WorldWideScience

Sample records for networked computerized devices

  1. Computerized Library Networking in Canada.

    Science.gov (United States)

    Duchesne, Roderick M.; Islam, Mazharul

    1979-01-01

    Reviews a study which examined computerized bibliographic centers in Canada identifying three types: (1) library processing facility; (2) library network user group; and (3) information retrieval facility. The study also reported on ways to promote a computerized library network with emphasis on national location service. (CWM)

  2. Assessment of social cognition in non-human primates using a network of computerized automated learning device (ALDM) test systems.

    Science.gov (United States)

    Fagot, Joël; Marzouki, Yousri; Huguet, Pascal; Gullstrand, Julie; Claidière, Nicolas

    2015-05-05

    Fagot & Paleressompoulle(1) and Fagot & Bonte(2) have published an automated learning device (ALDM) for the study of cognitive abilities of monkeys maintained in semi-free ranging conditions. Data accumulated during the last five years have consistently demonstrated the efficiency of this protocol to investigate individual/physical cognition in monkeys, and have further shown that this procedure reduces stress level during animal testing(3). This paper demonstrates that networks of ALDM can also be used to investigate different facets of social cognition and in-group expressed behaviors in monkeys, and describes three illustrative protocols developed for that purpose. The first study demonstrates how ethological assessments of social behavior and computerized assessments of cognitive performance could be integrated to investigate the effects of socially exhibited moods on the cognitive performance of individuals. The second study shows that batteries of ALDM running in parallel can provide unique information on the influence of the presence of others on task performance. Finally, the last study shows that networks of ALDM test units can also be used to study issues related to social transmission and cultural evolution. Combined together, these three studies demonstrate clearly that ALDM testing is a highly promising experimental tool for bridging the gap in the animal literature between research on individual cognition and research on social cognition.

  3. [Computerized prescription for medical devices: examples, interest and limits].

    Science.gov (United States)

    Galvez, D; Martelli, N; Dart, T; Blanchard, D; Prognon, P; Pineau, J

    2012-09-01

    Related to the good practice contract implemented in hospitals, the prescription dedicated to medical devices, such as pharmaceuticals, could promote safety and good practice. We attempted to implement a computerized prescription for medical devices. In order to illustrate the method, two examples were selected: the Negative Pressure Wound Therapy (NPWT) and the Drug Eluting Stents (DES). In partnership with the medical teams was elaborated a computerized protocol which included all the needed items for the good use of NPWT. For DES, a pre-existing questionnaire was used. We updated it in order to integrate new items such as the prescriber's name, the patient's name, the characteristics of the wound, the DES references and the indications. Computerized prescriptions for high-risk and expensive medical devices seem to be an interesting approach to guarantee the patient care safety and to reduce the budget impacts. In order to monitor the indications funded as fee-for-service medical devices, a prescription will emerge as a gold standard in the future in France. Eventually, this study highlights a new activity of clinical pharmacy for hospital pharmacists dealing with medical devices. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  4. Assessment of computerized tomography devices in Minas Gerais state, Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Paulo Marcio C., E-mail: pmco@cdtn.br, E-mail: ambienttal@ambienttal.com.br [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil); Horta, Mara Alice Avelar Saraiva [Faculdade Sao Camilo de Minas Gerais - FASC - MG, Graduacao de Tecnologia em Radiologia (Brazil); Santana, Priscila do Carmo [Programa de Pos Graduacao em Ciencias e Tecnicas Nucleares - PCTN, Universidade Federal de Minas Gerais (UFMG) Belo Horizonte, MG (Brazil); Magalhaes, Marcos Juliano [Ambienttal Protecao Radiologica Ltda., Belo Horizonte, MG (Brazil)

    2011-07-01

    Computed Tomography (CT) is the diagnostic imaging method most commonly performed today. It is a device that is undergoing a technological evolution and their quality control is sorely needed. The image quality evaluation process allow a better diagnosis and control of the patient dose received during image acquisition. The CT doses are higher than other X-ray examination techniques, like a conventional X-ray. Performance evaluation of computed tomography in Minas Gerais is not significant. Therefore, this work aims to analyze 20 CT equipment in Minas Gerais, with parameters according to the national regulatory agency (ANVISA - Agencia Nacional de Vigilancia Sanitaria) in twelve quality control tests. Sixty five percent (65%) of CT equipment evaluated showed excellent results and were not disapproved in any of the tests performed and 30% had failed in only one of the twelve tests performed. The worst result was found in the CT scanners in the test that evaluates the low contrast resolution, where 20% of CT showed non-compliance, followed by the test that evaluates the x-rays collimation beam, where 15% had failed. The tests allowed us to observe that the twenty computerized tomography equipment achieved a great pass rate. Considering that the evaluated CTs performed the quality control tests for the first time, it is concluded that the equipment used in clinics and hospitals are of good quality image and low radiation doses. (author)

  5. The Design and Evaluation of a Computerized Adaptive Test on Mobile Devices

    Science.gov (United States)

    Triantafillou, Evangelos; Georgiadou, Elissavet; Economides, Anastasios A.

    2008-01-01

    The use of computerized adaptive testing (CAT) has expanded rapidly over recent years mainly due to the advances in communication and information technology. Availability of advanced mobile technologies provides several benefits to e-learning by creating an additional channel of access with mobile devices such as PDAs and mobile phones. This paper…

  6. Networked Attached Devices at SNS

    CERN Document Server

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  7. Investigating the Efficacy of a Computerized Prompting Device to Assist Children with Autism Spectrum Disorder with Activities of Daily Living

    Science.gov (United States)

    Bimbrahw, Justin; Boger, Jennifer; Mihailidis, Alex

    2012-01-01

    Learning to perform self-care skills can pose a major challenge for children with Autism Spectrum Disorder (ASD) as well as the parents and caregivers who support them. The computerized device described in this paper has been used by children with ASD and their carers to autonomously assist with self-care activities. The device uses computer…

  8. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically...

  9. Protecting and securing networked medical devices.

    Science.gov (United States)

    Riha, Chris

    2004-01-01

    Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.

  10. A novel network module for medical devices.

    Science.gov (United States)

    Chen, Ping-Yu

    2008-01-01

    In order to allow medical devices to upload the vital signs to a server on a network without manually configuring for end-users, a new network module is proposed. The proposed network module, called Medical Hub (MH), functions as a bridge to fetch the data from all connecting medical devices, and then upload these data to the server. When powering on, the MH can immediately establish network configuration automatically. Network Address Translation (NAT) traversal is also supported by the MH with the UPnP Internet Gateway Device (IGD) methodology. Besides the network configuration, other configuration in the MH is automatically established by using the remote management protocol TR-069. On the other hand, a mechanism for updating software automatically according to the variant connected medical device is proposed. With this mechanism, newcome medical devices can be detected and supported by the MH without manual operation.

  11. Electronic device aspects of neural network memories

    Science.gov (United States)

    Lambe, J.; Moopenn, A.; Thakoor, A. P.

    1985-01-01

    The basic issues related to the electronic implementation of the neural network model (NNM) for content addressable memories are examined. A brief introduction to the principles of the NNM is followed by an analysis of the information storage of the neural network in the form of a binary connection matrix and the recall capability of such matrix memories based on a hardware simulation study. In addition, materials and device architecture issues involved in the future realization of such networks in VLSI-compatible ultrahigh-density memories are considered. A possible space application of such devices would be in the area of large-scale information storage without mechanical devices.

  12. Computerized neuropsychological assessment devices: joint position paper of the American Academy of Clinical Neuropsychology and the National Academy of Neuropsychology.

    Science.gov (United States)

    Bauer, Russell M; Iverson, Grant L; Cernich, Alison N; Binder, Laurence M; Ruff, Ronald M; Naugle, Richard I

    2012-05-01

    This joint position paper of the American Academy of Clinical Neuropsychology and the National Academy of Neuropsychology sets forth our position on appropriate standards and conventions for computerized neuropsychological assessment devices (CNADs). In this paper, we first define CNADs and distinguish them from examiner-administered neuropsychological instruments. We then set forth position statements on eight key issues relevant to the development and use of CNADs in the healthcare setting. These statements address (a) device marketing and performance claims made by developers of CNADs; (b) issues involved in appropriate end-users for administration and interpretation of CNADs; (c) technical (hardware/software/firmware) issues; (d) privacy, data security, identity verification, and testing environment; (e) psychometric development issues, especially reliability, and validity; (f) cultural, experiential, and disability factors affecting examinee interaction with CNADs; (g) use of computerized testing and reporting services; and (h) the need for checks on response validity and effort in the CNAD environment. This paper is intended to provide guidance for test developers and users of CNADs that will promote accurate and appropriate use of computerized tests in a way that maximizes clinical utility and minimizes risks of misuse. The positions taken in this paper are put forth with an eye toward balancing the need to make validated CNADs accessible to otherwise underserved patients with the need to ensure that such tests are developed and utilized competently, appropriately, and with due concern for patient welfare and quality of care.

  13. Computerized Neuropsychological Assessment Devices: Joint Position Paper of the American Academy of Clinical Neuropsychology and the National Academy of Neuropsychology†

    Science.gov (United States)

    Bauer, Russell M.; Iverson, Grant L.; Cernich, Alison N.; Binder, Laurence M.; Ruff, Ronald M.; Naugle, Richard I.

    2012-01-01

    This joint position paper of the American Academy of Clinical Neuropsychology and the National Academy of Neuropsychology sets forth our position on appropriate standards and conventions for computerized neuropsychological assessment devices (CNADs). In this paper, we first define CNADs and distinguish them from examiner-administered neuropsychological instruments. We then set forth position statements on eight key issues relevant to the development and use of CNADs in the healthcare setting. These statements address (a) device marketing and performance claims made by developers of CNADs; (b) issues involved in appropriate end-users for administration and interpretation of CNADs; (c) technical (hardware/software/firmware) issues; (d) privacy, data security, identity verification, and testing environment; (e) psychometric development issues, especially reliability, and validity; (f) cultural, experiential, and disability factors affecting examinee interaction with CNADs; (g) use of computerized testing and reporting services; and (h) the need for checks on response validity and effort in the CNAD environment. This paper is intended to provide guidance for test developers and users of CNADs that will promote accurate and appropriate use of computerized tests in a way that maximizes clinical utility and minimizes risks of misuse. The positions taken in this paper are put forth with an eye toward balancing the need to make validated CNADs accessible to otherwise underserved patients with the need to ensure that such tests are developed and utilized competently, appropriately, and with due concern for patient welfare and quality of care. PMID:22382386

  14. Embedded Network Protocols for Mobile Devices

    Science.gov (United States)

    Galataki, Despo; Radulescu, Andrei; Verstoep, Kees; Fokkink, Wan

    Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window protocol, a protocol for opening and closing connections, and a bandwidth reservation protocol. The design of these protocols is tailored to the low power and low cost requirements of mobile devices. The model checker SPIN played an important role in the design and analysis of these protocols. Large instances of the protocols could be analyzed successfully using the distributed model checker DiVinE.

  15. Signal processing devices and networks

    Science.gov (United States)

    Graveline, S. W.

    1985-02-01

    According to an axiom employed with respect to electronic warfare (EW) behavior, system effectiveness increases directly with the amount of information recovered from an intercepted signal. The evolution in EW signal processing capability has proceeded accordingly. After an initiation of EW systems as broadband receivers, the most significant advance was related to the development of digital instantaneous frequency measurement (DIFM) devices. The use of such devices provides significant improvements regarding signal identification and RF measurement to within a few MHz. An even more accurate processing device, the digital RF memory (DRFM), allows frequency characterization to within a few Hz. This invention was made in response to the need to process coherent pulse signals. Attention is given to the generic EW system, the modern EW system, and the generic receiver function for a modern EW system showing typical output signals.

  16. Computerized Liquid Crystal Phase Identification by Neural Networks Analysis of Polarizing Microscopy Textures

    Science.gov (United States)

    Karaszi, Zoltan; Konya, Andrew; Dragan, Feodor; Jakli, Antal; CPIP/LCI; CS Dept. of Kent State University Collaboration

    Polarizing optical microscopy (POM) is traditionally the best-established method of studying liquid crystals, and using POM started already with Otto Lehman in 1890. An expert, who is familiar with the science of optics of anisotropic materials and typical textures of liquid crystals, can identify phases with relatively large confidence. However, for unambiguous identification usually other expensive and time-consuming experiments are needed. Replacement of the subjective and qualitative human eye-based liquid crystal texture analysis with quantitative computerized image analysis technique started only recently and were used to enhance the detection of smooth phase transitions, determine order parameter and birefringence of specific liquid crystal phases. We investigate if the computer can recognize and name the phase where the texture was taken. To judge the potential of reliable image recognition based on this procedure, we used 871 images of liquid crystal textures belonging to five main categories: Nematic, Smectic A, Smectic C, Cholesteric and Crystal, and used a Neural Network Clustering Technique included in the data mining software package in Java ``WEKA''. A neural network trained on a set of 827 LC textures classified the remaining 44 textures with 80% accuracy.

  17. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Directory of Open Access Journals (Sweden)

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  18. Design and development of computerized local and overall country's environmental data analysis network system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Chang Gyu; Kang, Jong Gyu; Han, H.; Han, J. S.; Lee, Y. D.; Lee, S. R.; Kang, D. J.; Cho, Y. G.; Yun, S. H. [Daedeok College, Taejon (Korea, Republic of)

    2001-03-15

    In this development, we designed a integrated database for efficient data processing of radiation-environment data and developed the CLEAN (Computerized Local and overall country's Environmental data Analysis Network) system. The CLEAN system consists of local radiation-environment network, data analysis system, data open system. We developed the CLEAN system focused on building an integrated database, a data mart, and a CLEAN web site. It is expected that the developed system, which organizes the information related to environmental radiation data systematically, can be utilize for the accurate interpretation, analysis and evaluation.

  19. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  20. The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking

    OpenAIRE

    Wirtz, Hanno

    2015-01-01

    Wireless networking technology, as prevalently realized according to the IEEE 802.11 standard, successfully complements wired access to local networks and the Internet. Current mobile devices, such as smartphones, manifest wireless networking within everyday mobile scenarios and diverse and dynamic device-to-device (D2D) communication contexts that are independent from any network infrastructure, motivating the research directions of Mobile Ad-Hoc, Delay Tolerant, and Opportunistic Networking...

  1. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  2. The impact of wireless device access on content delivery networks

    OpenAIRE

    Denney, Justin; Race, Nicholas

    2003-01-01

    Content delivery network architectures are initiatives designed to support the effective delivery of continuous and discrete media to end-users. Mobile devices are now capable of exploiting services such as content delivery, but with the protocols governing the content delivery networks designed for wired networked topologies; an assessment of the impact of mobile devices on the network has never been undertaken. Wireless devices access causes significant issues in the ability of the media tr...

  3. Utility of mobile devices in the computerized tomography evaluation of intracranial hemorrhage

    Directory of Open Access Journals (Sweden)

    Sridhar G Panughpath

    2013-01-01

    Full Text Available Aim: To evaluate the utility of a mobile device to detect and assess intracranial hemorrhage (ICH on head computed tomographys (CT performed in the emergency setting. Materials and Methods: 100 head CT scans were randomly selected from our emergency radiology database and anonymized for patient demographics and clinical history. The studies were independently interpreted by two experienced radiologists in a blinded manner, initially on a mobile device (iPad, Apple computers and subsequently, at an interval of one week, on a regular desktop workstation. Evaluation was directed towards detection, localization and characterization of hemorrhage. The results were assessed for accuracy, sensitivity, specificity and positive predictive value. Statistical significance was ascertained using Fisher′s exact test. Results: 27 of the examinations were positive for ICH, of which 11 had multiple hemorrhages. Of these there were 17 subdural, 18 intraparenchymal, 8 subarachnoid, 4 intraventricular and 2 extradural hemorrhages. In 96 of the studies there was complete concurrence between the iPad and desktop interpretations for both radiologists. Of 49 hemorrhages, 48 were accurately detected on the iPad by one of the radiologists. In the remaining case, a tiny intraventricular hemorrhage was missed by both radiologists on the iPad as well as on the workstation, indicating that the miss was more likely related to the very small size of the hemorrhage than the viewer used. Conclusion: We conclude that in the emergency setting, a mobile device with appropriate web-based pictue archiving and communication system (PACS is effective in the detection of intracranial hemorrhage present on head CT.

  4. Epiluminescence microscopy-based classification of pigmented skin lesions using computerized image analysis and an artificial neural network.

    Science.gov (United States)

    Binder, M; Kittler, H; Seeber, A; Steiner, A; Pehamberger, H; Wolff, K

    1998-06-01

    Epiluminescence microscopy (ELM) is a non-invasive technique for in vivo examination which can provide additional criteria for the clinical diagnosis of pigmented skin lesions (PSLs). In the present study we attempt to determine whether PSLs can be automatically diagnosed by an integrated computerized system. This system should recognize the PSL, automatically extract features and use these features in training an artificial neural network, which should--if sufficiently trained--be capable of recognizing and classifying a new PSL without human aid. One hundred and twenty images of randomly selected histologically proven PSLs (33 common naevi, 48 dysplastic naevi and 39 malignant melanomas) were used in this study. The images were digitally obtained and the morphological features of the PSLs were extracted electronically without human assistance. The numerical data were then divided into learning and testing cases and linked to an artificial neural network for training and for further classification of lesions that the system had not been trained on. Our results show that the computerized system was able to automatically identify 95% of the PSLs presented. The sensitivity and specificity of the computerized system were 90% and 74% respectively. In contrast, when differentiating between individual types of lesions, the system performed at true positive rates of only 38% for malignant melanoma, 62% for dysplastic naevi and 33% for common naevi. Our data indicate that (1) ELM images of PSLs provide an excellent source for digital image analysis; (2) the vast majority of PSLs can be correctly identified by a relatively simple (and thus not "intelligent") application of digital image analysis; (3) automatic feature extraction based mainly on ABCD rules provides reliable data on the distinction between benign and malignant PSLs; and (4) there is evidence that artificial neural networks can be trained to adequately discriminate between benign and malignant PSLs.

  5. Accuracy of a Real-Time, Computerized, Binocular, Three-Dimensional Trajectory-Tracking Device for Recording Functional Mandibular Movements.

    Directory of Open Access Journals (Sweden)

    Tian Zhao

    Full Text Available Developments in digital technology have permitted researchers to study mandibular movements. Here, the accuracy of a real-time, computerized, binocular, three-dimensional (3D trajectory-tracking device for recording functional mandibular movements was evaluated.An occlusal splint without the occlusal region was created based on a plaster cast of the lower dentition. The splint was rigidly connected with a target on its labial side and seated on the cast. The cast was then rigidly attached to the stage of a high-precision triaxial electronic translator, which was used to move the target-cast-stage complex. Half-circular movements (5.00-mm radius in three planes (XOY, XOZ, YOZ and linear movements along the x-axis were performed at 5.00 mm/s. All trajectory points were recorded with the binocular 3D trajectory-tracking device and fitted to arcs or lines, respectively, with the Imageware software. To analyze the accuracy of the trajectory-tracking device, the mean distances between the trajectory points and the fitted arcs or lines were measured, and the mean differences between the lengths of the fitted arcs' radii and a set value (5.00 mm were then calculated. A one-way analysis of variance was used to evaluate the spatial consistency of the recording accuracy in three different planes.The mean distances between the trajectory points and fitted arcs or lines were 0.076 ± 0.033 mm or 0.089 ± 0.014 mm. The mean difference between the lengths of the fitted arcs' radii and the set value (5.00 mm was 0.025 ± 0.071 mm. A one-way ANOVA showed that the recording errors in three different planes were not statistically significant.These results suggest that the device can record certain movements at 5.00 mm/s, which is similar to the speed of functional mandibular movements. In addition, the recordings had an error of <0.1 mm and good spatial consistency. Thus, the device meets some of the requirements necessary for recording human mandibular movements.

  6. Accuracy of a Real-Time, Computerized, Binocular, Three-Dimensional Trajectory-Tracking Device for Recording Functional Mandibular Movements.

    Science.gov (United States)

    Zhao, Tian; Yang, Huifang; Sui, Huaxin; Salvi, Satyajeet Sudhir; Wang, Yong; Sun, Yuchun

    2016-01-01

    Developments in digital technology have permitted researchers to study mandibular movements. Here, the accuracy of a real-time, computerized, binocular, three-dimensional (3D) trajectory-tracking device for recording functional mandibular movements was evaluated. An occlusal splint without the occlusal region was created based on a plaster cast of the lower dentition. The splint was rigidly connected with a target on its labial side and seated on the cast. The cast was then rigidly attached to the stage of a high-precision triaxial electronic translator, which was used to move the target-cast-stage complex. Half-circular movements (5.00-mm radius) in three planes (XOY, XOZ, YOZ) and linear movements along the x-axis were performed at 5.00 mm/s. All trajectory points were recorded with the binocular 3D trajectory-tracking device and fitted to arcs or lines, respectively, with the Imageware software. To analyze the accuracy of the trajectory-tracking device, the mean distances between the trajectory points and the fitted arcs or lines were measured, and the mean differences between the lengths of the fitted arcs' radii and a set value (5.00 mm) were then calculated. A one-way analysis of variance was used to evaluate the spatial consistency of the recording accuracy in three different planes. The mean distances between the trajectory points and fitted arcs or lines were 0.076 ± 0.033 mm or 0.089 ± 0.014 mm. The mean difference between the lengths of the fitted arcs' radii and the set value (5.00 mm) was 0.025 ± 0.071 mm. A one-way ANOVA showed that the recording errors in three different planes were not statistically significant. These results suggest that the device can record certain movements at 5.00 mm/s, which is similar to the speed of functional mandibular movements. In addition, the recordings had an error of mandibular movements.

  7. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez Marcano, Nestor Javier; Heide, Janus; Lucani Rötter, Daniel Enrique

    2016-01-01

    Cooperation strategies in mobile networks typically rely in short range technologies, like LTE-A Device to Device (D2D) communications, for data exchange between devices forming mobile clouds. These communications provide a better device experience since the clouds offload the network. Nevertheless......, this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore...

  8. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  9. Computerized cognitive training restores neural activity within the reality monitoring network in schizophrenia.

