A method of recording the fetal electrocardiogram (ECG) and heart rate (HR) is described. An abdominal lead and a thoracic lead were used to measure the fetal ECG and maternal ECG, respectively. The maternal component...
详细信息
A method of recording the fetal electrocardiogram (ECG) and heart rate (HR) is described. An abdominal lead and a thoracic lead were used to measure the fetal ECG and maternal ECG, respectively. The maternal component in the abdominal lead measurement was estimated by a digital adaptive filter using the thoracic lead measurement as a reference. By suppressing the estimated maternal components in the abdominal lead, the fetal ECG could be detected. The beat-by-beat fetal QRS complex peaks were determined by a digital matched filter from the fetal ECG enhanced in this way. The method was trialed in 10 pregnant Holstein cows at gestational periods ranging from 136 to 224 days. The results show that this method can extract the fetal ECG and determine the fetal HR from the raw noisy measurement data. The results suggest that the method would have applicability in monitoring fetal ECG as well as providing a non-invasive, continuous HR profile during gestation, which will enable better understanding of the development of cattle fetuses before delivery.
We present a pattern system/or security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of problem frames that serve to structure, chara...
详细信息
ISBN:
(纸本)9780769527758
We present a pattern system/or security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of problem frames that serve to structure, characterize, analyze, and finally solve software development problems in the area of software and system security. We equip each frame with formal preconditions and postconditions. The analysis of these conditions results in a pattern system that explicitly shows the dependencies between the different frames. Moreover, we indicate related frames, which are commonly used together with the considered frame. Hence, our approach helps security engineers to avoid omissions and to cover all security requirements that are relevant for a given problem
Being an important means of reducing development costs, behavior specification of software components facilitates reuse of a component and even reuse of a component's architecture (assembly). However, since typica...
详细信息
Using software components has become a widely used development technique for building large enterprise systems. However in practice, component applications are still primarily built using simple component models and a...
详细信息
Using software components has become a widely used development technique for building large enterprise systems. However in practice, component applications are still primarily built using simple component models and advanced component models offering valuable features like component nesting, multiple communication styles, behavior validation, etc. are omitted (by industry in particular). Based on our experience, such an omitting is mainly caused due to usually unbalanced semantics of these advanced features. In this paper, we present a "next-generation" component model SOFA 2.0, which in particular aims at a proper support of such advanced features.
Requirements traceability is becoming increasingly significant element in softwareengineering. It provides critical function in the development and maintenance of a software system. From the software evolution point ...
详细信息
Requirements traceability is becoming increasingly significant element in softwareengineering. It provides critical function in the development and maintenance of a software system. From the software evolution point of view, requirements traceability plays an important role in facilitating software evolution. Since the evolution is inevitable, a traceability approach must take as much as possible the important influencing aspects into account to the evolution processes in order to minimize the evolution efforts. This paper evaluates several recent traceability approaches published in literature with the focus on their contributions to software evolution. The evaluation results may be used as a basis for improving requirements traceability approaches that may simplify the software evolution tasks.
For some time now, researchers have been seeking to place software measurement on a more firmly grounded footing by establishing a theoretical basis for software comparison. Although there has been some work on trying...
详细信息
It is more convenient to talk about changes in a domainspecific way than to formulate them at the programming construct level or-even worse-purely lexical level. Using aspect-oriented programming, changes can be modul...
详细信息
It is more convenient to talk about changes in a domainspecific way than to formulate them at the programming construct level or-even worse-purely lexical level. Using aspect-oriented programming, changes can be modularized and made reapplicable. In this paper, selected change types in web applications are analyzed. They are expressed in terms of general change types which, in turn, are implemented using aspect-oriented programming. Some of general change types match aspect-oriented design patterns or their combinations.
A combination of closed sequential pattern mining and closed itemset pattern mining was proposed to mine closed multidimensional sequential patterns. There are two ways for this combination; (1) mining closed itemset ...
详细信息
A combination of closed sequential pattern mining and closed itemset pattern mining was proposed to mine closed multidimensional sequential patterns. There are two ways for this combination; (1) mining closed itemset patterns from multidimensional information followed by mining closed sequential patterns from sequences associated with closed itemset patterns, and (2) mining closed sequential patterns from sequences followed by mining closed itemset patterns from multidimensional information associated with closed sequential patterns. In the first way the major cost is mining all sequences associated with closed itemset patterns. A similar problem occurs with the second way, the major cost is mining all multidimensional information associated with closed sequential patterns. Therefore, this paper proposes two new combinations that don't need to mine all sequences in the first combination, and all multidimensional information in the second combination. Both combinations can be effected by exploiting two concepts. In the first combination, any closed sequential patterns associated with a closed itemset patten I can be found from a set of closed sequential patterns associated with a closed itemset pattern I' if I sup I'. In the second combination, any closed itemset patterns associated with a closed sequential pattern s can be found from a set of closed sequential patterns associated with a closed itemset pattern s' if s sup s'.
This paper is aimed at the development of a high-precision, noninvasive, continuous blood pressure monitor using pulse arrival time (PAT). A continuous putative function of systolic blood pressure was realized using E...
详细信息
This paper is aimed at the development of a high-precision, noninvasive, continuous blood pressure monitor using pulse arrival time (PAT). A continuous putative function of systolic blood pressure was realized using Electrocardiogram (ECG) and the pulse signals for calculating the pulse wave are obtained from electrodes that are attached to both hands and a photoplethysmographic sensor attached to the tip of the finger and the hand. First, noise such as drift, electromyogram, and hum noise is reduced using a notch filter and a bandpass filter. Next, the QRS wave peak of the ECG is detected. In parallel with QRS wave peak detection, the leading edge of the pulse is detected. The interval between these two points is computed as the PAT. Then, the signal most correlated to change in blood pressure is selected. In this way, systolic blood pressure is computed continuously and precisely.
The proposed hyper knowledge discovery system is designed to facilitate domain users to interactively discover knowledge from complex data sets. At the first stage, this system integrates data preprocess, lexicon esta...
详细信息
The proposed hyper knowledge discovery system is designed to facilitate domain users to interactively discover knowledge from complex data sets. At the first stage, this system integrates data preprocess, lexicon establishment and database construction together. Then it provides domain users with flexibility and fuzzy mechanism to retrieve information and mine knowledge interactively. The system introduces an approach to obtain joint probability distributions of an arbitrary number of variables of multi valued states. This is fundamental for mining correlation and causal relations from the complex data sources. To attain these objectives, the system creatively exploits the functionalities of the relational database and SQL engine to reduce programming while achieving good performance. All the functionalities are online and hence facilitate resource and knowledge sharing.
暂无评论