We report the design and experimental results of an electrically pumped Silicon/AlGaInAs evanescent laser with right-angled-wedge reflector defined in the silicon layer. A continuous-wave laser with a lasing threshold...
详细信息
In this paper, we present an approach to automate the planning of an endovascular stent graft for abdominal aortic aneurysms (AAAs), which are treated with bifurcated prosthesis (Y-stents) when located close to the il...
详细信息
The application of WSN is emerging as a new trend in different sphere of modern society. However due to the advancement of SWE, discovering sensor web registry services throughout heterogeneous environments is becomin...
详细信息
The application of WSN is emerging as a new trend in different sphere of modern society. However due to the advancement of SWE, discovering sensor web registry services throughout heterogeneous environments is becoming a challenging task and raises several concerns like performance, reliability, and robustness. Many approaches and frameworks have been proposed to discover the sensor web registry services. Some of the approaches assume that the requests are placed in SOAP compatible formats while others focus on GUI based parametric query processing. We have formulated an approach that uses the Natural Language Query Processing which is a convenient and easy method of sensor data access in comparison to SQL or XML based Query Language like XQuery and XPath. We also propose an architecture based on x-SOA that organizes the method of sensor web registry service discovery in an efficient and structured manner using an intermediary, requester friendly layer called the Request Parser & Query Generator (RPQ) between the service provider and service requester via a service registry. We describe how RPQ facilitates the processing of plain text request query to a most appropriate sensor web service and also an algorithm with implementation for a complete cycle of sensor web registry service discovery.
We present an interactive visualization system for the analysis of Gaussian mixture speaker models. The system exhibits the inner workings of the model intuitively by visualizing graphical representations of its param...
详细信息
We present an interactive visualization system for the analysis of Gaussian mixture speaker models. The system exhibits the inner workings of the model intuitively by visualizing graphical representations of its parameters and of the underlying acoustical data at the same time. This enables the exploration of new modeling possibilities in the context of speaker clustering tasks.
An electrically-pumped heterogeneously integrated Si/AlGaInAs evanescent laser with micro-loop mirror as high reflectors at both ends is experimentally demonstrated. Single spatial mode CW lasing is achieved with a th...
详细信息
Skin analysis is one of the most important procedures before medical cosmetology. Most conventional skin analysis systems are semi-automatic. They often require human intervention. In this study, an automatic facial s...
详细信息
In this paper, we propose an arrangement and detection method of an invisible calibration pattern based on characteristics of human visual perception. A calibration pattern is arranged around contents where invisible ...
详细信息
A computer-based model has been developed to explore the effects of lasers on the eye. The model was developed using a technique known as BioFusion®, which embodies a software engineering and knowledge acquisitio...
详细信息
Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspe...
详细信息
Side-channel attacks have changed the design of secure cryptographic systems dramatically. Several published attacks on implementations of well known algorithms such as, e.g., AES, show the need to consider these aspects to build more resistant cryptographic systems. On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource-and power-efficient. These can be either modified existing or completely new ones. One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. While it has been evaluated in a number of practical applications in the past, its side-channel resistance has not been examined yet. We would like to close this gap and present a side-channel attack strategy as well as results gathered from measurements made on a real implementation.
In this paper, we present an approach to automate the planning of an endovascular stent graft for abdominal aortic aneurysms (AAAs), which are treated with bifurcated prosthesis (Y-stents) when located close to the il...
详细信息
In this paper, we present an approach to automate the planning of an endovascular stent graft for abdominal aortic aneurysms (AAAs), which are treated with bifurcated prosthesis (Y-stents) when located close to the iliac bifurcation. During the intervention, the folded Y-stent graft - consisting of several parts - is inserted via the iliac region and expanded inside the patient's body. The first step of the proposed approach is to detect different body landmarks with a statistical method. In the next step, these landmarks are used to calculate two vascular centerlines, which provide multiplanar reformatting (MPR) slices that are used for an automatic segmentation of the artery walls. The segmented artery walls provide the manufacturer specific measures to choose an adequate bifurcated prosthesis. In a final step, the expansion of the stent is simulated in the patient's data. Results for 50 abdominal aortic aneurysm cases provided by computed tomography angiography (CTA) acquisitions are successfully verified by a virtual stenting expert.
暂无评论