Lumbar area of the vertebral column bears the most load of the human body and thus it is responsible for the major portion of lower back pain from which 80% to 90% of people suffer from during their lifetime. Vertebra...
详细信息
ISBN:
(纸本)9781424441211
Lumbar area of the vertebral column bears the most load of the human body and thus it is responsible for the major portion of lower back pain from which 80% to 90% of people suffer from during their lifetime. Vertebra related diseases are mainly fracture and are usually diagnosed from X-ray radiographs or CT scans depending on the severity of the problem. In this paper, we propose a fully automated lumbar vertebra segmentation that accurately and robustly produces a smooth contour around each of the vertebrae. This segmentation is very useful in any subsequent CAD system for diagnosis and quantification of vertebrae fractures. It also serves the radiologist during the clinical routine. Our method shows an excellent level of vertebra boundary smootheness that was visually approved by our collaborating radiologist for each vertebra and each case from our fifty cases dataset that includes both normal and abnormal cases.
Extracting objects related to a fold in the cerebral cortex ("sulcus features") from human brain magnetic resonance imaging data has applications in morphometry, landmark-based registration, and anatomical l...
详细信息
ISBN:
(纸本)9781424441198
Extracting objects related to a fold in the cerebral cortex ("sulcus features") from human brain magnetic resonance imaging data has applications in morphometry, landmark-based registration, and anatomical labeling. In prior work, sulcus features such as surfaces, fundi and pits have been extracted separately. Here we define and extract nested sulcus features in a hierarchical manner from a cortical surface mesh having curvature or dept. values. Our experimental results show that the nested features are comparable to features extracted separately using other methods, and that they are consistent across subjects and with manual label boundaries. Our open source feature extraction software will be made freely available as part of the Mindboggle project ().
Most algorithms are run-to-completion and provide one answer upon completion and no answer if interrupted before completion. On the other hand, anytime algorithms have a monotonic increasing utility with the length of...
详细信息
Most algorithms are run-to-completion and provide one answer upon completion and no answer if interrupted before completion. On the other hand, anytime algorithms have a monotonic increasing utility with the length of execution time. Our investigation focuses on the development of time-bounded anytime algorithms on Graphics Processing Units (GPUs) to trade-off the quality of output with execution time. Given a time-varying workload, the algorithm continually measures its progress and the remaining contract time to decide its execution pathway and select system resources required to maximize the quality of the result. To exploit the quality-time tradeoff, the focus is on the construction, instrumentation, on-line measurement and decision making of algorithms capable of efficiently managing GPU resources. We demonstrate this with a Parallel A* routing algorithm on a CUDA-enabled GPU. The algorithm execution time and resource usage is described in terms of CUDA kernels constructed at design-time. At runtime, the algorithm selects a subset of kernels and composes them to maximize the quality for the remaining contract time. We demonstrate the feedback-control between the GPU-CPU to achieve controllable computation tardiness by throttling request admissions and the processing precision. As a case study, we have implemented AutoMatrix, a GPU-based vehicle traffic simulator for real-time congestion management which scales up to 16 million vehicles on a US street map. This is an early effort to enable imprecise and approximate real-time computation on parallel architectures for stream-based time-bounded applications such as traffic congestion prediction and route allocation for large transportation networks.
A "Completely Automated Public Turing test to tell computers and Humans Apart" (CAPTCHA) is a mechanism widely used nowadays for protection of web applications, interfaces, and services from malicious users....
详细信息
ISBN:
(纸本)9781450302289
A "Completely Automated Public Turing test to tell computers and Humans Apart" (CAPTCHA) is a mechanism widely used nowadays for protection of web applications, interfaces, and services from malicious users. A questionnaire-based survey combined with a real usage scenario of a native-language CAPTCHA mechanism was conducted in order to investigate several aspects that affect end-user perceptions related to the quality of CAPTCHA. A total of 210 participants of age between 19 and 64 participated during May and July 2010. The survey results validate the common belief that CAPTCHAs are still difficult for humans to solve. They also provide insights that can be applied to improve users' experience on interacting with CAPTCHA systems. Copyright 2011 ACM.
The purpose of this work is to provide access to meteorological data as well as information of the status of air quality for the city of Kozani in real time with a userfriendly interface. The application has been deve...
详细信息
News articles have always been a prominent force in the formation of a company's financial image in the minds of the general public, especially the investors. Given the large amount of news being generated these d...
详细信息
ISBN:
(纸本)9781618392466
News articles have always been a prominent force in the formation of a company's financial image in the minds of the general public, especially the investors. Given the large amount of news being generated these days through various websites, it is possible to mine the general sentiment of a particular company being portrayed by media agencies over a period of time, which can be utilized to gauge the long term impact on the investment potential of the company. However, given such a vast amount of news data, we need to first separate corporate news from other kinds namely, sports, entertainment, science & technology, etc. We propose a system which takes news as, checks whether it is of corporate nature, and then identifies the polarity of the sentiment expressed in the news. The system is also capable of distinguishing the company/organization which is the subject of the news from other organizations which find mention, and this is used to pair the sentiment polarity with the identified company.
Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilitie...
详细信息
Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction techniques, data analysis strategies, and specialized rendering algorithms, is still often a difficult process. To facilitate the creation of novel visualizations this paper presents a new framework that is designed with using data visualization technique for analysis and visualizes snort result data for user. The framework suggests PHP and CSS as data visualization technique and snort as intrusion detection system (IDS).
Computational intelligence generally comprises a rather large set of – in a wider sense – adaptive and human-like data analysis and modelling methods. Due to some superior features – such as generalisation, trainab...
详细信息
Many fatal accidents of safety critical reactive systems.have occurred in unexpected situations which had not been considered during design and test phases of the systems. To prevent these accidents, reactive systems....
详细信息
Many fatal accidents of safety critical reactive systems.have occurred in unexpected situations which had not been considered during design and test phases of the systems. To prevent these accidents, reactive systems.should be designed to respond appropriately to any requests of any timing from their environments. Verifying this property in specification phase reduces the development costs of safety critical reactive systems. This property of a specification is well known as realizability. If a specification was found not to be realizable, we have to determine the flaws in the unrealizable specification. Unrealizability of a specification arises from arbitrary requirements given by system designers. From a different point of view, it can be thought that the unrealizable specification implicitly imposes a precondition on the behavior of environment, which a system can not control. If it is possible to obtain the precondition in intuitively comprehensive forms, this makes it easy for system designers to understand the cause of flaws in specifications. In this paper, we propose methods for deriving constraints on the behavior of environments, which is implicitly imposed by unrealizable specifications. Instead of realizability, we use strong satisfiability which is a necessary condition for realizability, due to the fact that many practical unrealizable specifications are also strongly unsatisfiable, and strong satisfiability have the advantage of lower complexity for analysis against realizability. These methods derive constraints in propositional linear temporal logic from Büchi automata representing specifications. The expressions of derived constraints are limited to simple and intuitively comprehensive forms where only two temporal operators appear successively. We give proofs for three correctness properties of our methods, i.e. the termination property, the soundness property, and the weakest constraints derivability. We also discuss complexity of our methods. Fi
Grid computing is emerging as the foundation upon which virtual collaborations can be built among large organizations with the aim of integrating and sharing computer resources, and thus offering performance speed and...
详细信息
暂无评论