    Science.gov (United States)

    Subramaniam, Karuna; Luks, Tracy L; Fisher, Melissa; Simpson, Gregory V; Nagarajan, Srikantan; Vinogradov, Sophia

    2012-02-23

    Schizophrenia patients suffer from severe cognitive deficits, such as impaired reality monitoring. Reality monitoring is the ability to distinguish the source of internal experiences from outside reality. During reality monitoring tasks, schizophrenia patients make errors identifying "I made it up" items, and even during accurate performance, they show abnormally low activation of the medial prefrontal cortex (mPFC), a region that supports self-referential cognition. We administered 80 hr of computerized training of cognitive processes to schizophrenia patients and found improvement in reality monitoring that correlated with increased mPFC activity. In contrast, patients in a computer games control condition did not show any behavioral or neural improvements. Notably, recovery in mPFC activity after training was associated with improved social functioning 6 months later. These findings demonstrate that a serious behavioral deficit in schizophrenia, and its underlying neural dysfunction, can be improved by well-designed computerized cognitive training, resulting in better quality of life. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  11. Reducing Energy Waste Due to Idle Network Devices

    OpenAIRE

    Khan, Rafiullah; Khan, Sarmad Ullah

    2017-01-01

    Network devices always demand full time Internet connectivity for remote access, VoIP & Instant Messaging (IM) clients and other Internet based applications. Their built-in low power management features are usually disabled by users due to their incapability of maintaining network connectivity. The concept of Network Connectivity Proxy (NCP) has recently been proposed as an effective mechanism for reducing energy waste by impersonating presence of sleeping devices. However, proposed strat...

  12. Validation of computerized diagnostic information in a clinical database from a national equine clinic network

    Directory of Open Access Journals (Sweden)

    Egenvall Agneta

    2009-12-01

    Full Text Available Abstract Background Computerized diagnostic information offers potential for epidemiological research; however data accuracy must be addressed. The principal aim of this study was to evaluate the completeness and correctness of diagnostic information in a computerized equine clinical database compared to corresponding hand written veterinary clinical records, used as gold standard, and to assess factors related to correctness. Further, the aim was to investigate completeness (epidemiologic sensitivity, correctness (positive predictive value, specificity and prevalence for diagnoses for four body systems and correctness for affected limb information for four joint diseases. Methods A random sample of 450 visits over the year 2002 (nvisits = 49,591 was taken from 18 nation wide clinics headed under one company. Computerized information for the visits selected and copies of the corresponding veterinary clinical records were retrieved. Completeness and correctness were determined using semi-subjective criteria. Logistic regression was used to examine factors associated with correctness for diagnosis. Results Three hundred and ninety six visits had veterinary clinical notes that were retrievable. The overall completeness and correctness were 91% and 92%, respectively; both values considered high. Descriptive analyses showed significantly higher degree of correctness for first visits compared to follow up visits and for cases with a diagnostic code recorded in the veterinary records compared to those with no code noted. The correctness was similar regardless of usage category (leisure/sport horse, racing trotter and racing thoroughbred or gender. For the four body systems selected (joints, skin and hooves, respiratory, skeletal the completeness varied between 71% (respiration and 91% (joints and the correctness ranged from 87% (skin and hooves to 96% (respiration, whereas the specificity was >95% for all systems. Logistic regression showed that

  13. Validation of computerized diagnostic information in a clinical database from a national equine clinic network.

    Science.gov (United States)

    Penell, Johanna C; Bonnett, Brenda N; Pringle, John; Egenvall, Agneta

    2009-12-10

    Computerized diagnostic information offers potential for epidemiological research; however data accuracy must be addressed. The principal aim of this study was to evaluate the completeness and correctness of diagnostic information in a computerized equine clinical database compared to corresponding hand written veterinary clinical records, used as gold standard, and to assess factors related to correctness. Further, the aim was to investigate completeness (epidemiologic sensitivity), correctness (positive predictive value), specificity and prevalence for diagnoses for four body systems and correctness for affected limb information for four joint diseases. A random sample of 450 visits over the year 2002 (nvisits=49,591) was taken from 18 nation wide clinics headed under one company. Computerized information for the visits selected and copies of the corresponding veterinary clinical records were retrieved. Completeness and correctness were determined using semi-subjective criteria. Logistic regression was used to examine factors associated with correctness for diagnosis. Three hundred and ninety six visits had veterinary clinical notes that were retrievable. The overall completeness and correctness were 91% and 92%, respectively; both values considered high. Descriptive analyses showed significantly higher degree of correctness for first visits compared to follow up visits and for cases with a diagnostic code recorded in the veterinary records compared to those with no code noted. The correctness was similar regardless of usage category (leisure/sport horse, racing trotter and racing thoroughbred) or gender.For the four body systems selected (joints, skin and hooves, respiratory, skeletal) the completeness varied between 71% (respiration) and 91% (joints) and the correctness ranged from 87% (skin and hooves) to 96% (respiration), whereas the specificity was >95% for all systems. Logistic regression showed that correctness was associated with type of visit, whether

  14. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    assigned, licensed spectrum; thus, it is under full control of the cellular network. D2D communication creates a market potential for new services, new approaches to efficient spectrum use, and security concepts. This is especially true if D2D communication is extended to larger communication groups...... organized in meshed clusters. In this article, we discuss the potential and shortcomings of D2D communication as proposed today, advocating for the use of network coding as an enabling technology for enhanced security and communication efficiency using the PlayNCool and CORE protocols as key examples...

  15. Performance evaluation of cellular phone network based portable ECG device.

    Science.gov (United States)

    Hong, Joo-Hyun; Cha, Eun-Jong; Lee, Tae-Soo

    2008-01-01

    In this study, cellular phone network based portable ECG device was developed and three experiments were performed to evaluate the accuracy, reliability and operability, applicability during daily life of the developed device. First, ECG signals were measured using the developed device and Biopac device (reference device) during sitting and marking time and compared to verify the accuracy of R-R intervals. Second, the reliable data transmission to remote server was verified on two types of simulated emergency event using patient simulator. Third, during daily life with five types of motion, accuracy of data transmission to remote server was verified on two types of event occurring. By acquiring and comparing subject's biomedical signal and motion signal, the accuracy, reliability and operability, applicability during daily life of the developed device were verified. Therefore, cellular phone network based portable ECG device can monitor patient with inobtrusive manner.

  16. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  17. Tunable photonic bandgap fiber based devices for optical networks

    DEFF Research Database (Denmark)

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    , for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...

  18. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  19. Increased Participation and Conversation Using Networked Devices

    Science.gov (United States)

    Danielson, Christopher; Meyer, Dan

    2016-01-01

    For many the phrase "teaching math online" evokes a vision of teaching and learning that is not based in physical classrooms. Perhaps teachers and students are even interacting asynchronously. In math classrooms in the United States, the increasing availability of devices (e.g. laptops, Chromebooks™, smartphones, and tablets) and…

  20. New Architecture of Optical Interconnect for High-Speed Optical Computerized Data Networks (Nonlinear Response

    Directory of Open Access Journals (Sweden)

    El-Sayed A. El-Badawy

    2008-02-01

    Full Text Available Although research into the use of optics in computers has increased in the last and current decades, the fact remains that electronics is still superior to optics in almost every way. Research into the use of optics at this stage mirrors the research into electronics after the 2nd World War. The advantages of using fiber optics over wiring are the same as the argument for using optics over electronics in computers. Even through totally optical computers are now a reality, computers that combine both electronics and optics, electro-optic hybrids, have been in use for some time. In the present paper, architecture of optical interconnect is built up on the bases of four Vertical-Cavity Surface- Emitting Laser Diodes (VCSELD and two optical links where thermal effects of both the diodes and the links are included. Nonlinear relations are correlated to investigate the power-current and the voltage-current dependences of the four devices. The good performance (high speed of the interconnect is deeply and parametrically investigated under wide ranges of the affecting parameters. The high speed performance is processed through three different effects, namely the device 3-dB bandwidth, the link dispersion characteristics, and the transmitted bit rate (soliton. Eight combinations are investigated; each possesses its own characteristics. The best architecture is the one composed of VCSELD that operates at 850 nm and the silica fiber whatever the operating set of causes. This combination possesses the largest device 3-dB bandwidth, the largest link bandwidth and the largest soliton transmitted bit rate. The increase of the ambient temperature reduces the high-speed performance of the interconnect

  1. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  2. Silicon photonic integrated devices for datacenter optical networks

    Science.gov (United States)

    Fiorentino, Marco; Chen, Chin-Hui; Kurczveil, Géza; Liang, Di; Peng, Zhen; Beausoleil, Raymond

    2014-03-01

    The evolution of computing infrastructure and workloads has put an enormous pressure on datacenter networks. It is expected that bandwidth will scale without increases in the network power envelope and total cost of ownership. Networks based on silicon photonic devices promise to help alleviate these problems, but a viable development path for these technologies is not yet fully outlined. In this paper, we report our progress on developing components and strategies for datacenter silicon photonics networks. We will focus on recent progress on compact, low-threshold hybrid Si lasers and the CWDM transceivers based on these lasers as well as DWDM microring resonator-based transceivers.

  3. Computerized system of automated recording and processing of seismic data from the Upper Silesian microseismic network

    Energy Technology Data Exchange (ETDEWEB)

    Kornowski, J.; Sokolowski, H.

    1981-05-01

    This paper describes operation of the Upper Silesian microseismic network, developed and directed by the Central Mining Institute. Seismic events are detected by the T-8100 Racal-Thermionic multi-channel system with Willmore MK II seismic detectors, and are transmitted to the computer center, equipped with the PDP 11/45 minicomputer produced by the Digital Equipment Corp, by means of an FM system. The recording and processing system consists of the following stages: seismic event recording, determining time of seismic events, detection of shocks and elimination of disturbances, assessment of seismic energy of rocks, identifying time of shock recording, determining shock epicenter, storage of information on shocks. Basic computer codes of the system are described: shock detection, determination of time, determination of shock epicenters, statistical processing, and storage. The system collects and stores information on earthquakes and shocks caused by rock bursts. (6 refs.) (In Polish)

  4. Wearable Device Control Platform Technology for Network Application Development

    Directory of Open Access Journals (Sweden)

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  5. Erlang-Based Sensor Network Management For Heterogeneous Devices

    Directory of Open Access Journals (Sweden)

    Michal Niec

    2012-01-01

    Full Text Available The paper describes a system designed to manage and collect data from the network of heterogeneous sensors. It was implemented using Erlang OTP and CouchDB for maximum fault tolerance, scalability and ease of deployment. It is resistant to poor network quality, shows high tolerance for software errors and power failures, operates on flexible data model. Additionally, it is available to users through an Web application, which shows just how easy it is to use the server HTTP API to communicate with it. The whole platform was implemented and tested on variety of devices like PC, Mac, ARM-based embedded devices and Android tablets.

  6. Computerized classification of liver disease in MRI using an artificial neural network

    Science.gov (United States)

    Zhang, Xuejun; Kanematsu, Masayuki; Fujita, Hiroshi; Hara, Takeshi; Hoshi, Hiroaki

    2001-07-01

    We developed a software named LiverANN based on artificial neural network (ANN) technique for distinguishing the pathologies of focal liver lesions in magnetic resonance (MR) imaging, which helps radiologists integrate the imaging findings with different pulse sequences and raise the diagnostic accuracy even with radiologists inexperienced in liver MR imaging. In each patient, regions of focal liver lesion on T1-weighted, T2-weighted, and gadolinium-enhanced dynamic MR images obtained in the hepatic arterial and equilibrium phases were placed by a radiologist (M.K.), then the program automatically calculated the brightness and homogeneity into numerical data within the selected areas as the input signals to the ANN. The outputs from the ANN were the 5 categories of focal hepatic diseases: liver cyst, cavernous hemangioma, dysplasia, hepatocellular carcinoma, and metastasis. Fifty cases were used for training the ANN, while 30 cases for testing the performance. The result showed that the LiverANN classified 5 types of focal liver lesions with sensitivity of 93%, which demonstrated the ability of ANN to fuse the complex relationships among the image findings with different sequences, and the ANN-based software may provide radiologists with referential opinion during the radiologic diagnostic procedure.

  7. Computerized Classification of Pneumoconiosis on Digital Chest Radiography Artificial Neural Network with Three Stages.

    Science.gov (United States)

    Okumura, Eiichiro; Kawashita, Ikuo; Ishida, Takayuki

    2017-08-01

    It is difficult for radiologists to classify pneumoconiosis from category 0 to category 3 on chest radiographs. Therefore, we have developed a computer-aided diagnosis (CAD) system based on a three-stage artificial neural network (ANN) method for classification based on four texture features. The image database consists of 36 chest radiographs classified as category 0 to category 3. Regions of interest (ROIs) with a matrix size of 32 × 32 were selected from chest radiographs. We obtained a gray-level histogram, histogram of gray-level difference, gray-level run-length matrix (GLRLM) feature image, and gray-level co-occurrence matrix (GLCOM) feature image in each ROI. For ROI-based classification, the first ANN was trained with each texture feature. Next, the second ANN was trained with output patterns obtained from the first ANN. Finally, we obtained a case-based classification for distinguishing among four categories with the third ANN method. We determined the performance of the third ANN by receiver operating characteristic (ROC) analysis. The areas under the ROC curve (AUC) of the highest category (severe pneumoconiosis) case and the lowest category (early pneumoconiosis) case were 0.89 ± 0.09 and 0.84 ± 0.12, respectively. The three-stage ANN with four texture features showed the highest performance for classification among the four categories. Our CAD system would be useful for assisting radiologists in classification of pneumoconiosis from category 0 to category 3.

  8. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  9. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  10. Leaner and meaner: Network coding in SIMD enabled commercial devices

    DEFF Research Database (Denmark)

    W. Sørensen, Chres; Paramanathan, Achuthan; Cabrera, Juan A.

    2016-01-01

    into energy use that may reduce the battery life of a device. This paper focuses not only on providing a comprehensive measurement study of the energy cost of RLNC in eight different computing platforms, but also explores novel approaches (e.g., tunable sparse network coding) and hardware optimizations...... 2x to as high as 20x. Finally, our results show that the latest generation of mobile processors reduce dramatically the energy per bit consumed for carrying out network coding operations compared to previous generations, thus making network coding a viable technology for the upcoming 5G...

  11. Cooperative device-to-device communication in cognitive radio cellular networks

    CERN Document Server

    Li, Peng

    2014-01-01

    This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the quality of D2D links significantly affects offloading performance in cellular networks, which motivates the design of cooperative D2D communication. After presenting the architecture of cooperative D2D communication, the challenges of capacity maximization and energy efficiency are addressed by optimi

  12. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  13. The Device Centric Communication System for 5G Networks

    Science.gov (United States)

    Biswash, S. K.; Jayakody, D. N. K.

    2017-01-01

    The Fifth Generation Communication (5G) networks have several functional features such as: Massive Multiple Input and Multiple Output (MIMO), Device centric data and voice support, Smarter-device communications, etc. The objective for 5G networks is to gain the 1000x more throughput, 10x spectral efficiency, 100 x more energy efficiency than existing technologies. The 5G system will provide the balance between the Quality of Experience (QoE) and the Quality of Service (QoS), without compromising the user benefit. The data rate has been the key metric for wireless QoS; QoE deals with the delay and throughput. In order to realize a balance between the QoS and QoE, we propose a cellular Device centric communication methodology for the overlapping network coverage area in the 5G communication system. The multiple beacon signals mobile tower refers to an overlapping network area, and a user must be forwarded to the next location area. To resolve this issue, we suggest the user centric methodology (without Base Station interface) to handover the device in the next area, until the users finalize the communication. The proposed method will reduce the signalling cost and overheads for the communication.

  14. Communication devices for network-hopping communications and methods of network-hopping communications

    Science.gov (United States)

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  15. Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Popovski, Petar

    2015-01-01

    Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii......) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which......, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while...

  16. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  17. Connectivity Analysis of Millimeter-Wave Device-to-Device Networks with Blockage

    Directory of Open Access Journals (Sweden)

    Haejoon Jung

    2016-01-01

    Full Text Available We consider device-to-device (D2D communications in millimeter-wave (mm Wave for the future fifth generation (5G cellular networks. While the mm Wave systems can support multiple D2D pairs simultaneously through beamforming with highly directional antenna arrays, the mm Wave channel is significantly more susceptible to blockage compared to microwave; mm Wave channel studies indicate that if line-of-sight (LoS paths are blocked, reliable mm Wave communications may not be achieved for high data-rate applications. Therefore, assuming that an outage occurs in the absence of the LoS path between two wireless devices by obstructions, we focus on connectivity of the mm Wave D2D networks. We consider two types of D2D communications: direct and indirect schemes. The connectivity performances of the two schemes are investigated in terms of (i the probability to achieve a fully connected network PFC and (ii the average number of reliably connected devices γ. Through analysis and simulation, we show that, as the network size increases, PFC and γ decrease. Also, PFC and γ decrease, when the blockage parameter increases. Moreover, simulation results indicate that the hybrid direct and indirect scheme can improve both PFC and γ up to about 35% compared to the nonhybrid scheme.

  18. Fairness and resource allocation in device-to-device wireless regional area network

    NARCIS (Netherlands)

    Shi, H.

    2014-01-01

    With the rapid development in wireless devices, applications and networks, radio frequencies have become scarce resources. Therefore, it is critical to make efficient use of the radio frequencies. A promising way to solve this problem is the use of cognitive radio (CR). In CR, radio frequencies are

  19. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  20. Towards a quantum network of room temperature quantum devices

    Science.gov (United States)

    Jordaan, Bertus; Shahrokhshahi, Reihaneh; Namazi, Mehdi; Goham, Connor; Figueroa, Eden

    2017-04-01

    Progressing quantum technologies to room temperature operation is key to unlock the potential and economical viability of novel many-device architectures. Along these lines, warm vapor alleviates the need for laser trapping and cooling in vacuum or cooling to cryogenic temperatures. Here we report our progress towards building a prototypical quantum network, containing several high duty cycle room-temperature quantum memories interconnected using high rate single photon sources. We have already demonstrated important capabilities, such as memory-built photon-shaping techniques, compatibility with BB84-like quantum communication links, and the possibility of interfacing with low bandwidth (MHz range), cavity enhanced, SPDC-based photon source tuned to the Rb transitions. This body of works suggest that an elementary quantum network of room temperature devices is already within experimental reach.

  1. A Single-Walled Carbon Nanotube Network Gas Sensing Device

    Directory of Open Access Journals (Sweden)

    I-Ju Teng

    2011-08-01

    Full Text Available The goal of this research was to develop a chemical gas sensing device based on single-walled carbon nanotube (SWCNT networks. The SWCNT networks are synthesized on Al2O3-deposted SiO2/Si substrates with 10 nm-thick Fe as the catalyst precursor layer using microwave plasma chemical vapor deposition (MPCVD. The development of interconnected SWCNT networks can be exploited to recognize the identities of different chemical gases by the strength of their particular surface adsorptive and desorptive responses to various types of chemical vapors. The physical responses on the surface of the SWCNT networks cause superficial changes in the electric charge that can be converted into electronic signals for identification. In this study, we tested NO2 and NH3 vapors at ppm levels at room temperature with our self-made gas sensing device, which was able to obtain responses to sensitivity changes with a concentration of 10 ppm for NO2 and 24 ppm for NH3.

  2. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  3. Communication method for high density wireless networks, terminal, cluster master device, central node, and system therefor

    NARCIS (Netherlands)

    Havinga, Paul J.M.; van Hoesel, L.F.W.; Bijwaard, D.

    2009-01-01

    Large-scale wireless sensor and actuator networks(LWSANs) are networks that consist of many sensor and/or actuator devices (i.e. >1,000 devices). These sensor and/or actuator devices (also called nodes) communicate wirelessly to deliver their sensor readings to one or more gateway devices in the

  4. Instantly decodable network coding for real-time device-to-device communications

    KAUST Repository

    Douik, Ahmed

    2016-01-04

    This paper studies the delay reduction problem for instantly decodable network coding (IDNC)-based device-to-device (D2D) communication-enabled networks. Unlike conventional point-to-multipoint (PMP) systems in which the wireless base station has the sufficient computation abilities, D2D networks rely on battery-powered operations of the devices. Therefore, a particular emphasis on the computation complexity needs to be addressed in the design of delay reduction algorithms for D2D networks. While most of the existing literature on IDNC directly extend the delay reduction PMP schemes, known to be NP-hard, to the D2D setting, this paper proposes to investigate and minimize the complexity of such algorithms for battery-powered devices. With delay minimization problems in IDNC-based systems being equivalent to a maximum weight clique problems in the IDNC graph, the presented algorithms, in this paper, can be applied to different delay aspects. This paper introduces and focuses on the reduction of the maximum value of the decoding delay as it represents the most general solution. The complexity of the solution is reduced by first proposing efficient methods for the construction, the update, and the dimension reduction of the IDNC graph. The paper, further, shows that, under particular scenarios, the problem boils down to a maximum clique problem. Due to the complexity of discovering such maximum clique, the paper presents a fast selection algorithm. Simulation results illustrate the performance of the proposed schemes and suggest that the proposed fast selection algorithm provides appreciable complexity gain as compared to the optimal selection one, with a negligible degradation in performance. In addition, they indicate that the running time of the proposed solution is close to the random selection algorithm.

  5. Measuring the performance of attention networks with the Dalhousie Computerized Attention Battery (DalCAB: Methodology and reliability in healthy adults

    Directory of Open Access Journals (Sweden)

    Stephanie Anne Holland Jones

    2016-06-01

    Full Text Available Attention is an important, multifaceted cognitive domain that has been linked to three distinct, yet interacting, networks: alerting, orienting, and executive control. The measurement of attention and deficits of attention within these networks is critical to the assessment of many neurological and psychiatric conditions in both research and clinical settings. The Dalhousie Computerized Attention Battery (DalCAB was created to assess attentional functions related to the three attention networks using a range of tasks including: simple reaction time, go/no-go, choice reaction time, dual task, flanker, item and location working memory and visual search. The current study provides preliminary normative data, test-retest reliability (intraclass correlations and practice effects in DalCAB performance 24-hours after baseline for healthy young adults (n = 96, 18-31 years. Performance on the DalCAB tasks demonstrated Good to Excellent test-retest reliability for mean reaction time, while accuracy and difference measures (e.g., switch costs, interference effects and working memory load effects were most reliable for tasks that require more extensive cognitive processing (e.g., choice reaction time, flanker, dual task, and conjunction search. Practice effects were common and pronounced at the 24-hour interval. In addition, performance related to specific within-task parameters of the DalCAB sub-tests provides preliminary support for future formal assessment of the convergent validity of our interpretation of the DalCAB as a potential clinical and research assessment tool for measuring aspects of attention related to the alerting, orienting and executive control networks.Keywords: computerized assessment; attention; orienting; alerting; executive function

  6. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-05-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  7. Fentanyl Iontophoretic Transdermal System (IONSYS(®)) can be Safely used in the Hospital Environment with X-Rays, Computerized Tomography and Radiofrequency Identification Devices.

