these platforms from malicious cloud clients or on protecting cloud clients from each others unwanted activities. The problem of protecting clients from the possible malicious acts of insiders such as cloud providers is not adequately addressed. In this dissertation, we present a practical approach to protect client data confidentiality and computation integrity from cloud insiders, such as cloud administrator, in an infrastructure-as-a-service (IaaS) based cloud environment. Our approach makes use of remote attestation[Coker et al., 2011], and a late launch based technique, called Flicker[McCune et al., 2008], to verify the integrity of the cloud platform. This technique secures the virtual machine (VM) launch operation and further allows the launched VM to perform operations on sensitive data in full isolation. We have demonstrated through a real-world scenario of how the origin integrity and authenticity of health-care multimedia content processed on the cloud providers platform can be verified using digital watermarking in a secure and isolated execution environment without revealing the watermark details to the cloud administrator. We have also demonstrated using formal verification tool ProVerif that cryptographic operations and protocol communication cannot be compromised using a realistic attacker model. Performance analysis of our implementation demonstrates that it adds negligible overhead. In this dissertation, we have also presented a framework to rank cloud platform nodes according to the security guarantees they provide. Platform ranking helps to meet the needs of organizations with different security requirements. The framework introduces averification is indirectly perform Trusted Party (TP) for the verification of security properties of a cloud platform to the clients. The given framework is also thin client friendly as platform attestation and verification is indirectly performed through TP without the direct involvement of clients. Performance analysis shows that the cost of our presented approach is lower in order of magnitude when compared with traditional trusted computing based solutions.