The creation of tools, techniques and methodologies to support the manipulation of large data sets has been receiving special attention of both scientific and industrial communities, in order to discover new ways of d...
详细信息
The creation of tools, techniques and methodologies to support the manipulation of large data sets has been receiving special attention of both scientific and industrial communities, in order to discover new ways of dealing with the underlying information, including learning purposes, identification of patterns, decision making support, amongst others. However, making use of computing resources to enhance awareness and understanding of software information and the software itself is still a challenge in software/systems engineering, since it involves the identification of suitable mechanisms, adequate abstractions, and studies on stimulation of the human perceptive and cognitive abilities. This paper presents some of the challenges in this context, based on current trends of software development lifecycle, program comprehension, and software engineering education. At the end, a special focus is given on ongoing research on using and improving current mechanisms for supporting software reuse practices and software comprehension in general.
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards add...
详细信息
ISBN:
(纸本)9781424441198
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.
The recent advances in Grid and Cloud computing make new types of applications possible. At the same time, they require an infrastructure to implement heterogeneous computing resources time and cost-savely. Here, appr...
详细信息
The recent advances in Grid and Cloud computing make new types of applications possible. At the same time, they require an infrastructure to implement heterogeneous computing resources time and cost-savely. Here, approaches that utilize design patterns, i.e., proven solutions to existing problems, seem to provide a good approach to enable these kind of applications. In this paper, we investigated which design patterns are already used in the area of Grid computing nowadays. After a brief description of the literature study design, we present our findings which include the discovered design patterns, corresponding categories, and application areas.
Health examination has played an important role for maintaining people's health since it can not only help people understand their own health conditions clearly but also avoid missing the best timing of disease tr...
详细信息
Health examination has played an important role for maintaining people's health since it can not only help people understand their own health conditions clearly but also avoid missing the best timing of disease treatment. However, in current health examination systems, people get only a basic report from single health examination and no advanced health risk analysis is provided. In this paper, we proposed an effective mechanism for chronic disease risk prediction by mining the data containing historical health records and personal life style information. Value change trends of the data are important for disease status prediction, and we defined significant ones as health risk patterns in our mechanism. Risks of a chronic disease can be predicted early with a mechanism built with our health risk patterns and it also proven work well through experimental evaluations on real datasets. Our method outperformed traditional mechanism in terms of accuracy, precision and sensitivity for predicting the risk of diabetes. In particular, insightful observations show that the consideration of life-style information can effectively enhance whole performance for risk prediction. Moreover, classification rules produced by our mechanism which integrates C4.5 and CBA provide physicians disease related health risk patterns such that appropriate treatments could be given to people for disease prevention.
This paper presents a methodology for roughness analysis based on surface characteristics of images obtained from optical and electronic microscopes. Texture analysis has been widely used in different fields, such as ...
详细信息
This paper presents a methodology for roughness analysis based on surface characteristics of images obtained from optical and electronic microscopes. Texture analysis has been widely used in different fields, such as medical image analysis, visual interpretation of remote sensing images, image search and industrial quality inspection of manufactured products, which is the focus of this paper. We present a novel method of analysis based on texture characteristics. The Haralick descriptors are used to describe the surface texture and to classify its roughness. The primary roughness standards are evaluated and classified according to several features considering these descriptors. The set of values is the input of a multilayer perceptron artificial neural network. The obtained results show that it can be possible to advance this methodology in order to develop a roughness digital measurement system for the evaluation of surface ending process.
The present paper deals with the development of a database in order to manage all the data regarding the well-preserved radiolarian assemblages from the Kalur Cherts of Albania. This data are reported from 18 chert se...
详细信息
Sensor nodes of Wireless Sensor Networks (WSNs) are resource constraints in energy, memory, processing and communication bandwidth. Since they are operated by battery, their life span is limited. Specially, energy con...
详细信息
ISBN:
(纸本)9781467321723
Sensor nodes of Wireless Sensor Networks (WSNs) are resource constraints in energy, memory, processing and communication bandwidth. Since they are operated by battery, their life span is limited. Specially, energy conservation is very important issue in the WSN, because it directly affects the life of the node as well as the entire network. Here, we develop a new way of electing a node among many trustworthy nodes for routing processes. This method consumes the energies of network nodes based on Fuzzy logic applied on their residual energy, trust level and distance from the Base Station. The proposed method elects one indispensible node for participating in routing among many worthy nodes. Hence, this method of election of node for routing in WSN sees the conservation of nodes energies go by very smooth and justifying, thereby increasing the life of the WSN.
In this work, we present the use of Shannon and Simpson Diversity Indices as texture descriptors for lung nodules in computerized Tomography (CT) images. These indices will be proposed to characterize the nodules into...
详细信息
This paper presents an interface that allows a human user to specify a desired path for a mobile robot in a planar workspace with noisy binary inputs that are obtained at low bit-rates through an electroencephalograph...
详细信息
ISBN:
(纸本)9781467317375
This paper presents an interface that allows a human user to specify a desired path for a mobile robot in a planar workspace with noisy binary inputs that are obtained at low bit-rates through an electroencephalograph (EEG). We represent desired paths as geodesics with respect to a cost function that is defined so that each path-homotopy class contains exactly one (local) geodesic. We apply max-margin structured learning to recover a cost function that is consistent with observations of human walking paths. We derive an optimal feedback communication protocol to select a local geodesic-equivalently, a path-homotopy class-using a sequence of noisy bits. We validate our approach with experiments that quantify both how well our learned cost function characterizes human walking data and how well human subjects perform with the resulting interface in navigating a simulated robot with EEG.
Knowledge Management System (KMS) is one way to organize and documented the knowledge of institution. The purpose of this study is to develop a prototype KMS in organizing and documenting the knowledge in the universi...
详细信息
暂无评论