    Science.gov (United States)

    Lemke, John; Sardariani, Edmond; Phipps, Joseph Bradley; Patel, Niki; Itri, Loretta M; Caravelli, James; Viscusi, Eugene R

    2016-09-01

    Fentanyl iontophoretic transdermal system (fentanyl ITS, IONSYS(®)) is a patient-controlled analgesia system used for the management of acute postoperative pain, designed to be utilized in a hospital setting. The objective of the two studies was to determine if fentanyl ITS could be safely used with X-rays, computerized tomography (CT) scans and radiofrequency identification (RFID) devices. The ITS system has two components: controller and drug unit; the studies utilized ITS systems without fentanyl, referred to as the ITS Placebo system. The first study evaluated the effect of X-radiation on the operation of an ITS Placebo system. Five ITS Placebo systems were exposed to X-rays (20 and 200 mSv total radiation dose-the 200 mSv radiation dose represents a tenfold higher exposure than in clinical practice) while operating in the Ready Mode and five were exposed while operating in the Dose Mode. The second study evaluated the effect of RFID (worst-case scenario of direct contact with an RFID transmitter) on the operation of an ITS Placebo system. During these tests, observations of the user interface and measurements of output voltage confirmed proper function throughout all operational modes (Ready Mode, Dose Mode, End-of-Use Mode, and End-of-Life Mode). The ITS Placebo system met all specifications and no functional anomalies were observed during and following X-ray exposure at two radiation dose levels or exposure at six different combinations of RFID frequencies and field strengths. The performance of the ITS system was unaffected by X-ray exposure levels well beyond those associated with diagnostic X-rays and CT scans, and by exposure to radiofrequency field strengths typically generated by RFID devices. These results provide added confidence to clinicians that the fentanyl ITS system does not need to be removed during diagnostic X-rays and CT scans and can also be utilized in close proximity to RFID devices. The studies and writing of this manuscript were

  8. A Categorized Resource Sharing Mechanism for Device-to-Device Communications in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jie Chen

    2016-01-01

    Full Text Available Device-to-Device (D2D communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized, is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the resource with cellular user equipment (UE simultaneously, by adjusting the transmit powers of these D2D transmitters. At the same time, D2D pairs in the first group and the third group share resource with cellular UE based on the transmit power minimization principle. Simulation results show that the proposed scheme can achieve relatively higher network throughput and lower transmit power consumption of the D2D system.

  9. Computerizing a Department of Psychiatry.

    Science.gov (United States)

    Lombroso, Paul; Eng, Lenny

    1987-01-01

    Describes the process by which a department of psychiatry computerized its clinical services under a single communication network. Presents the program in detail, demonstrating the recording of various clinical, administrative and demographic data. Emphasizes the value of such information for returning patients, immediate updating of information,…

  10. Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Jun Huang

    2015-08-01

    Full Text Available Device-to-Device (D2D communication has recently emerged as a promising technology to improve the capacity and coverage of cellular systems. To successfully implement D2D communications underlaying a cellular network, resource allocation for D2D links plays a critical role. While most of prior resource allocation mechanisms for D2D communications have focused on interference within a single-cell system, this paper investigates the resource allocation problem for a multicell cellular network in which a D2D link reuses available spectrum resources of multiple cells. A repeated game theoretic approach is proposed to address the problem. In this game, the base stations (BSs act as players that compete for resource supply of D2D, and the utility of each player is formulated as revenue collected from both cellular and D2D users using resources. Extensive simulations are conducted to verify the proposed approach and the results show that it can considerably enhance the system performance in terms of sum rate and sum rate gain.

  11. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Directory of Open Access Journals (Sweden)

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  12. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  13. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  14. FY1995 optoelectronic devices and circuits for terabit class network; 1995 nendo terabit kyu network yo hikari denshi device kairo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The necessary technology realizing Terabit class optical network is the signal multiplexing both in temporal and spectral domains. Controllability of ultrafast optoelectronic systems is therefore the priority issue. Specifically we chose semiconductor lasers as the key devices. The methodology for performance improvement and the creation of novel functionality are investigated. Firstly compression of semiconductor laser pulse reached the world record of 65 femto second. Secondly a proposal was made to control mode locked semiconductor lasers via subharmonic synchronization and a substantial phase noise reduction was demonstrated. Thirdly a new technology was developed to realize broadband anti-reflection coating on semiconductor laser amplifier facet, bringing about significant performance improvement. To compensate the dispersion induced signal distortion a broadband semiconductor laser amplifier four wave mixing was analyzed and also demonstrated experimentally. (NEDO)

  15. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed

    2016-06-29

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  16. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  17. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  18. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  19. Computerized analysis of interstitial lung diseases on chest radiographs based on lung texture, geometric-pattern features, and artificial neural networks

    Science.gov (United States)

    Ishida, Takayuki; Katsuragawa, Shigehiko; Nakamura, Katsumi; Ashizawa, Kazuto; MacMahon, Heber; Doi, Kunio

    2002-05-01

    For computerized detection of interstitial lung disease on chest radiographs, we developed three different methods: texture analysis based on the Fourier transform, geometric- pattern feature analysis, and artificial neural network (ANN) analysis of image data. With these computer-aided diagnostic methods, quantitative measures can be obtained. To improve the diagnostic accuracy, we investigated combined classification schemes by using the results obtained with the three methods for distinction between normal and abnormal chest radiographs with interstitial opacities. The sensitivities of texture analysis, geometric analysis, and ANN analysis were 88.0+/- 1.6%, 91.0+/- 2.6%, and 87.5+/- 1.9%, respectively, at a specificity of 90.0%, whereas the sensitivity of a combined classification scheme with the logical OR operation was improved to 97.1%+/- 1.5% at the same specificity of 90.0%. The combined scheme can achieve higher accuracy than the individual methods for distinction between normal and abnormal cases with interstitial opacities.

  20. Service and multimedia data transmission in IoT networks using hybrid communication devices

    OpenAIRE

    Saveliev Anton; Malov Dmitry; Tamashakin Michael; Budkov Victor

    2017-01-01

    Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization o...

  1. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  2. Plasticity in memristive devices for Spiking Neural Networks

    Directory of Open Access Journals (Sweden)

    Sylvain eSaïghi

    2015-03-01

    Full Text Available Memristive devices present a new device technology allowing for the realization of compact nonvolatile memories. Some of them are already in the process of industrialization. Additionally, they exhibit complex multilevel and plastic behaviors, which make them good candidates for the implementation of artificial synapses in neuromorphic engineering. However, memristive effects rely on diverse physical mechanisms, and their plastic behaviors differ strongly from one technology to another. Here, we present measurements performed on different memristive devices and the opportunities that they provide. We show that they can be used to implement different learning rules whose properties emerge directly from device physics: real time or accelerated operation, deterministic or stochastic behavior, long term or short term plasticity. We then discuss how such devices might be integrated into a complete architecture. These results highlight that there is no unique way to exploit memristive devices in neuromorphic systems. Understanding and embracing device physics is the key for their optimal use.

  3. Integration of a network aware traffic generation device into a computer network emulation platform

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  4. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  5. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  6. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Directory of Open Access Journals (Sweden)

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  7. Wireless Network of Collaborative Physiological Signal Devices in a U-Healthcare System

    Science.gov (United States)

    Jung, Joonyoung; Kim, Daeyoung

    We designed and implemented collaborative physiological signal devices in a u-healthcare(ubiquitous healthcare) system. In this system, wireless body area network (WBAN) such as ZigBee is used to communicate between physiological signal devices and the mobile system. WBAN device needs a specific function for ubiquitous healthcare application. We show several collaborative physiological devices and propose WBAN mechanism such as a fast scanning algorithm, a dynamic discovery and installation mechanism, a reliable data transmission, a device access control for security, and a healthcare profile for u-healthcare system.

  8. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Science.gov (United States)

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  9. Remote discovery and management of end-user devices in heterogeneous private networks

    NARCIS (Netherlands)

    Delphinanto, A.; Hillen, B.A.G.; Passchier, I.; Schoonhoven, B.H.A. van; Hartog, F.T.H. den

    2009-01-01

    End-to-end broadband service delivery requires remote management of devices in the home network, beyond the home gateway (HG). The service provider can only put limited requirements to these of-the-shelf devices, and therefore has to make intelligent use of their given control and management

  10. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  11. Service and device discovery of nodes in a wireless sensor network

    NARCIS (Netherlands)

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  12. Twiddlenet: Metadata Tagging and Data Dissemination in Mobile Device Networks

    Science.gov (United States)

    2007-09-01

    and video. Preference was given to devices capable of generating these types of files; currently these are primarily smartphones or PDA’s. Metadata...implemented using a variety of iPaq and other PDA’s and smartphones . The applications are written in C#, and generally designed to be run on devices...34Providing HTTP Access to Web Servers Rinning," Nokia ., Tech. Rep. NRC-TR-2006-005, 2006. 71 INITIAL DISTRIBUTION LIST 1. Defense

  13. 75 FR 14170 - Medical Device Epidemiology Network: Developing Partnership Between the Center for Devices and...

    Science.gov (United States)

    2010-03-24

    ... Between the Center for Devices and Radiological Health and Academia; Public Workshop AGENCY: Food and Drug... the Center for Devices and Radiological Health and Academia.'' The purpose of the public workshop is to facilitate discussion among FDA and academic researchers with expertise in epidemiology and health...

  14. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  15. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  16. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers

    OpenAIRE

    Tesfaye, Mussie

    2012-01-01

    This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. Today supervisory control and data acquisition systems utilizing network connected programmable logic controllers are widely used in many industries and critical infrastructures. These n...

  17. Computerization of academic libraries: a case study of Hezekiah ...

    African Journals Online (AJOL)

    The paper discussed the computerization of the Hezekiah Oluwasanmi Library, Obafemi Awolowo University, Ile-Ife. The history, possible design options and the level of computerization were given. The Library's network architecture and the chosen design option used were explained with reasons. The state of the art of the ...

  18. Regenerable Photovoltaic Devices with a Hydrogel-Embedded Microvascular Network

    Science.gov (United States)

    Koo, Hyung-Jun; Velev, Orlin D.

    2013-01-01

    Light-driven degradation of photoactive molecules could be one of the major obstacles to stable long term operation of organic dye-based solar light harvesting devices. One solution to this problem may be mimicking the regeneration functionality of a plant leaf. We report an organic dye photovoltaic system that has been endowed with such microfluidic regeneration functionality. A hydrogel medium with embedded channels allows rapid and uniform supply of photoactive reagents by a convection-diffusion mechanism. A washing-activation cycle enables reliable replacement of the organic component in a dye-sensitized photovoltaic system. Repetitive restoration of photovoltaic performance after intensive device degradation is demonstrated. PMID:23912814

  19. Security Frameworks for Machine-to-Machine Devices and Networks

    Science.gov (United States)

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  20. Computerized screening devices and performance assessment: development of a policy towards automation. International Academy of Cytology Task Force summary. Diagnostic Cytology Towards the 21st Century: An International Expert Conference and Tutorial.

    Science.gov (United States)

    Bartels, P H; Bibbo, M; Hutchinson, M L; Gahm, T; Grohs, H K; Gwi-Mak, E; Kaufman, E A; Kaufman, R H; Knight, B K; Koss, L G; Magruder, L E; Mango, L J; McCallum, S M; Melamed, M R; Peebles, A; Richart, R M; Robinowitz, M; Rosenthal, D L; Sauer, T; Schenck, U; Tanaka, N; Topalidis, T; Verhest, A P; Wertlake, P T; Wilbur, D C

    1998-01-01

    The extension of automation to the diagnostic assessment of clinical materials raises issues of professional responsibility, on the part of both the medical professional and designer of the device. The International Academy of Cytology (IAC) and other professional cytology societies should develop a policy towards automation in the diagnostic assessment of clinical cytologic materials. The following summarizes the discussion of the initial position statement at the International Expert Conference on Diagnostic Cytology Towards the 21st Century, Hawaii, June 1997. 1. The professional in charge of a clinical cytopathology laboratory continues to bear the ultimate medical responsibility for diagnostic decisions made at the facility, whether automated devices are involved or not. 2. The introduction of automated procedures into clinical cytology should under no circumstances lead to a lowering of standards of performance. A prime objective of any guidelines should be to ensure that an automated procedure, in principle, does not expose any patient to new risks, nor should it increase already-existing, inherent risks. 3. Automated devices should provide capabilities for the medical professional to conduct periodic tests of the appropriate performance of the device. 4. Supervisory personnel should continue visual quality control screening of a certain percentage of slides dismissed at primary screening as within normal limits (WNL), even when automated procedures are employed in the laboratory. 5. Specifications for the design of primary screening devices for the detection of cervical cancer issued by the IAC in 1984 were reaffirmed. 6. The setting of numeric performance criteria is the proper charge of regulatory agencies, which also have the power of enforcement. 7. Human expert verification of results represents the "gold standard" at this time. Performance characteristics of computerized cytology devices should be determined by adherence to defined and well

  1. Wireless Charger Networking for Mobile Devices: Fundamentals, Standards, and Applications

    OpenAIRE

    Lu, Xiao; Niyato, Dusit; Wang, Ping; Kim, Dong In; Han, Zhu

    2014-01-01

    Wireless charging is a technique of transmitting power through an air gap to an electrical device for the purpose of energy replenishment. Recently, the wireless charging technology has been significantly advanced in terms of efficiency and functionality. This article first presents an overview and fundamentals of wireless charging. We then provide the review of standards, i.e., Qi and Alliance for Wireless Power (A4WP), and highlight on their communication protocols. Next, we propose a novel...

  2. A Categorized Resource Sharing Mechanism for Device-to-Device Communications in Cellular Networks

    OpenAIRE

    Jie Chen; Chang Liu; Husheng Li; Xulong Li; Shaoqian Li

    2016-01-01

    Device-to-Device (D2D) communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized), is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the reso...

  3. Conceptual Design of a Nano-Networking Device

    Directory of Open Access Journals (Sweden)

    Sebastian Canovas-Carrasco

    2016-12-01

    Full Text Available Nanotechnology is an emerging scientific area whose advances, among many others, have a positive direct impact on the miniaturization of electronics. This unique technology enables the possibility to design and build electronic components as well as complete devices (called nanomachines or nanodevices at the nano scale. A nanodevice is expected to be an essential element able to operate in a nanonetwork, where a huge number of them would coordinate to acquire data, process the information gathered, and wirelessly transmit those data to end-points providing innovative services in many key scenarios, such as the human body or the environment. This paper is aimed at studying the feasibility of this type of device by carefully examining their main component parts, namely the nanoprocessor, nanomemory, nanoantenna, and nanogenerator. To this end, a thorough state-of-the-art review is conveyed to discuss, substantiate, and select the most suitable current technology (commercial or pre-commercial for each component. Then, we further contribute by developing a complete conceptual nanodevice layout taking into consideration its ultra-small size (similar to a blood cell and its very restricted capabilities (e.g., processing, memory storage, telecommunication, and energy management. The required resources as well as the power consumption are realistically estimated.

  4. Impact of stand-by energy losses in electronic devices on smart network performance

    Directory of Open Access Journals (Sweden)

    Mandić-Lukić Jasmina S.

    2012-01-01

    Full Text Available Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic devices is needed to operate or to be in their stand-by mode. The consumption of these devices is added to the consumption of many other electronic devices already in use in households and offices, thus giving rise to the overall power consumption and threatening to counteract the primary function of smart networks. This paper addresses the consumption of particular electronic devices, with an emphasis placed on their thermal losses when in stand-by mode and their total share in the overall power consumption in certain countries. The thermal losses of electronic devices in their stand-by mode are usually neglected, but it seems theoretically possible that a massive increase in their number can impact net performance of the future smart networks considerably so that above an optimum level of energy savings achieved by their penetration, total consumption begins to increase. Based on the current stand-by energy losses from the existing electronic devices, we propose that the future penetration of smart networks be optimized taking also into account losses from their own electronic devices, required to operate in stand-by mode.

  5. Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks

    OpenAIRE

    Taek-Young Youn; Sewon Lee; Seok Hie Hong; Young-Ho Park

    2014-01-01

    For enhancing the security of ubiquitous communication, we have to consider three keywords: mobility, wireless, and low computing capability. In this paper, we study one of suitable security protocols for the ubiquitous communication environment. We discuss RSA-based password-authenticated key exchange (RSA-PAKE) protocols for imbalanced wireless networks where a party uses a low-power device to communicate with another party equipped with a powerful computing device. For imbalanced wireless ...

  6. Monitoring and Transmission via Wireless Network for an Assistive Device.

    Science.gov (United States)

    Chang, Yi-Chu; Chen, Chiun-Fan; Lin, Hua-Sheng; Chong, Fok-Ching; Luh, Jer-Junn; Lai, Jin-Shin

    2005-01-01

    Owing to the increasing number of disabled individuals, technical aids are acting more aggressively in the era of modern medicine. The M3S (Multiple Master Multiple Slave) system developed for the physically challenged, utilizes intelligent transmission and integration mechanisms to arrange all hooked-up devices with proper control. To overcome certain limitations of the system (e.g. distance), an RF (Radio Frequency) wireless module would be in charge of the wireless communication between a remote bus and a local bus. It is demonstrated here as assistance for parking assistive vehicles (e.g. powered wheelchair) located in a remote region, which also includes monitoring and usage of accessorial data transmissions shown in our man-machine interface.

  7. Redirecting a client device from a first gateway to a second gateway for accessing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Norp, A.H.J.

    2014-01-01

    The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway

  8. The Networked Naturalist - Mobile devices for Citizen Science

    Science.gov (United States)

    Estrin, D.; Graham, E. A.

    2010-12-01

    Citizen science projects engage individual volunteers or groups to observe, measure, and contribute data to scientific studies. CENS is developing mobile phone and web-based tools for formal and informal observation of ecosystems. We are collaborating with national environmental education campaigns, such as Project BudBurst, and with the National Park Service to increase participation in citizen scientist campaigns and to support park service personnel in day to day data gathering. The overarching goals of the Networked Naturalist set of projects are to enhance participatory learning experiences through citizen science campaigns and to facilitate scientific and environmental data collection. Our experience with volunteers at UCLA and at the National Park Service has demonstrated that mobile phones are an efficient, effective and engaging method for collecting environmental and location data and hold great potential for both raising public awareness of environmental issues and collecting data that is valuable for both ecosystem management and research. CENS is an NSF-funded Science and Technology Center and this project represents collaboration among ecologists, computer scientist, and statisticians. Our mobile applications are free for download on Android and iPhone App stores and the source code is made available through open source licenses.

  9. Combined Resource Allocation System for Device-to-Device Communication towards LTE Networks

    Directory of Open Access Journals (Sweden)

    Abbas Fakhar

    2016-01-01

    Full Text Available The LTE networks are being developed to grant mobile broadband services in the fourth generation (4G systems and allow operators to use spectrum more efficiently.D2D communication is a promising technique to provide wireless services and enhance spectrum exploitation in the LTE Heterogeneous Networks (HetNets.D2D communication in HetNets allows users to communicate with each other directly by reusing the resources when communicating via the base stations. But during the downlink period, both the D2D receiver and the Heterogeneous Users equipment’s (HUE experience interference caused by resource allocation. In this article, we identify and analyze the interference problem of HetNets caused by D2D transmitter during download. We propose a combined resource allocation and resource reuse method for LTE HetNets, where resource allocation to HUEs is employed on the basis of comparative fair algorithm and resource reuse to D2D users is employed on acquisitive empirical algorithm. This approach evaluates whether D2D mode is suitable or not by path loss evaluation, after that decreases the interference to HUE by selection of the minimum channel gain between HUE and D2D transmitter each time to mitigate interference. Our simulation results show that the efficiency and throughput of HetNets is improved by using the proposed method.

  10. Unique device identifiers for coronary stent postmarket surveillance and research: a report from the Food and Drug Administration Medical Device Epidemiology Network Unique Device Identifier demonstration.

    Science.gov (United States)

    Tcheng, James E; Crowley, Jay; Tomes, Madris; Reed, Terrie L; Dudas, Joseph M; Thompson, Kweli P; Garratt, Kirk N; Drozda, Joseph P

    2014-10-01

    Although electronic product identification in the consumer sector is ubiquitous, unique identification of medical devices is just being implemented in 2014. To evaluate unique device identifiers (UDIs) in health care, the US Food and Drug Administration (FDA) funded the Medical Device Epidemiology Network initiative, including a demonstration of the implementation of coronary stent UDI data in the information systems of a multihospital system (Mercy Health). This report describes the first phase of the demonstration. An expert panel of interventional cardiologists nominated by the American College of Cardiology and the Society for Cardiovascular Angiography and Interventions was convened with representatives of industry, health system members of the Healthcare Transformation Group, the American College of Cardiology National Cardiovascular Data Registry, and FDA to articulate concepts needed to best use UDI-associated data. The expert panel identified 3: (1) use cases for UDI-associated data (eg, research), (2) a supplemental data set of clinically relevant attributes (eg, stent dimensions), and (3) governance and administrative principles for the authoritative management of these data. Eighteen use cases were identified, encompassing clinical care, supply chain management, consumer information, research, regulatory, and surveillance domains. In addition to the attributes of the FDA Global Unique Device Identification Database, 9 additional coronary stent-specific attributes were required to address use case requirements. Recommendations regarding governance were elucidated as foundational principles for UDI-associated data management. This process for identifying requisite extensions to support the effective use of UDI-associated data should be generalizable. Implementation of a UDI system for medical devices must anticipate both global and device-specific information. Copyright © 2014 Mosby, Inc. All rights reserved.

