Telemedicine is a very important area in medical field that is expanding daily motivated by many researchers interested in improving medical applications. In Brazil was started in 2005, in the State of Santa Catarina ...
Telemedicine is a very important area in medical field that is expanding daily motivated by many researchers interested in improving medical applications. In Brazil was started in 2005, in the State of Santa Catarina has a developed server called the CyclopsDCMServer, which the purpose to embrace the HDF for the manipulation of medical images (DICOM) using a distributed file system. Since then, many researches were initiated in order to seek better performance. Our approach for this server represents an additional parallel implementation in I/O operations since HDF version 5 has an essential feature for our work which supports parallel I/O, based upon the MPI paradigm. Early experiments using four parallel nodes, provide good performance when compare to the serial HDF implemented in the CyclopsDCMServer.
The need for procedures and methodologies used in clinical information standardization is continuous, requiring the current telemedicine networks to evolve and adapt by using mature standards and guidelines as the bas...
详细信息
The need for procedures and methodologies used in clinical information standardization is continuous, requiring the current telemedicine networks to evolve and adapt by using mature standards and guidelines as the basis for clinical documents transmitted through the network. In this work, we present a different approach for large-scale use of DICOM SR in telemedicine networks using structured vocabularies as its foundation, resulting in a reliable, efficient and data mining ready application applied in a real world telemedicine network. This approach is applied in a large-scale network where 60 physicians report daily an average of 400 reports; resulting in more than 80,000 reports written and stored in the last nine months. We conclude that the use of this approach can reduce eventual syntax or conceptual mistakes by using proper structured vocabularies in addition to DICOM SR.
Green Cloud Computing aims at a processing infrastructure that combines flexibility, quality of services, and reduced energy utilization. In order to achieve this objective, the management solution must regulate the i...
详细信息
Green Cloud Computing aims at a processing infrastructure that combines flexibility, quality of services, and reduced energy utilization. In order to achieve this objective, the management solution must regulate the internal settings to address the pressing issue of data center over-provisioning related to the need to match the peak demand. In this context, we propose an integrated solution for resource management based on organization models of autonomous agent components. This work introduces the system management model, analyzes the system's behavior, describes the operation principles, and presents a use case scenario. To simulate the approach of organization, theory and implementation of migration policies and reallocation changes were made as improvements in the code of CloudSim framework.
The decisions made by the operation commander in emergency situations should be made quickly to save lives. To avoid late or bad decisions, the commander must construct a situational awareness. The irregular arrival f...
详细信息
The decisions made by the operation commander in emergency situations should be made quickly to save lives. To avoid late or bad decisions, the commander must construct a situational awareness. The irregular arrival flow of information, uncertainty, information overload and lack of persistence are the main factors that hinder this task. To minimize these effects we propose an architecture composed of mobile devices and a decision support system to be used in the command post. The main point in the system design is the cognitive overload. Therefore, heuristics about the usage of the information by experienced commanders were elicited and implemented.
A shared representation of knowledge, such as an ontology, cannot capture the viewpoints and preferences of individual users. Praesto is a semantic search system that keeps track of the the user's preferences from...
详细信息
ISBN:
(纸本)1891706241
A shared representation of knowledge, such as an ontology, cannot capture the viewpoints and preferences of individual users. Praesto is a semantic search system that keeps track of the the user's preferences from his interactions with the system and uses this information on trying to capture the user's intentions in subsequent searches. The user's preferences are represented as his or her context relative to a shared knowledge base (KB), which is used to describe the contents to be searched for. Praestro uses this contextual information to estimate the probable users' intentions, for disambiguating and semantically expanding keyword based searches, in order to provide results that are relevant for the evolving user's interests.
The Transmission Control Protocol - TCP has been widely researched in many different networking technologies such as wireless, optical, satellite, sensor, and wired since it is the most used protocol on the Internet. ...
详细信息
The Transmission Control Protocol - TCP has been widely researched in many different networking technologies such as wireless, optical, satellite, sensor, and wired since it is the most used protocol on the Internet. In Wireless mesh networks, this protocol still has challenges due to its origin and implementations for wired networks. This paper proposes an adaptation on the congestion control mechanism using information from the network layer to improve TCP performance through the vertical calibration across layer technique. The result is the Cross Layer Mesh - Transmission Control Protocol (CLM-TCP). To show the efficiency of the proposal, simulations in the NS-2 were carried out.
This paper presents a model for response interoperability between intruder detection systems (IDSs), compatible with the model for alert interoperability developed by the Intrusion Detection Working Group (IDWG). Alte...
详细信息
Intrusion detection systems (IDSs) have been substantially improved in recent past. However, network attacks have become more sophisticated and increasingly complex: many of current attacks are coordinated and origina...
详细信息
Intrusion detection systems (IDSs) have been substantially improved in recent past. However, network attacks have become more sophisticated and increasingly complex: many of current attacks are coordinated and originated in multiple networks. To detect these attacks, IDSs need to obtain information on network events from multiple networks or administrative domains. This work demonstrates that a Distributed IDS (DIDS) can be composed of existing IDSs, improving the detection of misuses in a multiple network environment. We use a grid middleware for creating a service-based intrusion detection grid. We demonstrate through experimental results that the proposed DIDS allows the integration of heterogeneous existing IDSs and improves the detection of attacks by exploring the synergy between existing IDSs.
Research efforts in Quality of Service (QoS) management have usually addressed the problem under the network infrastructure perspective whereas a business-oriented perspective, named Service Quality Management (SQM), ...
详细信息
This work describes a workflow-based environment that manages the execution of software-testing processes. Testing processes require that human and computer resources be handled as dedicated resources, previously sche...
详细信息
ISBN:
(纸本)972886521X
This work describes a workflow-based environment that manages the execution of software-testing processes. Testing processes require that human and computer resources be handled as dedicated resources, previously scheduled for testing activities, with no overlapping. Two striking features of this environment are: a) the efficient handling of resources by taking into account the capabilities offered by resources required by testing activities, and b) it provides a broader view of all execution steps in a software-testing plan. Hence, it enables a better planning of software-testing process executions, as well as of human and computer resources involved.
暂无评论