Tissue Doppler is used to evaluate mitral annulus (MA) dynamics. This technique has two major limitations: it is two-dimensional and angle-dependent. To solve these limitations, our aim was to develop and test a tool ...
详细信息
ISBN:
(纸本)1424425328
Tissue Doppler is used to evaluate mitral annulus (MA) dynamics. This technique has two major limitations: it is two-dimensional and angle-dependent. To solve these limitations, our aim was to develop and test a tool for automated 3D tracking and quantification of the MA motion throughout the cardiac cycle by using real-time 3D echocardiography (RT3DE). The tracking algorithm was developed using a combination of two optical flow techniques in the 3D space. Transthoracic RT3DE imaging was performed in 45 subjects, including 15 normal subjects (NL) and 30 patients with mitral regurgitation (MR) due to dilated (n=15, DCM-MR) or ischemic (n=15, ISC-MR) cardiomyopathy. Our technique allowed the evaluation of MA geometry and the quantification of MA function parameters from RT3DE images, which were able to discriminate between NL, DCM-MR and ISC-MR subjects.
The correctness of workflow models is one of the major challenges in context of workflow analysis. The aim of this paper is to provide an improved Petri net-based reduction approach for verifying the correctness of wo...
详细信息
The correctness of workflow models is one of the major challenges in context of workflow analysis. The aim of this paper is to provide an improved Petri net-based reduction approach for verifying the correctness of workflow models. To the end, how to represent well-behaved building blocks and control structures of business processes by Petri nets is given at first, and then how to build well-structured process nets is presented. According to the structural characteristics of well-structured process nets, a set of legacy reduction rules are improved and extended, and then a complete Petri-net-based verification approach is proposed. The sound ness and the complexity with polynomial time for the improved re duction method are also proven.
We present a technique for compiling model transformations defined by a combination of graph transformation and abstract state machine rules (as used within the VIATRA2 framework) into stand-alone transformer plugins ...
详细信息
ISBN:
(纸本)1595931082
We present a technique for compiling model transformations defined by a combination of graph transformation and abstract state machine rules (as used within the VIATRA2 framework) into stand-alone transformer plugins for the EJB 3.0 platform. As a result, the design of transformations can be separated from the execution of transformations. This also enables to run VIATRA2 model transformations on very large models stored in underlying relational databases or to integrate such transformations into existing business applications. Copyright 2006 ACM.
The block entropies computed by lumping and gliding are calculated for the binary expansions of the Feigenbaum constants α and δ, and for sqrt(2). Small but significant deviations from randomness are revealed for th...
详细信息
The current best conformant probabilistic planners encode the problem as a bounded length CSP or SAT problem. While these approaches can find optimal solutions for given plan lengths, they often do not scale for large...
详细信息
Security-oriented risk assessment tools are used to determine the impact of certain events on the security status of a network. Most existing approaches are generally limited to manual risk evaluations that are not su...
详细信息
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime reconstruction. Based on a hypothesis of th...
详细信息
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were...
详细信息
In the TREC 2005 Spam Evaluation Track, a number of popular spam filters - all owing their heritage to Graham's A Plan for Spam - did quite well. Machine learning techniques reported elsewhere to perform well were hardly represented in the participating filters, and not represented at all in the better results. A non-traditional technique - Prediction by Partial Matching (PPM) - performed exceptionally well, at or near the top of every test. Are the TREC results an anomaly? Is PPM really the best method for spam filtering? How are these results to be reconciled with others showing that methods like Support Vector Machines (SVM) are superior? We address these issues by testing implementations of five different classification methods on the TREC public corpus using the online evaluation methodology introduced in TREC. These results are complemented with cross validation experiments, which facilitate a comparison of the methods considered in the study under different evaluation schemes, and also give insight into the nature and utility of the evaluation regimens themselves. For comparison with previously published results, we also conducted cross validation experiments on the Ling-Spam and PU1 datasets. These tests reveal substantial differences attributable to different test assumptions, in particular batch vs. on-line training and testing, the order of classification, and the method of tokenization. Notwithstanding these differences, the methods that perform well at TREC also perform well using established test methods and corpora. Two previously untested methods - one based on Dynamic Markov Compression and one using logistic regression - compare favorably with competing approaches.
Digital watermarking techniques have been considered as an effective solution to protect the copyright of multimedia data. In this paper, an image watermarking scheme based on discrete wavelet transform is proposed. T...
详细信息
Digital watermarking techniques have been considered as an effective solution to protect the copyright of multimedia data. In this paper, an image watermarking scheme based on discrete wavelet transform is proposed. The watermarks are two-dimension self-orthogonal finite-length sequences which are embedded in the middle frequency wavelet coefficients. Watermark detection is accomplished without the original image by computing the correlation between the watermarked coefficients and the watermarking signal. Experiment results show that the proposed watermarking scheme is perceptual invisible and robust against attacks such as JPEG compression, additive noise and filtering.
暂无评论