  11. Narrating Networks : Exploring the affordances of networks as storytelling devices in journalism

    NARCIS (Netherlands)

    Bounegru, Liliana; Venturini, Tommaso; Gray, Jonathan; Jacomy, Mathieu

    2017-01-01

    Networks have become the de facto diagram of the Big Data age (try searching Google Images for [big data AND visualisation] and see). The concept of networks has become central to many fields of human inquiry and is said to revolutionise everything from medicine to markets to military intelligence.

  12. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  13. Response of asymmetric carbon nanotube network devices to sub-terahertz and terahertz radiation

    Energy Technology Data Exchange (ETDEWEB)

    Gayduchenko, I., E-mail: igorandg@gmail.com, E-mail: gefedorov@mail.ru [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); National Research Centre “Kurchatov Institute,” Moscow 123128 (Russian Federation); Kardakova, A.; Voronov, B.; Finkel, M. [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Fedorov, G., E-mail: igorandg@gmail.com, E-mail: gefedorov@mail.ru [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Moscow Institute of Physics and Technology (State University), Dolgoprudny 141700 (Russian Federation); Jiménez, D. [Departament d' Enginyeria Electrònica, Escola d' Enginyeria, Universitat Autònoma de Barcelona, 08193 Bellaterra (Spain); Morozov, S. [Moscow Institute of Physics and Technology (State University), Dolgoprudny 141700 (Russian Federation); Presniakov, M. [National Research Centre “Kurchatov Institute,” Moscow 123128 (Russian Federation); Goltsman, G. [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Moscow Institute of Electronics and Mathematics, National Research University Higher School of Economics, Moscow 109028 (Russian Federation)

    2015-11-21

    Demand for efficient terahertz radiation detectors resulted in intensive study of the asymmetric carbon nanostructures as a possible solution for that problem. It was maintained that photothermoelectric effect under certain conditions results in strong response of such devices to terahertz radiation even at room temperature. In this work, we investigate different mechanisms underlying the response of asymmetric carbon nanotube (CNT) based devices to sub-terahertz and terahertz radiation. Our structures are formed with CNT networks instead of individual CNTs so that effects probed are more generic and not caused by peculiarities of an individual nanoscale object. We conclude that the DC voltage response observed in our structures is not only thermal in origin. So called diode-type response caused by asymmetry of the device IV characteristic turns out to be dominant at room temperature. Quantitative analysis provides further routes for the optimization of the device configuration, which may result in appearance of novel terahertz radiation detectors.

  14. Technologies in Computerized Lexicography

    African Journals Online (AJOL)

    scope of this paper (for a historical review of NLP, see Sparck Jones 1995). Here, it is relevant that the automatic analysis of language has become an inter- disciplinary topic of interest, and that some developments may have relevance to corpus analysis and computerized corpus-based lexicography. We particu- larly refer ...

  15. Computerized Mastery Testing.

    Science.gov (United States)

    Lewis, Charles; Sheehan, Kathleen

    1988-01-01

    Introduces a theoretical framework for mastery testing, using Item Response Theory and Bayesian Decision Theory. The idea of sequential testing is developed, with the goal of providing longer or shorter tests as needed, and a computerized application to a hypothetical professional knowledge examination is discussed. (Author/LRW)

  16. Using Automated Learning Devices for Monkeys (ALDM) to study social networks.

    Science.gov (United States)

    Claidière, Nicolas; Gullstrand, Julie; Latouche, Aurélien; Fagot, Joël

    2017-02-01

    Social network analysis has become a prominent tool to study animal social life, and there is an increasing need to develop new systems to collect social information automatically, systematically, and reliably. Here we explore the use of a freely accessible Automated Learning Device for Monkeys (ALDM) to collect such social information on a group of 22 captive baboons (Papio papio). We compared the social network obtained from the co-presence of the baboons in ten ALDM testing booths to the social network obtained through standard behavioral observation techniques. The results show that the co-presence network accurately reflects the social organization of the group, and also indicate under which conditions the co-presence network is most informative. In particular, the best correlation between the two networks was obtained with a minimum of 40 days of computer records and for individuals with at least 500 records per day. We also show through random permutation tests that the observed correlations go beyond what would be observed by simple synchronous activity, to reflect a preferential choice of closely located testing booths. The use of automatized cognitive testing therefore presents a new way of obtaining a large and regular amount of social information that is necessary to develop social network analysis. It also opens the possibility of studying dynamic changes in network structure with time and in relation to the cognitive performance of individuals.

  17. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas

    2015-10-24

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  18. Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network

    Directory of Open Access Journals (Sweden)

    Yan-Lin Tang

    2016-03-01

    Full Text Available Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.

  19. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  20. Research on accounting transition from computerization to informationization

    Directory of Open Access Journals (Sweden)

    Shu Chen

    2017-11-01

    Full Text Available The application for computer technology, digitalization technology and network technology in the accounting field has promoted the development of accounting informationization. Accounting informationization is a product integrated with traditional accounting theory and modern information technology, which is an inevitable trend of continuous development of modern accounting. This paper discusses the basic concepts and characteristics of accounting computerization and informationization based on the normative research method and literature data method, analyzes the feasibility of accounting transition from computerization to informationization, and finally puts forward the specific approaches and ultimate goals of accounting transition from computerization to informationization.

  1. QNAP 1263U Network Attached Storage (NAS)/ Storage Area Network (SAN) Device Users Guide

    Science.gov (United States)

    2016-11-01

    speed of the network itself. Many standards are in place for transferring data, including more standard ones such as File Transfer Protocol and Server ...Mapping the Network Drive 4 5.1 Windows 7 4 5.2 Windows 10 6 6. Connecting to the iSCSI on the NAS 6 7. Adding a New IQN to iSCSI ACL 7 8... Adding a New LUN 9 9. Finding an Initiator IQN for ACL 11 10. Virtualization Station 12 11. Code 12 11.1 iscsi setup.bat 13 11.2 reconnect

  2. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Directory of Open Access Journals (Sweden)

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  3. Computerizing clinical practice guidelines

    DEFF Research Database (Denmark)

    Lyng, Karen Marie

    . The analysis focuses on the emergence of general clinical work practice demands on guidance • An analysis of guidance demands from clinical work practice and business strategy, focusing on implications for the design of computerised CPGs. In my research, I have applied observation studies, interviews......It is well described that hospitals have problems with sustaining high quality of care and expedient introduction of new medical knowledge. Clinical practice guidelines (CPGs) have been promoted as a remedy to deal with these problems. It is, however, also well described that application...... and compliance with CPGs in most areas of clinical practice are deficient. Computerization of CPGs has been brought forward as a method to disseminate and to support application of CPGs. Until now, CPG-computerization has focused on development of formal expressions of CPGs. The developed systems have, however...

  4. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2017-10-01

    Full Text Available In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU devices to convolutional neural networks (CNNs. We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  5. Hybrid Spintronic-CMOS Spiking Neural Network with On-Chip Learning: Devices, Circuits, and Systems

    Science.gov (United States)

    Sengupta, Abhronil; Banerjee, Aparajita; Roy, Kaushik

    2016-12-01

    Over the past decade, spiking neural networks (SNNs) have emerged as one of the popular architectures to emulate the brain. In SNNs, information is temporally encoded and communication between neurons is accomplished by means of spikes. In such networks, spike-timing-dependent plasticity mechanisms require the online programing of synapses based on the temporal information of spikes transmitted by spiking neurons. In this work, we propose a spintronic synapse with decoupled spike-transmission and programing-current paths. The spintronic synapse consists of a ferromagnet-heavy-metal heterostructure where the programing current through the heavy metal generates spin-orbit torque to modulate the device conductance. Low programing energy and fast programing times demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We perform a simulation study based on an experimentally benchmarked device-simulation framework to demonstrate the interfacing of such spintronic synapses with CMOS neurons and learning circuits operating in the transistor subthreshold region to form a network of spiking neurons that can be utilized for pattern-recognition problems.

  6. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  7. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices.

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  8. Green Small Cell Operation of Ultra-Dense Networks Using Device Assistance

    Directory of Open Access Journals (Sweden)

    Gilsoo Lee

    2016-12-01

    Full Text Available As higher performance is demanded in 5G networks, energy consumption in wireless networks increases along with the advances of various technologies, so enhancing energy efficiency also becomes an important goal to implement 5G wireless networks. In this paper, we study the energy efficiency maximization problem focused on finding a suitable set of turned-on small cell access points (APs. Finding the suitable on/off states of APs is challenging since the APs can be deployed by users while centralized network planning is not always possible. Therefore, when APs in small cells are randomly deployed and thus redundant in many cases, a mechanism of dynamic AP turning-on/off is required. We propose a device-assisted framework that exploits feedback messages from the user equipment (UE. To solve the problem, we apply an optimization method using belief propagation (BP on a factor graph. Then, we propose a family of online algorithms inspired by BP, called DANCE, that requires low computational complexity. We perform numerical simulations, and the extensive simulations confirm that BP enhances energy efficiency significantly. Furthermore, simple, but practical DANCE exhibits close performance to BP and also better performance than other popular existing methods. Specifically, in a small-sized network, BP enhances energy efficiency 129%. Furthermore, in ultra-dense networks, DANCE algorithms successfully achieve orders of magnitude higher energy efficiency than that of the baseline.

  9. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers

    Science.gov (United States)

    Li, Fei; Zhao, Wei; Guo, Ying

    2017-09-01

    Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.

  10. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Science.gov (United States)

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  11. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    Science.gov (United States)

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Flow control using audio tones in resonant microfluidic networks: towards cell-phone controlled lab-on-a-chip devices.

    Science.gov (United States)

    Phillips, Reid H; Jain, Rahil; Browning, Yoni; Shah, Rachana; Kauffman, Peter; Dinh, Doan; Lutz, Barry R

    2016-08-16

    Fluid control remains a challenge in development of portable lab-on-a-chip devices. Here, we show that microfluidic networks driven by single-frequency audio tones create resonant oscillating flow that is predicted by equivalent electrical circuit models. We fabricated microfluidic devices with fluidic resistors (R), inductors (L), and capacitors (C) to create RLC networks with band-pass resonance in the audible frequency range available on portable audio devices. Microfluidic devices were fabricated from laser-cut adhesive plastic, and a "buzzer" was glued to a diaphragm (capacitor) to integrate the actuator on the device. The AC flowrate magnitude was measured by imaging oscillation of bead tracers to allow direct comparison to the RLC circuit model across the frequency range. We present a systematic build-up from single-channel systems to multi-channel (3-channel) networks, and show that RLC circuit models predict complex frequency-dependent interactions within multi-channel networks. Finally, we show that adding flow rectifying valves to the network creates pumps that can be driven by amplified and non-amplified audio tones from common audio devices (iPod and iPhone). This work shows that RLC circuit models predict resonant flow responses in multi-channel fluidic networks as a step towards microfluidic devices controlled by audio tones.

  13. Soft hydrogels interpenetrating silicone--A polymer network for drug-releasing medical devices.

    Science.gov (United States)

    Steffensen, Søren L; Vestergaard, Merete H; Møller, Eva H; Groenning, Minna; Alm, Martin; Franzyk, Henrik; Nielsen, Hanne M

    2016-02-01

    Materials for the next generation of medical devices will require not only the mechanical stability of current devices, but must also possess other properties such as sustained release of drugs in a controlled manner over a prolonged period of time. This work focuses on creating such a sophisticated material by forming an interpenetrating polymer network (IPN) material through modification of silicone elastomers with a poly(2-hydroxyethyl methacrylate) (PHEMA)-based hydrogel. IPN materials with a PHEMA content in the range of 13%-38% (w/w) were synthesized by using carbon dioxide-based solvent mixtures under high pressure. These IPNs were characterized with regard to microstructure as well as ability of the hydrogel to form a surface-connected hydrophilic carrier network inside the silicone. A critical limit for hydrogel connectivity was found both via simulation and by visualization of water uptake in approximately 25% (w/w) PHEMA, indicating that entrapment of gel occurs at low gel concentrations. The optimized IPN material was loaded with the antibiotic ciprofloxacin, and the resulting drug release was shown to inhibit bacterial growth when placed on agar, thus demonstrating the potential of this IPN material for future applications in drug-releasing medical devices. © 2015 Wiley Periodicals, Inc.

  14. Distributed processing and network of data acquisition and diagnostics control for Large Helical Device (LHD)

    Energy Technology Data Exchange (ETDEWEB)

    Nakanishi, H.; Kojima, M.; Hidekuma, S. [National Inst. for Fusion Science, Toki, Gifu (Japan)

    1997-11-01

    The LHD (Large Helical Device) data processing system has been designed in order to deal with the huge amount of diagnostics data of 600-900 MB per 10-second short-pulse experiment. It prepares the first plasma experiment in March 1998. The recent increase of the data volume obliged to adopt the fully distributed system structure which uses multiple data transfer paths in parallel and separates all of the computer functions into clients and servers. The fundamental element installed for every diagnostic device consists of two kinds of server computers; the data acquisition PC/Windows NT and the real-time diagnostics control VME/VxWorks. To cope with diversified kinds of both device control channels and diagnostics data, the object-oriented method are utilized wholly for the development of this system. It not only reduces the development burden, but also widen the software portability and flexibility. 100Mbps EDDI-based fast networks will re-integrate the distributed server computers so that they can behave as one virtual macro-machine for users. Network methods applied for the LHD data processing system are completely based on the TCP/IP internet technology, and it provides the same accessibility to the remote collaborators as local participants can operate. (author)

  15. Computerized ionospheric tomography

    Energy Technology Data Exchange (ETDEWEB)

    Austen, J.R.; Raymund, T.D.; Klobuchar, J.A.; Stalker, J.; Liu, C.H.

    1990-05-03

    In this paper the background of computerized tomography (CT) and its application to the ionosphere is reviewed. CT techniques, using only total electron content (TEC) data, can be used to reconstruct a two-dimensional image of the electron density in the ionosphere. The limitations of this technique are discussed and examples showing the limitations and capabilities are presented. Simulation results for two applications are presented: imaging the high latitude trough, and the correction of tracking radar range rate errors. Some possible extensions of the technique are presented.

  16. Remote management of non-TR-069 UPnP end-user devices in a private network

    NARCIS (Netherlands)

    Hillen, B.A.G.; Passchier, I.; Schoonhoven, B.H.A. van; Hartog, F.T.H. den

    2009-01-01

    End-to - end broadband service delivery requires remote management of devices in the home network, beyond the home gateway (HG). The service provider can only put limited requirements to these of-the-shelf devices, and therefore has to make intelligent use of their given control and management

  17. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  18. Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    Science.gov (United States)

    Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei

    2017-04-01

    Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.

  19. Integrated control of wind farms, FACTS devices and the power network using neural networks and adaptive critic designs

    Science.gov (United States)

    Qiao, Wei

    Worldwide concern about the environmental problems and a possible energy crisis has led to increasing interest in clean and renewable energy generation. Among various renewable energy sources, wind power is the most rapidly growing one. Therefore, how to provide efficient, reliable, and high-performance wind power generation and distribution has become an important and practical issue in the power industry. In addition, because of the new constraints placed by the environmental and economical factors, the trend of power system planning and operation is toward maximum utilization of the existing infrastructure with tight system operating and stability margins. This trend, together with the increased penetration of renewable energy sources, will bring new challenges to power system operation, control, stability and reliability which require innovative solutions. Flexible ac transmission system (FACTS) devices, through their fast, flexible, and effective control capability, provide one possible solution to these challenges. To fully utilize the capability of individual power system components, e.g., wind turbine generators (WTGs) and FACTS devices, their control systems must be suitably designed with high reliability. Moreover, in order to optimize local as well as system-wide performance and stability of the power system, real-time local and wide-area coordinated control is becoming an important issue. Power systems containing conventional synchronous generators, WTGs, and FACTS devices are large-scale, nonlinear, nonstationary, stochastic and complex systems distributed over large geographic areas. Traditional mathematical tools and system control techniques have limitations to control such complex systems to achieve an optimal performance. Intelligent and bio-inspired techniques, such as swarm intelligence, neural networks, and adaptive critic designs, are emerging as promising alternative technologies for power system control and performance optimization. This

  20. A cost-effective measurement-device-independent quantum key distribution system for quantum networks

    Science.gov (United States)

    Valivarthi, Raju; Zhou, Qiang; John, Caleb; Marsili, Francesco; Verma, Varun B.; Shaw, Matthew D.; Nam, Sae Woo; Oblak, Daniel; Tittel, Wolfgang

    2017-12-01

    We experimentally realize a measurement-device-independent quantum key distribution (MDI-QKD) system. It is based on cost-effective and commercially available hardware such as distributed feedback lasers and field-programmable gate arrays that enable time-bin qubit preparation and time-tagging, and active feedback systems that allow for compensation of time-varying properties of photons after transmission through deployed fiber. We examine the performance of our system, and conclude that its design does not compromise performance. Our demonstration paves the way for MDI-QKD-based quantum networks in star-type topology that extend over more than 100 km distance.

  1. Research on two-port network of wavelet transform processor using surface acoustic wavelet devices and its application.

    Science.gov (United States)

    Liu, Shoubing; Lu, Wenke; Zhu, Changchun

    2017-11-01

    The goal of this research is to study two-port network of wavelet transform processor (WTP) using surface acoustic wave (SAW) devices and its application. The motive was prompted by the inconvenience of the long research and design cycle and the huge research funding involved with traditional method in this field, which were caused by the lack of the simulation and emulation method of WTP using SAW devices. For this reason, we introduce the two-port network analysis tool, which has been widely used in the design and analysis of SAW devices with uniform interdigital transducers (IDTs). Because the admittance parameters calculation formula of the two-port network can only be used for the SAW devices with uniform IDTs, this analysis tool cannot be directly applied into the design and analysis of the processor using SAW devices, whose input interdigital transducer (IDT) is apodized weighting. Therefore, in this paper, we propose the channel segmentation method, which can convert the WTP using SAW devices into parallel channels, and also provide with the calculation formula of the number of channels, the number of finger pairs and the static capacitance of an interdigital period in each parallel channel firstly. From the parameters given above, we can calculate the admittance parameters of the two port network for each channel, so that we can obtain the admittance parameter of the two-port network of the WTP using SAW devices on the basis of the simplification rule of parallel two-port network. Through this analysis tool, not only can we get the impulse response function of the WTP using SAW devices but we can also get the matching circuit of it. Large numbers of studies show that the parameters of the two-port network obtained by this paper are consistent with those measured by network analyzer E5061A, and the impulse response function obtained by the two-port network analysis tool is also consistent with that measured by network analyzer E5061A, which can meet the

  2. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  3. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández

    2014-01-01

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678

  4. A ubiquitous sensor network platform for integrating smart devices into the semantic sensor web.

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Alvaro Sigüenza; Vercher, Jesús Bernat; Hernández Gómez, Luis Alfonso

    2014-06-18

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.

  5. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Directory of Open Access Journals (Sweden)

    David Díaz Pardo de Vera

    2014-06-01

    Full Text Available Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.

  6. Computerizing natural history collections.

    Science.gov (United States)

    Sunderland, Mary E

    2013-09-01

    Computers are ubiquitous in the life sciences and are associated with many of the practical and conceptual changes that characterize biology's twentieth-century transformation. Yet comparatively little has been written about how scientists use computers. Despite this relative lack of scholarly attention, the claim that computers revolutionized the life sciences by making the impossible possible is widespread, and relatively unchallenged. How did the introduction of computers into research programs shape scientific practice? The Museum of Vertebrate Zoology (MVZ) at the University of California, Berkeley provides a tractable way into this under-examined question because it is possible to follow the computerization of data in the context of long-term research programs. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  8. An optimized electronic device for solar power harvesting dedicated to wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Le Cam, Vincent; Le Maulf, Regis; Lemarchand, Laurent; Martin, William; Le Pen, Mathieu [LUNAM Univ., Bouguenais (France). IFSTTAR, MACS Dept.

    2012-07-01

    For economics as for practical reasons, this last decade, the use and dissemination of wireless sensor networks (WSN) became obvious; particularly in structural heath monitoring (SHM) use-cases where distances between sensors could be long and access to the structure quite difficult. Even if efforts are leaded to design small components and RF modules that ask for low-power, the need of an external source is often necessary. After have acquired knowledge in solar cells as in batteries technologies and methods to control charge/discharge phases as in optimizing algorithms, IFSTTAR laboratory has designed an electronic device that integrates those progress. This electronic device has a quite generic mission: for a panel of batteries chemistry (Lithium, NiMh) and a panel of solar cells sources (frome mW to some W), the system acts as an improved battery charger whatever the load ask for power. The system applies control algorithms based on battery capacity and chemistry profile. It also applies the MPPT (Maximum Power Point Tracking) algorithm. At any time, battery State Of Charge (SOC) can be requested via I2C bus as well as a warning signal is output when SOC becomes critical. Through standard pin connectors and a simple I2C interface, the system can be used by many wireless devices (sensors) that have to run autonomously. After the presentation of this system, a focus on its application on a real use-case will be given. (orig.)

  9. A Programming Language Approach to Safety in Home Networks

    DEFF Research Database (Denmark)

    Mortensen, Kjeld Høyer; Schougaard, Kari Rye; Schultz, Ulrik Pagh

    Home networks and the interconnection of home appliances is a classical theme in pervasive computing research. Security is usually addressed through the use of encryption and authentication, but there is a lack of awareness of safety: reventing the computerized house from harming the inhabitants......-based restrictions on operations. This model has been implemented in a middleware for home AV devices written in Java, using infrared communication and a FireWire network to implement location awareness....

  10. A Programming Language Approach to Safety in Home Networks

    DEFF Research Database (Denmark)

    Mortensen, Kjeld Høyer; Schougaard, Kari Sofie Fogh; Schultz, Ulrik Pagh

    2003-01-01

    Home networks and the interconnection of home appliances is a classical theme in pervasive computing research. Security is usually addressed through the use of encryption and authentication, but there is a lack of awareness of safety: preventing the computerized house from harming the inhabitants......-based restrictions on operations. This model has been implemented in a middleware for home AV devices written in Java, using infrared communication and a FireWire network to implement location awareness....

