Learn More
BACKGROUND The arterial switch operation (ASO) represents a remarkable success story in the surgical treatment of cyanotic congenital heart disease. This study is designed to assess recent outcomes after the ASO in babies presenting with transposition of the great arteries (TGA) and Taussig-Bing anomaly (TBA). METHODS One hundred twenty-five consecutive(More)
Electroencephalograph (EEG) analysis enables the dynamic behavior of the brain to be examined. If the behavior is nonlinear then nonlinear tools can be used to glean information on brain behavior, and aid in the diagnosis of sleep abnormalities such as obstructive sleep apnea syndrome (OSAS). In this paper the sleep EEGs of a set of normal children and(More)
Quantifying the stability of the spinal column offers a perspective on the effectiveness of the motor control strategy to ensure a stable spine--and minimize the risk of injury from experiencing an unstable event. There are essentially three energy based methods of calculating a stability index for the lumbar spine. All three methods involve mathematical(More)
The Kish key distribution system has been proposed as a classical alternative to quantum key distribution. The idealized Kish scheme elegantly promises secure key distribution by exploiting thermal noise in a transmission line. However, we demonstrate that it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission(More)
We develop an analytically solvable three-state discrete-time minimal Brownian ratchet (MBR), where the transition probabilities between states are asymmetric. By solving the master equations, we obtain the steady-state probabilities. Generally, the steady-state solution does not display detailed balance, giving rise to an induced directional motion in the(More)
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law– Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity(More)
In this paper, we develop two automated authorship attribution schemes, one based on Multiple Discriminant Analysis (MDA) and the other based on a Support Vector Machine (SVM). The classification features we exploit are based on word frequencies in the text. We adopt an approach of preprocessing each text by stripping it of all characters except a-z and(More)
OBJECTIVE We examined relationships of individual and environmental factors with obesity and trying to lose weight in rural residents. METHODS The joint contributions of individual and environmental factors on obesity status (obese vs. morbidly obese) and trying to lose weight (yes vs. no) were evaluated using generalized estimating equations. Patients at(More)
Noise is present in the wide variety of signals obtained from sleep patients. This noise comes from a number of sources, from presence of extraneous signals to adjustments in signal amplification and shot noise in the circuits used for data collection. The noise needs to be removed in order to maximize the information gained about the patient using both(More)
This paper explores the use of genetic algorithms for the design of networks, where the demands on the network fluctuate in time. For varying network constraints, we find the best network using the standard genetic algorithm operators such as inversion, mutation and crossover. We also examine how the choice of genetic algorithm operators affects the quality(More)