  11. Identification of Measures and Indicators for the IT Security of Networked Medical Devices: A Delphi Study.

    Science.gov (United States)

    Leber, Stefan; Ammenwerth, Elske

    2017-01-01

    The networking of medical devices or systems in a hospital network is the foundation for modern medical diagnostics and therapy. This, however, makes possible numerous hazards that could lead to risks for patients, clinical processes or data and information. The aim of the work was to develop a catalogue of measures and indicators for the effective support of the IT risk management process in a health facility. Through a qualitative and quantitative Delphi study among 21 experts, it was possible to identify an initial 51 practice-relevant measures of IT risk management that a hospital should implement. Additionally, 27 indicators were defined which can be used to measure the impact of these measures. Of the 51 measures, 35 were seen as especially important, particularly organizational measures. Of the 27 indicators, six were seen as especially important, particularly indicators to measure networking effectiveness. The study also investigated the impact of the measures on the indicators. A case study is planned to investigate the practicability of the identified measures and indicators.

  12. Coordinated reactive power management in power networks with wind turbines and FACTS devices

    Energy Technology Data Exchange (ETDEWEB)

    Amaris, Hortensia, E-mail: hamaris@ing.uc3m.e [University Carlos III of Madrid, Electrical Engineering Department, 28911 Leganes, Madrid (Spain); Alonso, Monica, E-mail: moalonso@ing.uc3m.e [University Carlos III of Madrid, Electrical Engineering Department, 28911 Leganes, Madrid (Spain)

    2011-07-15

    Highlights: {yields} Coordinated reactive power management among variable speed wind farms and static var compensator to improve the voltage stability in the network. {yields} Optimization formulation including the reactive power capability from double-fed induction generators (from the induction machine and the grid side converter). {yields} Application of genetic algorithm in power networks with wind farms. -- Abstract: Reactive power management is a critical issue when dealing with the planning and operation of power networks with high wind energy penetration. This paper is intended to introduce a coordinated Reactive Power Planning strategy among Doubly-Fed Induction Generator (DFIG) variable speed wind turbines and Flexible AC Transmission Systems (FACTS) devices. According to this strategy, the reactive power capability from DFIG wind turbines is obtained and the limitations on deliverable power are deduced for each operation point. Furthermore, instead of using the reactive power limit as it is traditionally done, the reactive power injection from Static Var Compensator (SVC) is related to the existing physical limits of the control variables. The optimization strategy is based on genetic algorithms and includes directly in its formulation both the reactive power capability from wind turbines and the reactive power injection from SVC units. An existing 140-bus power system is used to validate the performance and effectiveness of the proposed method.

  13. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2016-07-01

    Full Text Available In recent years, deep neural networks (DNN have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30,000X compared to state-of-the-art microprocessors while providing power efficiency of 84,000 GigaOps/s/W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things sensors.

  14. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations.

    Science.gov (United States)

    Gokmen, Tayfun; Vlasov, Yurii

    2016-01-01

    In recent years, deep neural networks (DNN) have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU) devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30, 000 × compared to state-of-the-art microprocessors while providing power efficiency of 84, 000 GigaOps∕s∕W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration, and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things) sensors.

  15. Three-terminal ferroelectric synapse device with concurrent learning function for artificial neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Nishitani, Y.; Kaneko, Y.; Ueda, M.; Fujii, E. [Advanced Technology Research Laboratories, Panasonic Corporation, Seika, Kyoto 619-0237 (Japan); Morie, T. [Graduate School of Life Science and Systems Engineering, Kyushu Institute of Technology, Wakamatsu-ku, Kitakyushu 808-0196 (Japan)

    2012-06-15

    Spike-timing-dependent synaptic plasticity (STDP) is demonstrated in a synapse device based on a ferroelectric-gate field-effect transistor (FeFET). STDP is a key of the learning functions observed in human brains, where the synaptic weight changes only depending on the spike timing of the pre- and post-neurons. The FeFET is composed of the stacked oxide materials with ZnO/Pr(Zr,Ti)O{sub 3} (PZT)/SrRuO{sub 3}. In the FeFET, the channel conductance can be altered depending on the density of electrons induced by the polarization of PZT film, which can be controlled by applying the gate voltage in a non-volatile manner. Applying a pulse gate voltage enables the multi-valued modulation of the conductance, which is expected to be caused by a change in PZT polarization. This variation depends on the height and the duration of the pulse gate voltage. Utilizing these characteristics, symmetric and asymmetric STDP learning functions are successfully implemented in the FeFET-based synapse device by applying the non-linear pulse gate voltage generated from a set of two pulses in a sampling circuit, in which the two pulses correspond to the spikes from the pre- and post-neurons. The three-terminal structure of the synapse device enables the concurrent learning, in which the weight update can be performed without canceling signal transmission among neurons, while the neural networks using the previously reported two-terminal synapse devices need to stop signal transmission for learning.

  16. Marine biology and computerization

    Digital Repository Service at National Institute of Oceanography (India)

    Parulekar, A.H.

    stream_size 3 stream_content_type text/plain stream_name Natl_Workshop_Database_Networking_Mar_Biol_1994_1.pdf.txt stream_source_info Natl_Workshop_Database_Networking_Mar_Biol_1994_1.pdf.txt Content-Encoding ISO-8859-1 Content-Type... text/plain; charset=ISO-8859-1 ...

  17. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Energy Technology Data Exchange (ETDEWEB)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  18. InP on SOI devices for optical communication and optical network on chip

    Science.gov (United States)

    Fedeli, J.-M.; Ben Bakir, B.; Olivier, N.; Grosse, Ph.; Grenouillet, L.; Augendre, E.; Phillippe, P.; Gilbert, K.; Bordel, D.; Harduin, J.

    2011-01-01

    For about ten years, we have been developing InP on Si devices under different projects focusing first on μlasers then on semicompact lasers. For aiming the integration on a CMOS circuit and for thermal issue, we relied on SiO2 direct bonding of InP unpatterned materials. After the chemical removal of the InP substrate, the heterostructures lie on top of silicon waveguides of an SOI wafer with a separation of about 100nm. Different lasers or photodetectors have been achieved for off-chip optical communication and for intra-chip optical communication within an optical network. For high performance computing with high speed communication between cores, we developed InP microdisk lasers that are coupled to silicon waveguide and produced 100μW of optical power and that can be directly modulated up to 5G at different wavelengths. The optical network is based on wavelength selective circuits with ring resonators. InGaAs photodetectors are evanescently coupled to the silicon waveguide with an efficiency of 0.8A/W. The fabrication has been demonstrated at 200mm wafer scale in a microelectronics clean room for CMOS compatibility. For off-chip communication, silicon on InP evanescent laser have been realized with an innovative design where the cavity is defined in silicon and the gain localized in the QW of bonded InP hererostructure. The investigated devices operate at continuous wave regime with room temperature threshold current below 100 mA, the side mode suppression ratio is as high as 20dB, and the fibercoupled output power is {7mW. Direct modulation can be achieved with already 6G operation.

  19. Squeeze-chip: a finger-controlled microfluidic flow network device and its application to biochemical assays.

    Science.gov (United States)

    Li, Wentao; Chen, Tao; Chen, Zitian; Fei, Peng; Yu, Zhilong; Pang, Yuhong; Huang, Yanyi

    2012-05-07

    We designed and fabricated a novel microfluidic device that can be operated through simple finger squeezing. On-chip microfluidic flow control is enabled through an optimized network of check-valves and squeeze-pumps. The sophisticated flow system can be easily constructed by combining a few key elements. We implemented this device to perform quantitative biochemical assays with no requirement for precision instruments.

  20. Tolerance of intrinsic device variation in fuzzy restricted Boltzmann machine network based on memristive nano-synapses

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Lu, Xiayan; Cai, Yimao; Yang, Yuchao; Huang, Ru

    2017-06-01

    Inspired by the architecture and principle of the human brain, neuromorphic computing has attracted enormous research interest due to its potential for massively parallel and energy-efficient computing, where nanoscale memristors are considered as perfect building blocks for hardware neural networks, serving as compact, analog synapses. However, the inherent variation in memristors has been regarded as a major obstacle to their practical application in neuromorphic computing. Here, for the first time, we demonstrate that this long-standing issue can be addressed by introducing fuzziness into the neural networks. We found that the cycle-to-cycle and device-to-device conductance variations in the on and off states of Pt/TaOx/Ta memristors statistically follow Gaussian distributions, and using an experimentally verified compact synapse model based on the electrical characteristics of Pt/TaOx/Ta devices, a fuzzy restricted Boltzmann machine (FRBM) network was constructed where all the weight states were fuzzified to accommodate device stochasticity. The FRBM network has shown significantly improved tolerance to device variation, as confirmed by increased accuracy in the benchmark test of MNIST handwritten digit classifications. This study thus provides a new route towards highly robust neuromorphic computing, even if the computing elements can be stochastic and inhomogeneous.

  1. Quantum transport through complex networks - from light-harvesting proteins to semiconductor devices

    Energy Technology Data Exchange (ETDEWEB)

    Kreisbeck, Christoph

    2012-06-18

    Electron transport through small systems in semiconductor devices plays an essential role for many applications in micro-electronics. One focus of current research lies on establishing conceptually new devices based on ballistic transport in high mobility AlGaAs/AlGa samples. In the ballistic regime, the transport characteristics are determined by coherent interference effects. In order to guide experimentalists to an improved device design, the characterization and understanding of intrinsic device properties is crucial. We develop a time-dependent approach that allows us to simulate experimentally fabricated, complex devicegeometries with an extension of up to a few micrometers. Particularly, we explore the physical origin of unexpected effects that have been detected in recent experiments on transport through Aharonov-Bohm waveguide-interferometers. Such interferometers can be configured as detectors for transfer properties of embedded quantum systems. We demonstrate that a four-terminal waveguide-ring is a suitable setup for measuring the transmission phase of a harmonic quantum dot. Quantum effects are not restricted exclusively to artificial devices but have been found in biological systems as well. Pioneering experiments reveal quantum effects in light-harvesting complexes, the building blocks of photosynthesis. We discuss the Fenna-Matthews-Olson complex, which is a network of coupled bacteriochlorophylls. It acts as an energy wire in the photosynthetic apparatus of green sulfur bacteria. Recent experimental findings suggest that energy transfer takes place in the form of coherent wave-like motion, rather than through classical hopping from one bacteriochlorophyll to the next. However, the question of why and how coherent transfer emerges in light-harvesting complexes is still open. The challenge is to merge seemingly contradictory features that are observed in experiments on two-dimensional spectroscopy into a consistent theory. Here, we provide such a

  2. Modeling of frequency agile devices: development of PKI neuromodeling library based on hierarchical network structure

    Science.gov (United States)

    Sanchez, P.; Hinojosa, J.; Ruiz, R.

    2005-06-01

    Recently, neuromodeling methods of microwave devices have been developed. These methods are suitable for the model generation of novel devices. They allow fast and accurate simulations and optimizations. However, the development of libraries makes these methods to be a formidable task, since they require massive input-output data provided by an electromagnetic simulator or measurements and repeated artificial neural network (ANN) training. This paper presents a strategy reducing the cost of library development with the advantages of the neuromodeling methods: high accuracy, large range of geometrical and material parameters and reduced CPU time. The library models are developed from a set of base prior knowledge input (PKI) models, which take into account the characteristics common to all the models in the library, and high-level ANNs which give the library model outputs from base PKI models. This technique is illustrated for a microwave multiconductor tunable phase shifter using anisotropic substrates. Closed-form relationships have been developed and are presented in this paper. The results show good agreement with the expected ones.

  3. THE VALIDITY OF HUMAN AND COMPUTERIZED WRITING ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    Ronald L. Boring

    2005-09-01

    This paper summarizes an experiment designed to assess the validity of essay grading between holistic and analytic human graders and a computerized grader based on latent semantic analysis. The validity of the grade was gauged by the extent to which the student’s knowledge of the topic correlated with the grader’s expert knowledge. To assess knowledge, Pathfinder networks were generated by the student essay writers, the holistic and analytic graders, and the computerized grader. It was found that the computer generated grades more closely matched the definition of valid grading than did human generated grades.

  4. Effect of massive training artificial neural networks for rib suppression on reduction of false positives in computerized detection of nodules on chest radiographs

    Science.gov (United States)

    Suzuki, Kenji; Shiraishi, Junji; Li, Feng; Abe, Hiroyuki; MacMahon, Heber; Doi, Kunio

    2005-04-01

    A major challenge in computer-aided diagnostic (CAD) schemes for nodule detection on chest radiographs is the detection of nodules that overlap with ribs. Our purpose was to develop a technique for false-positive reduction in a CAD scheme using a rib-suppression technique based on massive training artificial neural networks (MTANNs). We developed a multiple MTANN (multi-MTANN) consisting of eight MTANNs for removing eight types of false positives. For further removal of false positives caused by ribs, we developed a rib-suppression technique using a multi-resolution MTANN consisting of three different resolution MTANNs. To suppress the contrast of ribs, the multi-resolution MTANN was trained with input chest radiographs and the teaching soft-tissue images obtained by using a dual-energy subtraction technique. Our database consisted of 91 nodules in 91 chest radiographs. With our original CAD scheme based on a difference image technique with linear discriminant analysis, a sensitivity of 82.4% (75/91 nodules) with 4.5 (410/91) false positives per image was achieved. The trained multi-MTANN was able to remove 62.7% (257/410) of false positives with a loss of one true positive. With the rib-suppression technique, the contrast of ribs in chest radiographs was suppressed substantially. Due to the effect of rib-suppression, 41.2% (63/153) of the remaining false positives were removed without a loss of any true positives. Thus, the false-positive rate of our CAD scheme was improved substantially, while a high sensitivity was maintained.

  5. Computerized energy management system

    Energy Technology Data Exchange (ETDEWEB)

    Dvorak, N.E.; Huffman, S.S.; Neel, A.F.; Swartout, C.A.

    1983-01-25

    A system for controlling electrical energy consumption according to a user-set kilowatt limit and an automatic kilowatt limit calculated in a microprocessor. Power is limited by regulating an electric hot water heater according to a preset program and, if necessary, by lowering room temperatures due to electric heater cut back. The device features a computer-controlled display and simplified keyboard which permits the user to enter only valid data. The device also features program fail, power fail, and static detect circuitry to prevent computer error.

  6. Engineering highly organized and aligned single walled carbon nanotube networks for electronic device applications: Interconnects, chemical sensor, and optoelectronics

    Science.gov (United States)

    Kim, Young Lae

    For 20 years, single walled carbon nanotubes (SWNTs) have been studied actively due to their unique one-dimensional nanostructure and superior electrical, thermal, and mechanical properties. For these reasons, they offer the potential to serve as building blocks for future electronic devices such as field effect transistors (FETs), electromechanical devices, and various sensors. In order to realize these applications, it is crucial to develop a simple, scalable, and reliable nanomanufacturing process that controllably places aligned SWNTs in desired locations, orientations, and dimensions. Also electronic properties (semiconducting/metallic) of SWNTs and their organized networks must be controlled for the desired performance of devices and systems. These fundamental challenges are significantly limiting the use of SWNTs for future electronic device applications. Here, we demonstrate a strategy to fabricate highly controlled micro/nanoscale SWNT network structures and present the related assembly mechanism to engineer the SWNT network topology and its electrical transport properties. A method designed to evaluate the electrical reliability of such nano- and microscale SWNT networks is also presented. Moreover, we develop and investigate a robust SWNT based multifunctional selective chemical sensor and a range of multifunctional optoelectronic switches, photo-transistors, optoelectronic logic gates and complex optoelectronic digital circuits.

  7. Effect of a small number of training cases on the performance of massive training artificial neural network (MTANN) for reduction of false positives in computerized detection of lung nodules in low-dose CT

    Science.gov (United States)

    Suzuki, Kenji; Armato, Samuel G., III; Li, Feng; Sone, Shusuke; Doi, Kunio

    2003-05-01

    In this study, we investigated a pattern-classification technique which can be trained with a small number of cases with a massive training artificial neural network (MTANN) for reduction of false positives in computerized detection of lung nodules in low-dose CT (LDCT). The MTANN consists of a modified multilayer artificial neural network (ANN), which is capable of operating on image data directly. The MTANN is trained by use of a large number of sub-regions extracted from input images together with the teacher images containing the distribution for the "likelihood of being a nodule." The output image is obtained by scanning of an input image with the MTANN. In the MTANN, the distinction between nodules and non-nodules is treated as an image-processing task, in other words, as a highly nonlinear filter that performs both nodule enhancement and non-nodule suppression. This allows us to train the MTANN not on a case basis, but on a sub-region basis. Therefore, the MTANN can be trained with a very small number of cases. Our database consisted of 101 LDCT scans acquired from 71 patients in a lung cancer screening program. The scans consisted of 2,822 sections, and contained 121 nodules including 104 nodules representing confirmed primary cancers. With our current CAD scheme, a sensitivity of 81.0% (98/121 nodules) with 0.99 false positives per section (2,804/2,822) was achieved. By use of the MTANN trained with a small number of training cases (n=10), i.e., five pairs of nodules and non-nodules, we were able to remove 55.8% of false positives without a reduction in the number of true positives, i.e., a classification sensitivity of 100%. Thus, the false-positive rate of our current CAD scheme was reduced from 0.99 to 0.44 false positive per section, while the current sensitivity (81.0%) was maintained.

  8. Participative Teaching with Mobile Devices and Social Networks for K-12 Children

    Directory of Open Access Journals (Sweden)

    Livia Stefan

    2016-08-01

    Full Text Available This article details a set of participatory pedagogical experiments conducted within a research grant PN II IDEI (”Time Maps. Real communities, virtual worlds, experimented pasts” performed with the purpose of helping rural communities in identifying their cultural heritage andtransmitting it to the younger generations by means of modern IT technologies, including web 2.0. In a Danubian rural community, several points of archaeological interest (POIs were identified, which were then included in a geographic Augmented Reality application for smartphones and tablets. Subsequently, the geographic data were collected from the archaeological site by the K-12 children, under the coordination of an academic staff member of the National University of Arts in Bucharest, and stored on their devices using Google Maps. The augmented information provided onthe site was annotated and shared with other K-12 children, through different social networks sites (SNS and content postings. This first stage experiment was extended to the development of a social learning environment complementary to the educational site (www.timemaps.net to support thetransmission of several traditional technologies (textile, ceramic, glass in a collaborative manner. We consider that our experiments can significantly increase the visibility of the information pertaining to the identity of target places and communities among the younger generation. A mobile-learning paradigm, in combination with web 2.0 technologies, was the support for a distributed and low-cost platform for communication and collaboration. Social networks linked thearchaeological heritage and the academic research with the larger community of rural K-12 children. The article analyzes this platform as a solution for creating, collecting and sharingeducational content, and presents conclusions on using social media for effective blended learning and transmittal of the cultural heritage.

  9. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks

    Science.gov (United States)

    Iwasaki, Hirotoshi; Mizuno, Nobuhiro; Hara, Kousuke; Motomura, Yoichi

    Mobile devices, such as cellular phones and car navigation systems, are essential to daily life. People acquire necessary information and preferred content over communication networks anywhere, anytime. However, usability issues arise from the simplicity of user interfaces themselves. Thus, a recommendation of content that is adapted to a user's preference and situation will help the user select content. In this paper, we describe a method to realize such a system using Bayesian networks. This user-adapted mobile system is based on a user model that provides recommendation of content (i.e., restaurants, shops, and music that are suitable to the user and situation) and that learns incrementally based on accumulated usage history data. However, sufficient samples are not always guaranteed, since a user model would require combined dependency among users, situations, and contents. Therefore, we propose the LK method for modeling, which complements incomplete and insufficient samples using knowledge data, and CPT incremental learning for adaptation based on a small number of samples. In order to evaluate the methods proposed, we applied them to restaurant recommendations made on car navigation systems. The evaluation results confirmed that our model based on the LK method can be expected to provide better generalization performance than that of the conventional method. Furthermore, our system would require much less operation than current car navigation systems from the beginning of use. Our evaluation results also indicate that learning a user's individual preference through CPT incremental learning would be beneficial to many users, even with only a few samples. As a result, we have developed the technology of a system that becomes more adapted to a user the more it is used.

  10. Organizing NPD networks for high innovation performance: the case of Dutch medical devices SMEs

    NARCIS (Netherlands)

    Pullen, A.J.J.; Groen, Arend J.; de Weerd-Nederhof, Petronella C.; Fisscher, O.A.M.

    2010-01-01

    This research examines which combination of network characteristics (the network configuration) leads to high innovation performance for small and medium sized companies (SMEs). Even though research has paid significant attention to the relation between the external network and the innovation

  11. Comparing the security risks of paper-based and computerized patient record systems

    Science.gov (United States)

    Collmann, Jeff R.; Meissner, Marion C.; Tohme, Walid G.; Winchester, James F.; Mun, Seong K.

    1997-05-01

    How should hospital administrators compare the security risks of paper-based and computerized patient record systems. There is a general tendency to assume that because computer networks potentially provide broad access to hospital archives, computerized patient records are less secure than paper records and increase the risk of breaches of patient confidentiality. This assumption is ill-founded on two grounds. Reasons exist to say that the computerized patient record provides better access to patient information while enhancing overall information system security. A range of options with different trade-offs between access and security exist in both paper-based and computerized records management systems. The relative accessibility and security of any particular patient record management system depends, therefore, on administrative choice, not simply on the intrinsic features of paper or computerized information management systems.

  12. Computerized sociometric assessment for preschool children

    NARCIS (Netherlands)

    Endedijk, Hinke M.; Cillessen, Antonius H. N.

    2015-01-01

    In preschool classes, sociometric peer ratings are used to measure children's peer relationships. The current study examined a computerized version of preschool sociometric ratings. The psychometric properties were compared of computerized sociometric ratings and traditional peer ratings for

  13. Technologies in computerized lexicography | Kruyt | Lexikos

    African Journals Online (AJOL)

    Although the topic of this paper is technology, focus is on functional rather than technical aspects of computerized lexicography. Keywords: computerized lexicography, electronic dictionary, electronic text corpus, lexicographer's workbench, integrated language database, automatic linguistic analysis, information retrieval, ...

  14. Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-device Communication Underlaying Cellular Networks

    Science.gov (United States)

    Qu, Junyue; Cai, Yueming; Wu, Dan; Chen, Hualiang

    2014-05-01

    The problem of power allocation for device-to-device (D2D) underlay communication to improve physical layer security is addressed. Specifically, to improve the secure communication of the cellular users, we introduce a Stackelberg game for allocating the power of the D2D link under a total power constraint and a rate constraint at the D2D pair. In the introduced Stackelberg game the D2D pair works as a seller and the cellular UEs work as buyers. Firstly, because the interference signals from D2D pair are unknown to both the legitimate receiver and the illegitimate eavesdropper, it is possible that a cellular UE decline to participate in the introduced Stackelberg game. So the condition under which a legitimate user will participate in the introduced Stackelberg game is discussed. Then, based on the Stackelberg game, we propose a semi-distributed power allocation algorithm, which is proved to conclude after finite-time iterations. In the end, some simulations are presented to verify the performance improvement in the physical layer security of cellular UEs using the proposed power allocation algorithm. We can determine that with the proposed algorithm, while the D2D pair's communication demand is met, the physical layer security of cellular UEs can be improved.

  15. Tissue culture on a chip: Developmental biology applications of self-organized capillary networks in microfluidic devices.

    Science.gov (United States)

    Miura, Takashi; Yokokawa, Ryuji

    2016-08-01

    Organ culture systems are used to elucidate the mechanisms of pattern formation in developmental biology. Various organ culture techniques have been used, but the lack of microcirculation in such cultures impedes the long-term maintenance of larger tissues. Recent advances in microfluidic devices now enable us to utilize self-organized perfusable capillary networks in organ cultures. In this review, we will overview past approaches to organ culture and current technical advances in microfluidic devices, and discuss possible applications of microfluidics towards the study of developmental biology. © 2016 Japanese Society of Developmental Biologists.

  16. Computerized color perimetry in multiple sclerosis.

    Science.gov (United States)

    Accornero, N; Rinalduzzi, S; Capozza, M; Millefiorini, E; Filligoi, G C; Capitanio, L

    1998-04-01

    Color visual field analysis has proven highly sensitive for early visual impairments diagnosis in MS, yet it has never attained widespread popularity usually because the procedure is difficult to standardize, the devices are costly, and the test is fatiguing. We propose a computerized procedure running on standard PC, cost effective, clonable, and easy handled. Two hundred and sixty-four colored patches subtending 1 degree angle vision, with selected hues and low saturation levels are sequentially and randomly displayed on gray equiluminous background of the PC screen subtending 24 degrees x 40 degrees angle of vision. The subject is requested to press a switch at the perception of the stimulus. The output provides colored maps with quantitative information. Comparison between normals and a selected population of MS patients with no actual luminance visual field defects, showed high statistical difference.

  17. Computerized Proof Techniques for Undergraduates

    Science.gov (United States)

    Smith, Christopher J.; Tefera, Akalu; Zeleke, Aklilu

    2012-01-01

    The use of computer algebra systems such as Maple and Mathematica is becoming increasingly important and widespread in mathematics learning, teaching and research. In this article, we present computerized proof techniques of Gosper, Wilf-Zeilberger and Zeilberger that can be used for enhancing the teaching and learning of topics in discrete…

  18. Perspectives on Computerized Psychological Assessment.

    Science.gov (United States)

    Butcher, James N.

    1985-01-01

    Psychological assessment, a subspecialty of psychology has served as one of the earliest proving grounds of automated technology. This Special Series highlights some of the advances in computerized psychological assessment methods and discusses some of the lingering issues and contemporary problems with automated psychological assessment…

  19. PIYAS-Proceeding to Intelligent Service Oriented Memory Allocation for Flash Based Data Centric Sensor Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanam Shahla Rizvi

    2009-12-01

    Full Text Available Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS. This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  20. Multi-Radio Mobile Device in Role of Hybrid Node Between WiFi and LTE networks

    Directory of Open Access Journals (Sweden)

    Pavel Masek

    2015-05-01

    Full Text Available With the ubiquitous wireless network coverage, Machine-Type Communications (MTC is emerging to enable data transfers using devices/sensors without need for human interaction. In this paper we, we introduce a comprehensive simulation scenario for modeling and analysis for heterogeneous MTC. We demonstrate the most expected scenario of MTC communication using the IEEE 802.11 standard for direct communication between sensors and for transmitting data between individual sensor and Machine-Type Communication Gateway (MTCG. The MTCG represents the hybrid node serving as bridge between two heterogeneous networks (WiFi and LTE. Following the idea of hybrid node, two active interfaces must be implemented on this node together with mechanism for handling the incoming traffic (from WiFi network to LTE network. As a simulation tool, the Network Simulator 3 (NS-3 with implemented LTE/EPC Network Simulator (LENA framework was used. The major contribution of this paper therefore lies in the implementation of logic for interconnection of two heterogeneous networks in simulation environment NS-3.

  1. Soft hydrogels interpenetrating silicone – a polymer network for drug releasing medical devices

    DEFF Research Database (Denmark)

    Steffensen, Søren Langer; Merete H., Vestergaard,; Møller, Eva Horn

    2016-01-01

    Materials for the next generation of medical devices will require not only the mechanical stability of current devices, but must also possess other properties such as sustained release of drugs in a controlled manner over a prolonged period of time. This work focuses on creating...... the potential of this IPN material for future applications in drug-releasing medical devices....

  2. Adaption of Cognitive Radio technology to low-cost and low-power wireless Personal Area Network devices

    DEFF Research Database (Denmark)

    Rohde, John; Toftegaard, Thomas Skjødeberg

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  3. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  4. Application of Detailed Phase Comparison Protection Models for the Analysis of its Operation in Networks with Facts Devices

    Directory of Open Access Journals (Sweden)

    Ruban Nikolay Yu.

    2015-01-01

    Full Text Available The problem of relay protection misoperations in networks with FACTS devices is considered in the paper. It is offered a solution to this problem for a phase comparison protection of transmission power line through the use of its detailed model for the analysis of the functioning for a case of various normal, emergency and post-emergency modes of electric power systems. The research results of this approach are given in the paper.

  5. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    DEFF Research Database (Denmark)

    Figueiras, Joao

    , tracking wireless devices is a challenging problem. In order to get better results, we propose a solution which restricts the movement models of the mobile devices. This restriction, by relying on the assumption that users typically move in segment-wise linear trajectories, outperforms the standard...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information...... is not a straightforward task, this dissertation proposes two different solutions for solving the problem. The main approach is to use a Bayesian filtering framework design in such a way that both types of measurements can contribute in a balanced manner to a single estimation of positions for each cooperative device...

  6. Continued Development and Implementation of the Universal Network Interface Device (UNID) II, Digital Engineering Laboratory Network (DELNET) Volume 1.

    Science.gov (United States)

    1984-12-01

    Chart - , 1’: - . [ a frr-ie has been received froia aetwork then .] do if the frame is a supervisory frane then do if the sequence bit is true then...network to network then do if frane sequence bit is true then set iliput sequence bit true e set input sequence bit false build a supervisory frame...input sequence bit true ,eis a set input sequence bit false "uil a s3upervisory frame si-vve frane to loc-al buffer service local buffer pointer end end

  7. Densely Integrated Photonic Devices based on Microring Resonators in Access Networks

    NARCIS (Netherlands)

    Klein, E.J.; Driessen, A.

    2007-01-01

    The application of optical fibers has led to virtually lossless point to point data links in the core network with practically unlimited bandwidth. In response to increasing bandwidth demands of consumers the optical techniques employed in these networks are now gradually extended towards the

  8. In-Line Acoustic Device Inspection of Leakage in Water Distribution Pipes Based on Wavelet and Neural Network

    Directory of Open Access Journals (Sweden)

    Dileep Kumar

    2017-01-01

    Full Text Available Traditionally permanent acoustic sensors leak detection techniques have been proven to be very effective in water distribution pipes. However, these methods need long distance deployment and proper position of sensors and cannot be implemented on underground pipelines. An inline-inspection acoustic device is developed which consists of acoustic sensors. The device will travel by the flow of water through the pipes which record all noise events and detect small leaks. However, it records all the noise events regarding background noises, but the time domain noisy acoustic signal cannot manifest complete features such as the leak flow rate which does not distinguish the leak signal and environmental disturbance. This paper presents an algorithm structure with the modularity of wavelet and neural network, which combines the capability of wavelet transform analyzing leakage signals and classification capability of artificial neural networks. This study validates that the time domain is not evident to the complete features regarding noisy leak signals and significance of selection of mother wavelet to extract the noise event features in water distribution pipes. The simulation consequences have shown that an appropriate mother wavelet has been selected and localized to extract the features of the signal with leak noise and background noise, and by neural network implementation, the method improves the classification performance of extracted features.

  9. High-performance combination method of electric network frequency and phase for audio forgery detection in battery-powered devices.

    Science.gov (United States)

    Savari, Maryam; Abdul Wahab, Ainuddin Wahid; Anuar, Nor Badrul

    2016-09-01

    Audio forgery is any act of tampering, illegal copy and fake quality in the audio in a criminal way. In the last decade, there has been increasing attention to the audio forgery detection due to a significant increase in the number of forge in different type of audio. There are a number of methods for forgery detection, which electric network frequency (ENF) is one of the powerful methods in this area for forgery detection in terms of accuracy. In spite of suitable accuracy of ENF in a majority of plug-in powered devices, the weak accuracy of ENF in audio forgery detection for battery-powered devices, especially in laptop and mobile phone, can be consider as one of the main obstacles of the ENF. To solve the ENF problem in terms of accuracy in battery-powered devices, a combination method of ENF and phase feature is proposed. From experiment conducted, ENF alone give 50% and 60% accuracy for forgery detection in mobile phone and laptop respectively, while the proposed method shows 88% and 92% accuracy respectively, for forgery detection in battery-powered devices. The results lead to higher accuracy for forgery detection with the combination of ENF and phase feature. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Multi-objective optimization of pulsatile ventricular assist device hemocompatibility based on neural networks and a genetic algorithm.

    Science.gov (United States)

    Xu, Zihao; Yang, Ming; Wang, Xianghui; Wang, Zhong

    2015-08-04

    Given the benefit of pulsatile blood flow for perfusion of coronary arteries and end organs, pulsatile ventricular assist devices (VADs) are still widely used as paracorporeal mechanical circulatory support devices in clinical applications. However, poor hemocompatibility limits the service period of the VADs. Most previous improvements on VAD hemocompatibility were conducted by trial-and-error CFD analysis, which does not easily arrive at the best solution. In this paper, a multi-objective optimization method integrating neural networks and NSGA-II (Non-dominated Sorted Genetic Algorithm-II) based on FSI simulation was developed and applied to a pulsatile VAD to optimize its hemocompatibility. First, the VAD blood chamber was parameterized with the principal geometrical parameters. Three hemocompatibility indices including hemolysis, platelet activation, and platelet deposition were chosen as goal functions. The neural networks were built to fit the nonlinear relationship between goal functions and geometrical parameters. Next, a multi-objective optimization algorithm (NSGA-II) was used to search out the Pareto optimal solutions in the built neural networks. Finally, the best compromise solution was selected from the Pareto optimal solutions by a fuzzy membership approach and validated by FSI simulation. The best compromise solution simultaneously possesses an acceptable hemolysis index, platelet activation index, and platelet deposition index, and the corresponding relative errors between the indices predicted by optimization algorithm and the one calculated by FSI simulations are all less than 5%. The results suggest that the proposed multi-objective optimization method has the potential for application in optimizing pulsatile VAD hemocompatibility, and may also be applied to other blood-wetted devices.

  11. Exposure to radio frequency electromagnetic fields from wireless computer networks: duty factors of Wi-Fi devices operating in schools.

    Science.gov (United States)

    Khalid, M; Mee, T; Peyman, A; Addison, D; Calderon, C; Maslanyj, M; Mann, S

    2011-12-01

    The growing use of wireless local area networks (WLAN) in schools has prompted a study to investigate exposure to the radio frequency (RF) electromagnetic fields from Wi-Fi devices. International guidelines on limiting the adverse health effects of RF, such as those of ICNIRP, allow for time-averaging of exposure. Thus, as Wi-Fi signals consist of intermittent bursts of RF energy, it is important to consider the duty factors of devices in assessing the extent of exposure and compliance with guidelines. Using radio packet capture methods, the duty factor of Wi-Fi devices has been assessed in a sample of 6 primary and secondary schools during classroom lessons. For the 146 individual laptops investigated, the range of duty factors was from 0.02 to 0.91%, with a mean of 0.08% (SD 0.10%). The duty factors of access points from 7 networks ranged from 1.0% to 11.7% with a mean of 4.79% (SD 3.76%). Data gathered with transmit time measuring devices attached to laptops also showed similar results. Within the present limited sample, the range of duty factors from laptops and access points were found to be broadly similar for primary and secondary schools. Applying these duty factors to previously published results from this project, the maximum time-averaged power density from a laptop would be 220 μW m(-2), at a distance of 0.5 m and the peak localised SAR predicted in the torso region of a 10 year old child model, at 34 cm from the antenna, would be 80 μW kg(-1). Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  12. Algorithms for Computerized Fetal Heart Rate Diagnosis with Direct Reporting

    Directory of Open Access Journals (Sweden)

    Kazuo Maeda

    2015-06-01

    Full Text Available Aims: Since pattern classification of fetal heart rate (FHR was subjective and enlarged interobserver difference, objective FHR analysis was achieved with computerized FHR diagnosis. Methods: The computer algorithm was composed of an experts’ knowledge system, including FHR analysis and FHR score calculation, and also of an objective artificial neural network system with software. In addition, a FHR frequency spectrum was studied to detect ominous sinusoidal FHR and the loss of baseline variability related to fetal brain damage. The algorithms were installed in a central-computerized automatic FHR monitoring system, which gave the diagnosis rapidly and directly to the attending doctor. Results: Clinically perinatal mortality decreased significantly and no cerebral palsy developed after introduction of the centralized system. Conclusion: The automatic multichannel FHR monitoring system improved the monitoring, increased the objectivity of FHR diagnosis and promoted clinical results.

  13. Optimised PDMS Tunnel Devices on MEAs Increase the Probability of Detecting Electrical Activity from Human Stem Cell-Derived Neuronal Networks.

    Science.gov (United States)

    Toivanen, Maria; Pelkonen, Anssi; Mäkinen, Meeri; Ylä-Outinen, Laura; Sukki, Lassi; Kallio, Pasi; Ristola, Mervi; Narkilahti, Susanna

    2017-01-01

    Measurement of the activity of human pluripotent stem cell (hPSC)-derived neuronal networks with microelectrode arrays (MEAs) plays an important role in functional in vitro brain modelling and in neurotoxicological screening. The previously reported hPSC-derived neuronal networks do not, however, exhibit repeatable, stable functional network characteristics similar to rodent cortical cultures, making the interpretation of results difficult. In earlier studies, microtunnels have been used both to control and guide cell growth and amplify the axonal signals of rodent neurons. The aim of the current study was to develop tunnel devices that would facilitate signalling and/or signal detection in entire hPSC-derived neuronal networks containing not only axons, but also somata and dendrites. Therefore, MEA-compatible polydimethylsiloxane (PDMS) tunnel devices with 8 different dimensions were created. The hPSC-derived neurons were cultured in the tunnel devices on MEAs, and the spontaneous electrical activity of the networks was measured for 5 weeks. Although the tunnel devices improved the signal-to-noise ratio only by 1.3-fold at best, they significantly increased the percentage of electrodes detecting neuronal activity (52-100%) compared with the controls (27%). Significantly higher spike and burst counts were also obtained using the tunnel devices. Neuronal networks inside the tunnels were amenable to pharmacological manipulation. The results suggest that tunnel devices encompassing the entire neuronal network can increase the measured spontaneous activity in hPSC-derived neuronal networks on MEAs. Therefore, they can increase the efficiency of functional studies of hPSC-derived networks on MEAs.

  14. Optimised PDMS Tunnel Devices on MEAs Increase the Probability of Detecting Electrical Activity from Human Stem Cell-Derived Neuronal Networks

    Directory of Open Access Journals (Sweden)

    Maria Toivanen

    2017-10-01

    Full Text Available Measurement of the activity of human pluripotent stem cell (hPSC-derived neuronal networks with microelectrode arrays (MEAs plays an important role in functional in vitro brain modelling and in neurotoxicological screening. The previously reported hPSC-derived neuronal networks do not, however, exhibit repeatable, stable functional network characteristics similar to rodent cortical cultures, making the interpretation of results difficult. In earlier studies, microtunnels have been used both to control and guide cell growth and amplify the axonal signals of rodent neurons. The aim of the current study was to develop tunnel devices that would facilitate signalling and/or signal detection in entire hPSC-derived neuronal networks containing not only axons, but also somata and dendrites. Therefore, MEA-compatible polydimethylsiloxane (PDMS tunnel devices with 8 different dimensions were created. The hPSC-derived neurons were cultured in the tunnel devices on MEAs, and the spontaneous electrical activity of the networks was measured for 5 weeks. Although the tunnel devices improved the signal-to-noise ratio only by 1.3-fold at best, they significantly increased the percentage of electrodes detecting neuronal activity (52–100% compared with the controls (27%. Significantly higher spike and burst counts were also obtained using the tunnel devices. Neuronal networks inside the tunnels were amenable to pharmacological manipulation. The results suggest that tunnel devices encompassing the entire neuronal network can increase the measured spontaneous activity in hPSC-derived neuronal networks on MEAs. Therefore, they can increase the efficiency of functional studies of hPSC-derived networks on MEAs.

  15. Modeling of bulk acoustic wave devices built on piezoelectric stack structures: impedance matrix analysis and network representation.

    Science.gov (United States)

    Zhang, Victor Y; Dubus, Bertrand; Lefebvre, Jean Etienne; Gryba, Tadeusz

    2008-03-01

    The fundamental electro-acoustic properties of a solid layer are deduced in terms of its impedance matrix (Z) and represented by a network for modeling the bulk acoustic wave devices built on piezoelectric stacked structures. A piezoelectric layer is described by a three-port equivalent network, a nonpiezoelectric layer, and a short- or open-circuit piezoelectric layer by a two-port one. Electrical input impedance of the resonator is derived in terms of the Z-matrix of both the piezoelectric layer and an external load, the unique expression applies whether the resonator is a mono- or electroded-layer or a solidly mounted resonator (SMR). The loading effects of Al-electrodes on the resonating frequencies of the piezoelectric ZnO-layer are analyzed. Transmission and reflection properties of Bragg mirrors are investigated along with the bulk radiation in SMR. As a synthesizing example, a coupled resonator filter (CRF) is analyzed using the associated two-port equivalent network and by calculating the power transmission to a 50Omega-load. The stacked crystal filter is naturally included in the model as a special case of CRF. Combining a comprehensive matrix analysis and an instructive network representation and setting the problem with a full vectorial formalism are peculiar features of the presented approach.

  16. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Science.gov (United States)

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  18. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  19. A memory efficient implementation scheme of Gauss error function in a Laguerre-Volterra network for neuroprosthetic devices

    Science.gov (United States)

    Li, Will X. Y.; Cui, Ke; Zhang, Wei

    2017-04-01

    Cognitive neural prosthesis is a manmade device which can be used to restore or compensate for lost human cognitive modalities. The generalized Laguerre-Volterra (GLV) network serves as a robust mathematical underpinning for the development of such prosthetic instrument. In this paper, a hardware implementation scheme of Gauss error function for the GLV network targeting reconfigurable platforms is reported. Numerical approximations are formulated which transform the computation of nonelementary function into combinational operations of elementary functions, and memory-intensive look-up table (LUT) based approaches can therefore be circumvented. The computational precision can be made adjustable with the utilization of an error compensation scheme, which is proposed based on the experimental observation of the mathematical characteristics of the error trajectory. The precision can be further customizable by exploiting the run-time characteristics of the reconfigurable system. Compared to the polynomial expansion based implementation scheme, the utilization of slice LUTs, occupied slices, and DSP48E1s on a Xilinx XC6VLX240T field-programmable gate array has decreased by 94.2%, 94.1%, and 90.0%, respectively. While compared to the look-up table based scheme, 1.0 ×1017 bits of storage can be spared under the maximum allowable error of 1.0 ×10-3 . The proposed implementation scheme can be employed in the study of large-scale neural ensemble activity and in the design and development of neural prosthetic device.

  20. Bayesian Network Based Fault Prognosis via Bond Graph Modeling of High-Speed Railway Traction Device

    Directory of Open Access Journals (Sweden)

    Yunkai Wu

    2015-01-01

    component-level faults accurately for a high-speed railway traction system, a fault prognosis approach via Bayesian network and bond graph modeling techniques is proposed. The inherent structure of a railway traction system is represented by bond graph model, based on which a multilayer Bayesian network is developed for fault propagation analysis and fault prediction. For complete and incomplete data sets, two different parameter learning algorithms such as Bayesian estimation and expectation maximization (EM algorithm are adopted to determine the conditional probability table of the Bayesian network. The proposed prognosis approach using Pearl’s polytree propagation algorithm for joint probability reasoning can predict the failure probabilities of leaf nodes based on the current status of root nodes. Verification results in a high-speed railway traction simulation system can demonstrate the effectiveness of the proposed approach.

  1. 76 FR 17657 - Medical Device Epidemiology Network 2011: Second Annual Public Workshop

    Science.gov (United States)

    2011-03-30

    ... stakeholders to initiate development of scientific, methodology, and device-area priorities for MDEpiNet. II... stakeholders with expertise in epidemiology and health services research on issues related to the methodology... epidemiology and health services research community, and all stakeholders on issues related to the methodology...

  2. Automatic Defect Detection of Fasteners on the Catenary Support Device Using Deep Convolutional Neural Network

    NARCIS (Netherlands)

    Chen, Junwen; Liu, Zhigang; Wang, H.; Nunez Vicencio, Alfredo; Han, Zhiwei

    2017-01-01

    The excitation and vibration triggered by the long-term operation of railway vehicles inevitably result in defective states of catenary support devices. With the massive construction of high-speed electrified railways, automatic defect detection of diverse and plentiful fasteners on the catenary

  3. Prediction of Operating Characteristics of Electrotechnical Devices using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    PASCA Alexandra

    2014-05-01

    Full Text Available The paper purpose is to emphasize the possibilities and the advantages to use the artificial intelligence techniques for operating mode prediction of electrotechnical devices. The considered application consists of the analysis of behavior of an inductive proximity sensor at variation of design parameters.

  4. In situ fabrication of macroporous polymer networks within microfluidic devices by living radical photopolymerization and leaching.

    Science.gov (United States)

    Simms, Helen M; Brotherton, Christopher M; Good, Brian T; Davis, Robert H; Anseth, Kristi S; Bowman, Christopher N

    2005-02-01

    Novel fabrication techniques and polymer systems are being explored to enable mass production of low cost microfluidic devices. In this contribution we discuss a new fabrication scheme for making microfluidic devices containing porous polymer components in situ. Contact lithography, a living radical photopolymer (LRPP) system and salt leaching were used to fabricate multilayer microfluidic devices rapidly with various channel geometries and covalently attached porous polymer plugs made of various photopolymerizable substrates. LRPP systems offer the advantages of covalent attachment of microfluidic device layers and facile surface modification via grafting. Several applications of the porous plugs are also explored, including a static mixer, a high surface area-to-volume reactor and a rapidly responding hydrogel valve. Quantitative and qualitative data show an increase in mixing of a fluorescein and a water stream for channels containing porous plugs relative to channels with no porous plugs. Confocal laser scanning microscopy images demonstrate the ability to graft a functional material onto porous plug surfaces. A reaction was carried out on the grafted pore surfaces, which resulted in fluorescent labelling of the grafted material throughout the pores of the plug. Homogenous fluorescence throughout the depth of the porous plug and along pore surfaces indicated that the porous plugs were surface modified by grafting and that reactions can be carried out on the pore surfaces. Finally, porous hydrogel valves were fabricated which swelled in response to contact with various pH solutions. Results indicate that a porous hydrogel valve will swell and close more rapidly than other valve geometries made with the same polymer formulation. The LRPP-salt leaching method provides a means for rapidly incorporating porous polymer components into microfluidic devices, which can be utilized for a variety of pertinent applications upon appropriate selection of porous plug

  5. Advancing medical device innovation through collaboration and coordination of structured data capture pilots: Report from the Medical Device Epidemiology Network (MDEpiNet) Specific, Measurable, Achievable, Results-Oriented, Time Bound (SMART) Think Tank.

    Science.gov (United States)

    Reed, Terrie L; Drozda, Joseph P; Baskin, Kevin M; Tcheng, James; Conway, Karen; Wilson, Natalia; Marinac-Dabic, Danica; Heise, Theodore; Krucoff, Mitchell W

    2017-12-01

    The Medical Device Epidemiology Network (MDEpiNet) is a public private partnership (PPP) that provides a platform for collaboration on medical device evaluation and depth of expertise for supporting pilots to capture, exchange and use device information for improving device safety and protecting public health. The MDEpiNet SMART Think Tank, held in February, 2013, sought to engage expert stakeholders who were committed to improving the capture of device data, including Unique Device Identification (UDI), in key electronic health information. Prior to the Think Tank there was limited collaboration among stakeholders beyond a few single health care organizations engaged in electronic capture and exchange of device data. The Think Tank resulted in what has become two sustainable multi-stakeholder device data capture initiatives, BUILD and VANGUARD. These initiatives continue to mature within the MDEpiNet PPP structure and are well aligned with the goals outlined in recent FDA-initiated National Medical Device Planning Board and Medical Device Registry Task Force white papers as well as the vision for the National Evaluation System for health Technology.%. Published by Elsevier Inc.

  6. Applying Computerized Adaptive Testing in Schools.

    Science.gov (United States)

    Olsen, James B.

    1990-01-01

    Presents two studies applying computerized adaptive testing (CAT) in schools. Compared paper-administered, computer-administered, and CAT modes for administering school achievement and assessment tests. Then compared computerized adaptive aptitude test results with individually administered Weschler Intelligence Scale for Children-Revised. Found…

  7. Computerizing primary schools in rural kenya

    DEFF Research Database (Denmark)

    Ogembo, J.G.; Ngugi, B.; Pelowski, Matthew John

    2012-01-01

    This paper investigates the outstanding challenges facing primary schools' computerization in rural Kenya. Computerization of schools is often envisaged as a 'magic', or at least a particularly efficient, solution to many of the problems that developing countries face in improving primary school...... education. However, while a great deal of consideration is given to the technical issues surrounding computer implementation, government policy makers, administrators, aid organizations and individuals participating in school computerization programs often have not carefully considered the contextual...... questions surrounding this endeavour. Specifically: 1.) what problems do rural schools actually want to solve with computerization; 2.) is computerization the most important priority for rural schools; 3.) are schools ready, in terms of infrastructure, for a computer in the classroom; or 4.) might...

  8. Mechanically enhanced nested-network hydrogels as a coating material for biomedical devices.

    Science.gov (United States)

    Wang, Zhengmu; Zhang, Hongbin; Chu, Axel J; Jackson, John; Lin, Karen; Lim, Chinten James; Lange, Dirk; Chiao, Mu

    2018-02-12

    Well-organized composite formations such as hierarchical nested-network (NN) structure in bone tissue and reticular connective tissue present remarkable mechanical strength and play a crucial role in achieving physical and biological functions for living organisms. Inspired by these delicate microstructures in nature, an analogous scaffold of double network hydrogel was fabricated by creating a poly(2-hydroxyethyl methacrylate) (pHEMA) network in the porous structure of alginate hydrogels. The resulting hydrogel possessed hierarchical NN structure and showed significantly improved mechanical strength but still maintained high elasticity comparable to soft tissues due to a mutual strengthening effect between the two networks. The tough hydrogel is also self-lubricated, exhibiting a surface friction coefficient comparable with polydimethylsiloxane (PDMS) substrates lubricated by a commercial aqueous lubricant (K-Y Jelly) and other low surface friction hydrogels. Additional properties of this hydrogel include high hydrophilicity, good biocompatibility, tunable cell adhesion and bacterial resistance after incorporation of silver nanoparticles. Firm bonding of the hydrogel on silicone substrates could be achieved through facile chemical modification, thus enabling the use of this hydrogel as a versatile coating material for biomedical applications. In this study, we developed a tough hydrogel by crosslinking HEMA monomers in alginate hydrogels and forming a well-organized structure of hierarchical nested network (NN). Different from most reported stretchable alginate-based hydrogels, the NN hydrogel shows higher compressive strength but retains comparable softness to alginate counterparts. This work further demonstrated the good integration of the tough hydrogel with silicone substrates through chemical modification and micropillar structures. Other properties including surface friction, biocompatibility and bacterial resistance were investigated and the hydrogel shows

  9. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  10. Ag/Au/Polypyrrole Core-shell Nanowire Network for Transparent, Stretchable and Flexible Supercapacitor in Wearable Energy Devices

    Science.gov (United States)

    Moon, Hyunjin; Lee, Habeom; Kwon, Jinhyeong; Suh, Young Duk; Kim, Dong Kwan; Ha, Inho; Yeo, Junyeob; Hong, Sukjoon; Ko, Seung Hwan

    2017-01-01

    Transparent and stretchable energy storage devices have attracted significant interest due to their potential to be applied to biocompatible and wearable electronics. Supercapacitors that use the reversible faradaic redox reaction of conducting polymer have a higher specific capacitance as compared with electrical double-layer capacitors. Typically, the conducting polymer electrode is fabricated through direct electropolymerization on the current collector. However, no research have been conducted on metal nanowires as current collectors for the direct electropolymerization, even though the metal nanowire network structure has proven to be superior as a transparent, flexible, and stretchable electrode platform because the conducting polymer’s redox potential for polymerization is higher than that of widely studied metal nanowires such as silver and copper. In this study, we demonstrated a highly transparent and stretchable supercapacitor by developing Ag/Au/Polypyrrole core-shell nanowire networks as electrode by coating the surface of Ag NWs with a thin layer of gold, which provide higher redox potential than the electropolymerizable monomer. The Ag/Au/Polypyrrole core-shell nanowire networks demonstrated superior mechanical stability under various mechanical bending and stretching. In addition, proposed supercapacitors showed fine optical transmittance together with fivefold improved areal capacitance compared to pristine Ag/Au core-shell nanowire mesh-based supercapacitors. PMID:28155913

  11. Ag/Au/Polypyrrole Core-shell Nanowire Network for Transparent, Stretchable and Flexible Supercapacitor in Wearable Energy Devices

    Science.gov (United States)

    Moon, Hyunjin; Lee, Habeom; Kwon, Jinhyeong; Suh, Young Duk; Kim, Dong Kwan; Ha, Inho; Yeo, Junyeob; Hong, Sukjoon; Ko, Seung Hwan

    2017-02-01

    Transparent and stretchable energy storage devices have attracted significant interest due to their potential to be applied to biocompatible and wearable electronics. Supercapacitors that use the reversible faradaic redox reaction of conducting polymer have a higher specific capacitance as compared with electrical double-layer capacitors. Typically, the conducting polymer electrode is fabricated through direct electropolymerization on the current collector. However, no research have been conducted on metal nanowires as current collectors for the direct electropolymerization, even though the metal nanowire network structure has proven to be superior as a transparent, flexible, and stretchable electrode platform because the conducting polymer’s redox potential for polymerization is higher than that of widely studied metal nanowires such as silver and copper. In this study, we demonstrated a highly transparent and stretchable supercapacitor by developing Ag/Au/Polypyrrole core-shell nanowire networks as electrode by coating the surface of Ag NWs with a thin layer of gold, which provide higher redox potential than the electropolymerizable monomer. The Ag/Au/Polypyrrole core-shell nanowire networks demonstrated superior mechanical stability under various mechanical bending and stretching. In addition, proposed supercapacitors showed fine optical transmittance together with fivefold improved areal capacitance compared to pristine Ag/Au core-shell nanowire mesh-based supercapacitors.

  12. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Blerim Rexha

    2018-02-01

    Full Text Available Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capability on smartphones, tablets, and laptops, face authentication provides an attractive alternative of legacy passwords for its memory-less authentication process, which is so sophisticated that it can unlock the device faster than a fingerprint. Nevertheless, face authentication in the context of smartphones has proven to be vulnerable to attacks. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures and bypass the authentication process. In order to prevent such bypass attacks, gesture recognition together with location is proposed to be additionally modeled. Gestures provide a faster and more convenient method of authentication compared to a complex password. The focus of this paper is to build a secure authentication system with face, location and gesture recognition as components. User gestures and location data are a sequence of time series; therefore, in this paper we propose to use unsupervised learning in the long short-term memory recurrent neural network to actively learn to recognize, group and discriminate user gestures and location. Moreover, a clustering-based technique is also implemented for recognizing gestures and location.

  13. Computerized Interactive Gaming via Supporting Vector Machines

    Directory of Open Access Journals (Sweden)

    Y. Jiang

    2008-01-01

    Full Text Available Computerized interactive gaming requires automatic processing of large volume of random data produced by players on spot, such as shooting, football kicking, and boxing. This paper describes a supporting vector machine-based artificial intelligence algorithm as one of the possible solutions to the problem of random data processing and the provision of interactive indication for further actions. In comparison with existing techniques, such as rule-based and neural networks, and so forth, our SVM-based interactive gaming algorithm has the features of (i high-speed processing, providing instant response to the players, (ii winner selection and control by one parameter, which can be predesigned and adjusted according to the needs of interaction and game design or specific level of difficulties, and (iii detection of interaction points is adaptive to the input changes, and no labelled training data is required. Experiments on numerical simulation support that the proposed algorithm is robust to random noise, accurate in picking up winning data, and convenient for all interactive gaming designs.

  14. Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network

    Science.gov (United States)

    Jung, Kwang-Ryul; Park, Aesoon; Lee, Sungwon

    Machine-Type-Communication (MTC) is a new paradigm in mobile wireless network domains such as Mobile WiMAX (IEEE 802.16e) and 3GPP LTE (3rd Generation Partnership Project Long Term Evolution). We explain the background for MTC environments, and its key issues. Then we focus on the uplink traffic aggressiveness characteristics in major applications such as Smart Grid. Then, we propose a new congestion avoidance algorithm to reduce the congestion of the uplink intensive applications.

  15. Application of Artificial Neural Networks in Modeling Direction Wheelchairs Using Neurosky Mindset Mobile (EEG Device

    Directory of Open Access Journals (Sweden)

    Agus Siswoyo

    2017-07-01

    Full Text Available The implementation of Artificial Neural Network in prediction the direction of electric wheelchair from brain signal input for physical mobility impairment.. The control of the wheelchair as an effort in improving disabled person life quality. The interaction from disabled person is helping in relation to social life with others. Because of the mobility impairment, the wheelchair with brain signal input is made. This wheel chair is purposed to help the disabled person and elderly for their daily activity. ANN helps to develop the mapping from input to target. ANN is developed in 3 level: input level, one hidden level, and output level (6-2-1. There are 6 signal from Neurosky Mindset sensor output, Alpha1, Alpha2, Raw signal, Total time signal, Attention Signal, and Meditation signal. The purpose of this research is to find out the output value from ANN: value in turning right, turning left, and forward. From those outputs, we can prove the relevance to the target. One of the main problem that interfering with success is the problem of proper neural network training. Arduino uno is chosen to implement the learning program algorithm because it is a popular microcontroller that is economic and efficient. The training of artificial neural network in this research uses 21 data package from raw data, Alpha1, Aplha2, Meditation data, Attention data, total time data. At the time of the test there is a value of Mean square Error(MSE at the end of training amounted to 0.92495 at epoch 9958, value a correlation coefficient of 0.92804 shows that accuracy the results of the training process good.     Keywords: Navigation, Neural network, Real-time training, Arduino

  16. International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking

    CERN Document Server

    Shirur, Yasha; Prasad, Rekha

    2013-01-01

    This book is a collection of papers presented by renowned researchers, keynote speakers and academicians in the International Conference on VLSI, Communication, Analog Designs, Signals and Systems, and Networking (VCASAN-2013), organized by B.N.M. Institute of Technology, Bangalore, India during July 17-19, 2013. The book provides global trends in cutting-edge technologies in electronics and communication engineering. The content of the book is useful to engineers, researchers and academicians as well as industry professionals.

  17. A novel matching network employing surface acoustic wave devices for W-CDMA power amplifiers.

    Science.gov (United States)

    Li, Honglang; He, Songbai; Hashimoto, Ken-ya; Omori, Tatsuya; Yamaguchi, Masatsune

    2006-12-22

    This paper describes a new approach of designing high Q surface acoustic wave (SAW) resonators as an inductive element in the matching network for W-CDMA power amplifiers (PAs). Spiral inductors based on CMOS/BiCMOS technologies presently possess relatively low Q (typically <10) and occupy a considerably large area. In order to break through the limitations of the spiral inductors, the authors attempt to apply higher Q and wideband SAW resonators employing Cu-grating/15 degrees YX-LiNbO(3)-substrate structure to the matching network for improved PA performance. An analysis was made on SAW resonators in detail, and an SAW resonator having a very small capacitance ratio of 3.28 and moderate Q of 147.8 was developed. After discussing the frequency dependence of the effective inductances, SAW resonators, which are used to be as inductive elements in the matching networks of PAs, were designed and fabricated. The PA including the matching circuit was simulated using the characteristics of the fabricated SAW resonators. The result showed that with better shape factor and good out-of-rejection, the SAW resonators definitely work as an inductive element and could replace widely used spiral inductors.

  18. Use of Optical Storage Devices as Shared Resources in Local Area Networks

    Science.gov (United States)

    1989-09-01

    PC’s longevity is its expandability which is based upon an open architecture. The original IBM PC was introduced as a mostly empty box containing a cpu ...MS-DOS services. As introduced earlier the I/O ports are the points of interface between the central processing unit ( cpu ) and peripherals or device...O ports) as defined for the Intel 8086 family of processors (including 8086, 8088, 80286 and 80386 ). Each of these I/O ports is directly attached to

  19. Bottle-neck type of neural network as a mapping device towards food specifications.

    Science.gov (United States)

    Novic, Marjana; Groselj, Neva

    2009-09-01

    A novel methodology is proposed for food specifications associated with the origin of food. The methodology was tested on honey samples collected within the TRACE EU project. The data were sampled in various regions in Europe and analysed for the trace elements content. The sampling sites were characterized by different geological origins, such as limestone, shale, or magmatic. We have chosen 14 elements, B, Na, Mg, A, K, Ca, Mn, Co, Ni, Cu, Zn, Rb, Sr, and Ba, due to their influence on the separation of samples regarding the geology of the sampling sites. A special architecture of an error back-propagation neural network, so called bottle-neck type of neural network was used to project the data into a 2D plane. The data were fed into the 14-nodes input layer and then transferred through the 2-nodes hidden layer (compared to a bottle-neck) to the 14-nodes output layer. The two hidden nodes representing the two coordinates of the projection plane enable us to map the samples used for training of the bottle-neck network. With the knowledge about the classes of individual samples we determine the clusters in the projection plane and consequently obtain the coordinates of the centroid (gravity point) of a particular cluster. The clusters are characterized with an ellipse shape borders spanning the length of up to 3sigma in each dimension. Since the data were classified as regard to the geology, three main clusters were sought: (i) limestone, (ii) shale/mudstone/clay/loess, and (iii) acid-magmatic origin of honey samples. The novel methodology proposed for food specifications was demonstrated on a reduced set of samples, which shows good clustering of all three classes in the projection plane, and on the third class of the original data set.

  20. Ensuring Patient Safety by using Colored Petri Net Simulation in the Design of Heterogeneous, Multi-Vendor, Integrated, Life-Critical Wireless (802.x) Patient Care Device Networks.

    Science.gov (United States)

    Sloane, Elliot; Gehlot, Vijay

    2005-01-01

    Hospitals and manufacturers are designing and deploying the IEEE 802.x wireless technologies in medical devices to promote patient mobility and flexible facility use. There is little information, however, on the reliability or ultimate safety of connecting multiple wireless life-critical medical devices from multiple vendors using commercial 802.11a, 802.11b, 802.11g or pre-802.11n devices. It is believed that 802.11-type devices can introduce unintended life-threatening risks unless delivery of critical patient alarms to central monitoring systems and/or clinical personnel is assured by proper use of 802.11e Quality of Service (QoS) methods. Petri net tools can be used to simulate all possible states and transitions between devices and/or systems in a wireless device network, and can identify failure modes in advance. Colored Petri Net (CPN) tools are ideal, in fact, as they allow tracking and controlling each message in a network based on pre-selected criteria. This paper describes a research project using CPN to simulate and validate alarm integrity in a small multi-modality wireless patient monitoring system. A 20-monitor wireless patient monitoring network is created in two versions: one with non-prioritized 802.x CSM protocols and the second with simulated Quality of Service (QoS) capabilities similar to 802.11e (i.e., the second network allows message priority management.) In the standard 802.x network, dangerous heart arrhythmia and pulse oximetry alarms could not be reliably and rapidly communicated, but the second network's QoS priority management reduced that risk significantly.

  1. Barrier Free Internet Access: Evaluating the Cyber Security Risk Posed by the Adoption of Bring Your Own Devices to e-Learning Network Infrastructure

    OpenAIRE

    E.T. Tchao; Ansah, Richard Y.; Djane, Seth D.

    2017-01-01

    The adoption of Bring Your Own Device (BYOD), also known as Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP), or Bring Your Own Personal Computer (BYOPC), is a policy which allows people access to privileged resources, information and services available on the private computer network of an organization using their own personal computer devices. BYOD, since its emergence in 2009, courtesy of Intel, is now a common practice in many organizations. Academic institutions that attempt...

  2. Proposal for the award of a blanket order contract for the supply of microprocessor-based protection and control devices for the CERN HV distribution network

    CERN Document Server

    2004-01-01

    This document concerns the award of a blanket contract for the supply of microprocessor-based protection and control devices for the CERN HV distribution network. The Finance Committee is invited to agree to the negotiation of a blanket order contract with SCHNEIDER ELECTRIC (PT), the lowest technically acceptable bidder after realignment, for the supply of microprocessor-based protection and control devices for the CERN HV distribution network for a total amount of 1 900 000 euros (2 924 128 Swiss francs), subject to revision for inflation after 1 January 2007. The rate of exchange used is that stipulated in the tender

  3. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Directory of Open Access Journals (Sweden)

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  4. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases.

    Science.gov (United States)

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-04-15

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients' brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies.

  5. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases

    Science.gov (United States)

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-01-01

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients’ brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies. PMID:25206907

  6. Wearable Device-Based Gait Recognition Using Angle Embedded Gait Dynamic Images and a Convolutional Neural Network

    Directory of Open Access Journals (Sweden)

    Yongjia Zhao

    2017-02-01

    Full Text Available The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN without the need to manually extract discriminative features. The CNN’s input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI. AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1 the McGill University dataset, which is collected under realistic conditions; and (2 the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns.

  7. Wearable Device-Based Gait Recognition Using Angle Embedded Gait Dynamic Images and a Convolutional Neural Network.

    Science.gov (United States)

    Zhao, Yongjia; Zhou, Suiping

    2017-02-28

    The widespread installation of inertial sensors in smartphones and other wearable devices provides a valuable opportunity to identify people by analyzing their gait patterns, for either cooperative or non-cooperative circumstances. However, it is still a challenging task to reliably extract discriminative features for gait recognition with noisy and complex data sequences collected from casually worn wearable devices like smartphones. To cope with this problem, we propose a novel image-based gait recognition approach using the Convolutional Neural Network (CNN) without the need to manually extract discriminative features. The CNN's input image, which is encoded straightforwardly from the inertial sensor data sequences, is called Angle Embedded Gait Dynamic Image (AE-GDI). AE-GDI is a new two-dimensional representation of gait dynamics, which is invariant to rotation and translation. The performance of the proposed approach in gait authentication and gait labeling is evaluated using two datasets: (1) the McGill University dataset, which is collected under realistic conditions; and (2) the Osaka University dataset with the largest number of subjects. Experimental results show that the proposed approach achieves competitive recognition accuracy over existing approaches and provides an effective parametric solution for identification among a large number of subjects by gait patterns.

  8. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  9. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  10. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  11. Reducing Communication Overhead by Scheduling TCP Transfers on Mobile Devices using Wireless Network Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2012-01-01

    of such performance maps. We demonstrate how the framework can be used to reduce the retransmissions and to better utilise network resources when performing TCP-based file downloads in vehicular M2M communication scenarios. The approach works on top of a standard TCP stack hence has to map identified transmission...... intervals to predicted TCP data volumes. The file download optimisation is evaluated using extensive simulations comparing the TCP scheduling approach to a normal transfer. The performance map is generated by capturing round-trip time measurements and a threshold approach for the mean value for a given area...... potential for improvement in reducing the communication overhead compared with an ordinary TCP transfer....

  12. Reflections on Teaching in a Computerized Classroom: Knowledge, Power and Technology.

    Science.gov (United States)

    Sykes, Lynn; Uber, Nancy

    A study focused on teachers who have worked in computerized, networked writing classrooms at Purdue University (Indiana) for several year. Each of the subjects was a teaching assistant in the Purdue English Department, and the courses involved were upper division technical writing courses. Three theoretical approaches underpinned the study:…

  13. Computerizing marine biota: a rational approach

    Digital Repository Service at National Institute of Oceanography (India)

    Chavan, V.S.; Chandramohan, D.; Parulekar, A.H.

    Data on marine biota while being extensive are also patchy and scattered; thus making retrieval and dissemination of information time consuming. This emphasise the need for computerizing information on marine biota with the objective to collate...

  14. Computerizing a house organ: recharting familiar territory

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-01-01

    Computerization can offer great advantages. But one publication ideally suited to computerization was slow to take advantage of the new technology. The main reason was reluctance to try an unfamiliar way of doing things. Having now switched to computerization, the publication has reaped many benefits. Among them: production time is faster; costs are lower; errors are fewer. Computerization has not been without minor problems. The most obvious is vulnerability to the rarity of a system failure. Others include the technology's potential reinforcement of overediting and of excessive reliance on extremely rapid response. Such problems, however, do not indicate weaknesses in the technology itself; rather, they reflect an incomplete adaption to it and the need for more realistic expectations. An unwarranted reluctance to innovate can slow advances in communication. Technical communicators must be willing to rechart their own familiar territory.

  15. HUMAN RELIABILITY ANALYSIS FOR COMPUTERIZED PROCEDURES

    Energy Technology Data Exchange (ETDEWEB)

    Ronald L. Boring; David I. Gertman; Katya Le Blanc

    2011-09-01

    This paper provides a characterization of human reliability analysis (HRA) issues for computerized procedures in nuclear power plant control rooms. It is beyond the scope of this paper to propose a new HRA approach or to recommend specific methods or refinements to those methods. Rather, this paper provides a review of HRA as applied to traditional paper-based procedures, followed by a discussion of what specific factors should additionally be considered in HRAs for computerized procedures. Performance shaping factors and failure modes unique to computerized procedures are highlighted. Since there is no definitive guide to HRA for paper-based procedures, this paper also serves to clarify the existing guidance on paper-based procedures before delving into the unique aspects of computerized procedures.

  16. Exquisite textiles sensors and wireless sensor network device for home health care.

    Science.gov (United States)

    Huang, Wen-Tzeng; Chen, Chin-Hsing; Chang, Yuan-Jen; Chen, You-Yin; Huang, Jung-Lin; Yang, Chang Ming; Yang, Tzu Lin

    2008-01-01

    In this study, we propose a wearing system with four sensors, ECG (electrocardiogram), three-axis accelerometer, temperature, and tight-switch, applied for remote monitoring system in home-care. The sensors ECG, measured with wearable electrodes made of the steel textile to generate the real-time heart-rate estimator, tight-switch, made of the steel textile to check whether wearing person dresses properly, accelerometer, and temperature parameters are received via the ZigBee receiver within an exquisite belt. Since the movable textile electrodes will cause of unfixed contacts when the wearing person is in motion, making the heart-rate estimation much a sophisticated work, the tight-switch sensor and FIR (Filter Impulse Response) filter technology are applied here to get the more satisfiable heart-rate. The other two bio-sensors can detect the whether fall-down or not and normal body-temperature of this wearing person. Moreover, the ZigBee device with small size, low-power consumption, and high-reliability characteristics is designed to transmit the detected bio-information from these four sensors. Therefore, the vital system embedded with the capability of real-time heart-rate estimation and transmission makes it highly suitable for applications of remote healthcare and wellness.

  17. Network design optimization of fuel cell systems and distributed energy devices.

    Energy Technology Data Exchange (ETDEWEB)

    Colella, Whitney G.

    2010-07-01

    This research explores the thermodynamics, economics, and environmental impacts of innovative, stationary, polygenerative fuel cell systems (FCSs). Each main report section is split into four subsections. The first subsection, 'Potential Greenhouse Gas (GHG) Impact of Stationary FCSs,' quantifies the degree to which GHG emissions can be reduced at a U.S. regional level with the implementation of different FCS designs. The second subsection, 'Optimizing the Design of Combined Heat and Power (CHP) FCSs,' discusses energy network optimization models that evaluate novel strategies for operating CHP FCSs so as to minimize (1) electricity and heating costs for building owners and (2) emissions of the primary GHG - carbon dioxide (CO{sub 2}). The third subsection, 'Optimizing the Design of Combined Cooling, Heating, and Electric Power (CCHP) FCSs,' is similar to the second subsection but is expanded to include capturing FCS heat with absorptive cooling cycles to produce cooling energy. The fourth subsection, - Thermodynamic and Chemical Engineering Models of CCHP FCSs,' discusses the physics and thermodynamic limits of CCHP FCSs.

  18. The optimization based dynamic and cyclic working strategies for rechargeable wireless sensor networks with multiple base stations and wireless energy transfer devices.

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-03-16

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating "bottleneck" sensor nodes is also developed in this paper.

  19. The Optimization Based Dynamic and Cyclic Working Strategies for Rechargeable Wireless Sensor Networks with Multiple Base Stations and Wireless Energy Transfer Devices

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-01-01

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper. PMID:25785305

  20. Producing 3D neuronal networks in hydrogels for living bionic device interfaces.

    Science.gov (United States)

    Aregueta-Robles, Ulises A; Lim, Khoon S; Martens, Penny J; Lovell, Nigel H; Poole-Warren, Laura A; Green, Rylie

    2015-01-01

    Hydrogels hold significant promise for supporting cell based therapies in the field of bioelectrodes. It has been proposed that tissue engineering principles can be used to improve the integration of neural interfacing electrodes. Degradable hydrogels based on poly (vinyl alcohol) functionalised with tyramine (PVA-Tyr) have been shown to support covalent incorporation of non-modified tyrosine rich proteins within synthetic hydrogels. PVA-Tyr crosslinked with such proteins, were explored as a scaffold for supporting development of neural tissue in a three dimensional (3D) environment. In this study a model neural cell line (PC12) and glial accessory cell line, Schwann cell (SC) were encapsulated in PVA-Tyr crosslinked with gelatin and sericin. Specifically, this study aimed to examine the growth and function of SC and PC12 co-cultures when translated from a two dimensional (2D) environment to a 3D environment. PC12 differentiation was successfully promoted in both 2D and 3D at 25 days post-culture. SC encapsulated as a single cell line and in co-culture were able to produce both laminin and collagen-IV which are required to support neuronal development. Neurite outgrowth in the 3D environment was confirmed by immunocytochemical staining. PVA-Tyr/sericin/gelatin hydrogel showed mechanical properties similar to nerve tissue elastic modulus. It is suggested that the mechanical properties of the PVA-Tyr hydrogels with native protein components are providing with a compliant substrate that can be used to support the survival and differentiation of neural networks.

  1. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    Science.gov (United States)

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  2. Heating-Rate-Triggered Carbon-Nanotube-based 3-Dimensional Conducting Networks for a Highly Sensitive Noncontact Sensing Device

    KAUST Repository

    Tai, Yanlong

    2016-01-28

    Recently, flexible and transparent conductive films (TCFs) are drawing more attention for their central role in future applications of flexible electronics. Here, we report the controllable fabrication of TCFs for moisture-sensing applications based on heating-rate-triggered, 3-dimensional porous conducting networks through drop casting lithography of single-walled carbon nanotube (SWCNT)/poly(3,4-ethylenedioxythiophene)-polystyrene sulfonate (PEDOT:PSS) ink. How ink formula and baking conditions influence the self-assembled microstructure of the TCFs is discussed. The sensor presents high-performance properties, including a reasonable sheet resistance (2.1 kohm/sq), a high visible-range transmittance (>69%, PET = 90%), and good stability when subjected to cyclic loading (>1000 cycles, better than indium tin oxide film) during processing, when formulation parameters are well optimized (weight ratio of SWCNT to PEDOT:PSS: 1:0.5, SWCNT concentration: 0.3 mg/ml, and heating rate: 36 °C/minute). Moreover, the benefits of these kinds of TCFs were verified through a fully transparent, highly sensitive, rapid response, noncontact moisture-sensing device (5 × 5 sensing pixels).

  3. Computerized occlusal analysis in bruxism

    Directory of Open Access Journals (Sweden)

    Lazić Vojkan

    2006-01-01

    Full Text Available Introduction. Sleep bruxism as nocturnal parafunction, also known as tooth grinding, is the most common parasomnia (sleep disorder. Most tooth grinding occurs during rapid eye movement - REM sleep. Sleep bruxism is an oral habit characterized by rhythmic activity of the masticatory muscles (m. masseter that causes forced contact between dental surfaces during sleep. Sleep bruxism has been associated with craniomandibular disorders including temporomandibular joint discomfort, pulpalgia, premature loss of teeth due to excessive attrition and mobility, headache, muscle ache, sleep interruption of an individual and problems with removable and fixed denture. Basically, two groups of etiological factors can be distinguished, viz., peripheral (occlusal factors and central (pathophysiological and psychological factors. The role of occlusion (occlusal discrepancies as the causative factor is not enough mentioned in relation to bruxism. Objective. The main objective of this paper was to evaluate the connection between occlusal factors and nocturnal parafunctional activities (occlusal disharmonies and bruxism. Method. Two groups were formed- experimental of 15 persons with signs and symptoms of nocturnal parafunctional activity of mandible (mean age 26.6 years and control of 42 persons with no signs and symptoms of bruxism (mean age 26.3 yrs.. The computerized occlusal analyses were performed using the T-Scan II system (Tekscan, Boston, USA. 2D occlusograms were analyzed showing the occlusal force, the center of the occlusal force with the trajectory and the number of antagonistic tooth contacts. Results. Statistically significant difference of force distribution was found between the left and the right side of the arch (L%-R% (t=2.773; p<0.02 in the group with bruxism. The difference of the centre of occlusal force - COF trajectory between the experimental and control group was not significant, but the trajectory of COF was longer in the group of

  4. Analysis of the mental foramen using cone beam computerized tomography

    Directory of Open Access Journals (Sweden)

    Kunihiro Saito

    Full Text Available AbstractIntroductionKnowledge of the anatomical structures located in the region between the mental foramina is of critical importance in pre-operative planning.ObjectiveTo evaluate the position of the mental foramen relative to the apices of the teeth and the distance to the edges of the mandible, using cone beam computerized tomography.Material and methodOne hundred cone beam computerized tomographs of the mandible were evaluated; the tomographs were taken using a single tomographic device. Each image chosen was evaluated repeatedly from both sides of the mandible, the position of the mental foramen, indicating the region in which the foramen was found and the measures of the mental foramen, the lingual cortex and the mandibular base. Initially, the data were analyzed descriptively. A value of pResultForty-two percent of the mental foramina were located in the apex of the second pre-molar. The lingual margin of the mental foramen was located, on average, 3.1mm from the lingual cortex. The lower margin of the mental foramen was located 7.25 mm above the lower edge of the mandible.ConclusionThe mental foramen was located more frequently at a level of the apices of the second pre-molars, with a distance to the lingual cortex, on average, of 3.1mm and to the base of the mandible, on average, of 7.25 mm.

  5. Distance-Based Access Modifiers Applied to Safety in Home Networks

    DEFF Research Database (Denmark)

    Mortensen, Kjeld Høyer; Schougaard, Kari Rye; Schultz, Ulrik Pagh

    2004-01-01

    Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of safety: preventing the computerized house from harming the inhabitants, even in a worst-case scenario where...... be performed within a physical proximity that ensures safety. We use a declarative approach integrated with an IDL language to express location-based restrictions on operations. This model has been implemented in a middleware for home audio-video devices, using infrared communication and a local-area network...

  6. Radiation exposure from musculoskeletal computerized tomographic scans.

    Science.gov (United States)

    Biswas, Debdut; Bible, Jesse E; Bohan, Michael; Simpson, Andrew K; Whang, Peter G; Grauer, Jonathan N

    2009-08-01

    Computerized tomographic scans are routinely obtained to evaluate a number of musculoskeletal conditions. However, since computerized tomographic scans expose patients to the greatest amounts of radiation of all imaging modalities, the physician must be cognizant of the effective doses of radiation that are administered. This investigation was performed to quantify the effective doses of computerized tomographic scans that are performed for various musculoskeletal applications. The digital imaging archive of a single institution was retrospectively reviewed to identify helical computerized tomographic scans that were completed to visualize the extremities or spine. Imaging parameters were recorded for each examination, and dosimetry calculator software was used to calculate the effective dose values according to a modified protocol derived from publication SR250 of the National Radiological Protection Board of the United Kingdom. Computerized tomographic scans of the chest, abdomen, and pelvis were also collected, and the effective doses were compared with those reported by prior groups in order to validate the results of the current study. The mean effective doses for computerized tomographic scans of the chest, abdomen, and pelvis (5.27, 4.95, and 4.85 mSv, respectively) were consistent with those of previous investigations. The highest mean effective doses were recorded for studies evaluating the spine (4.36, 17.99, and 19.15 mSv for the cervical, thoracic, and lumbar spines, respectively). In the upper extremity, the effective dose of a computerized tomographic scan of the shoulder (2.06 mSv) was higher than those of the elbow (0.14 mSv) and wrist (0.03 mSv). Similarly, the effective dose of a hip scan (3.09 mSv) was significantly higher than those observed with knee (0.16 mSv) and ankle (0.07 mSv) scans. Computerized tomographic scans of the axial and appendicular skeleton are associated with substantially elevated radiation exposures, but the effective dose

  7. Broadband accelerator control network

    Energy Technology Data Exchange (ETDEWEB)

    Skelly, J.; Clifford, T.; Frankel, R.

    1983-01-01

    A broadband data communications network has been implemented at BNL for control of the Alternating Gradient Synchrotron (AG) proton accelerator, using commercial CATV hardware, dual coaxial cables as the communications medium, and spanning 2.0 km. A 4 MHz bandwidth Digital Control channel using CSMA-CA protocol is provided for digital data transmission, with 8 access nodes available over the length of the RELWAY. Each node consists of an rf modem and a microprocessor-based store-and-forward message handler which interfaces the RELWAY to a branch line implemented in GPIB. A gateway to the RELWAY control channel for the (preexisting) AGS Computerized Accelerator Operating system has been constructed using an LSI-11/23 microprocessor as a device in a GPIB branch line. A multilayer communications protocol has been defined for the Digital Control Channel, based on the ISO Open Systems Interconnect layered model, and a RELWAY Device Language defined as the required universal language for device control on this channel.

  8. The CTTC 5G End-to-End Experimental Platform : Integrating Heterogeneous Wireless/Optical Networks, Distributed Cloud, and IoT Devices

    OpenAIRE

    Muñóz, Raul; Mangues-Bafalluy, Josep; Vilalta, Ricard; Verikoukis, Christos; Alonso-Zarate, Jesús; Bartzoudis, Nikolaos; Georgiadis, Apostolos; Payaró, Miquel; Pérez-Neira, Ana; Casellas, Ramon; Martínez, Ricardo; Núñez-Martínez, Jose; Manuel Requena Esteso, Manuel; Pubill, David; Font-Batch, Oriol

    2016-01-01

    The Internet of Things (IoT) will facilitate a wide variety of applications in different domains, such as smart cities, smart grids, industrial automation (Industry 4.0), smart driving, assistance of the elderly, and home automation. Billions of heterogeneous smart devices with different application requirements will be connected to the networks and will generate huge aggregated volumes of data that will be processed in distributed cloud infrastructures. On the other hand, there is also a gen...

  9. Conceptual design of SMART computerized operator support system

    Energy Technology Data Exchange (ETDEWEB)

    Shim, Y. R.; Go, J. H.; Sung, D. H.; Kim, J. S. [Samchang Co., Ulsan (Korea, Republic of); Lee, J. B.; Park, K. O. [KAERI, Taejon (Korea, Republic of)

    2004-07-01

    Since the mid-1980, Computerized Operator Support System (COSS) has been developed in the world to support monitoring and diagnosing of NPP. This research provides design concept for the SMART (System-integrated Modular Advanced ReacTor) COSS by reviewing the state-of-the-art of COSS and its application. Specially, it is derived from design considerations such as range of computer-based procedure, the role of operator, display devices of procedure, function allocation, prioritizing of procedures actions and the scope of hard-copied procedures as a backup. This thesis provides plan of SMART COSS development and design concept to function, display design, man-machine interfaces, and computer-based procedure supporting COSS.

  10. Eye movement analysis system using computerized image recognition.

    Science.gov (United States)

    Yamanobe, S; Taira, S; Morizono, T; Yagi, T; Kamio, T

    1990-03-01

    A new technique for an eye movement analysis system utilizing infrared video recording and a computerized image recognition method is presented. The system consists of an infrared lighting apparatus, a very small infrared video charge-coupled device camera, a video tape recorder, an analogue-digital converter, and microcomputers. This system makes it possible to simultaneously analyze the slow-phase velocity quantitatively not only of the horizontal and vertical but also of the rotatory components of the energy-induced nystagmus. The maximum slow-phase velocity of the rotatory component of energy-induced nystagmus was found to be 4.1 degrees per second on an average in this study.

  11. FY1998 report on a survey related to joint utilization of welfare device development data using an international network; 1998 nendo kokusai network ni yoru fukushi kiki kaihatsu data no kyodo riyo ni kansuru chosa hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    A survey was made in relation with joint utilization of welfare device development data using an international network. Developing welfare devices requires data from ergonomic and medical systems, while the cope of the objects is wide, and the kinds are various. For proliferation of welfare devices, system compatibility evaluation including that on using environment is important, including living environments that are different by countries. The present survey has identified how data for aged, handicapped and help-needing persons are accumulated and utilized in research organizations in America and Europe for both of the ergonomic and medical areas. The survey also investigated major academic societies in overseas countries, and collected database and academic network information that support the advanced research and development. At the same time, investigations were also made on organizations and corporations who are moving forward the efficient data utilization. Welfare device and service information providing systems in Japan were investigated to compare them with the trends in other countries. Conceptions and methods were compiled to utilize data internationally and jointly. Database models for device development were considered, and a proposal was made on structuring a research and development supporting database, and the operation method thereof. (NEDO)

  12. The EORTC emotional functioning computerized adaptive test

    DEFF Research Database (Denmark)

    Gamper, Eva-Maria; Grønvold, Mogens; Petersen, Morten Aa

    2014-01-01

    The European Organisation for Research and Treatment of Cancer (EORTC) Quality of Life Group is currently developing computerized adaptive testing measures for the Quality of Life Questionnaire Core-30 (QLQ-C30) scales. The work presented here describes the development of an EORTC item bank...

  13. Computerized management information systems and organizational structures

    Science.gov (United States)

    Zannetos, Z. S.; Sertel, M. R.

    1970-01-01

    The computerized management of information systems and organizational structures is discussed. The subjects presented are: (1) critical factors favoring centralization and decentralization of organizations, (2) classification of organizations by relative structure, (3) attempts to measure change in organization structure, and (4) impact of information technology developments on organizational structure changes.

  14. Computerized management support for swine breeding farms

    NARCIS (Netherlands)

    Huirne, R.B.M.

    1990-01-01

    1. INTRODUCTION

    The investigations described in this thesis have been directed towards computerized management support for swine breeding farms, focused on sow productivity and profitability. The study is composed of three basic parts: (1) basic description and

  15. Computerizing Maintenance Management Improves School Processes.

    Science.gov (United States)

    Conroy, Pat

    2002-01-01

    Describes how a Computerized Maintenance Management System (CMMS), a centralized maintenance operations database that facilitates work order procedures and staff directives, can help individual school campuses and school districts to manage maintenance. Presents the benefits of CMMS and things to consider in CMMS selection. (EV)

  16. Implementation of a Computerized Maintenance Management System

    Science.gov (United States)

    Shen, Yong-Hong; Askari, Bruce

    1994-01-01

    A primer Computerized Maintenance Management System (CMMS) has been established for NASA Ames pressure component certification program. The CMMS takes full advantage of the latest computer technology and SQL relational database to perform periodic services for vital pressure components. The Ames certification program is briefly described and the aspects of the CMMS implementation are discussed as they are related to the certification objectives.

  17. Computerized Facilities Layout Design | Mulugeta | Zede Journal

    African Journals Online (AJOL)

    Facilities are crucial as they usually represent the largest and the most expensive assets of an organization. Determining location of machines, workstations, and other facilities are layout problems in a manufacturing plant. Different computerized algorithms have been developed to optimize the flow of materials within a ...

  18. Violations of ignorability in computerized adaptive testing

    NARCIS (Netherlands)

    Glas, Cornelis A.W.

    Using auxiliary information and allowing item review in computerized adaptive testing produces a violation of the ignorability principle for missing data (Rubin, 1976) that may bias parameter estimates in IRT models. However, the violation of ignorability does not automatically lead to bias. In this

  19. Computerized technique for recording board defect data

    Science.gov (United States)

    R. Bruce Anderson; R. Edward Thomas; Charles J. Gatchell; Neal D. Bennett; Neal D. Bennett

    1993-01-01

    A computerized technique for recording board defect data has been developed that is faster and more accurate than manual techniques. The lumber database generated by this technique is a necessary input to computer simulation models that estimate potential cutting yields from various lumber breakdown sequences. The technique allows collection of detailed information...

  20. [Computerization of hospital blood banks in France].

    Science.gov (United States)

    Daurat, G; Py, J-Y

    2012-11-01

    In France, most blood products are delivered by the établissement francais du sang, directly to the recipients, and hospital blood banks deliver a minor part, but are independent from it. However that may be, hospital blood banks are hazardous activities regarding to recipients, blood products, blood supply of the hospital and regional blood supply. Because of the high risk level, a computerized information system is compulsory for all hospital blood banks, except for those only devoted to vital emergency transfusion. On the field, the integration of computerization in the different processes is very heterogeneous. So, it has been decided to publish guidelines for computerizing hospital blood banks information systems and production management. They have been built according to risk assessment and are intended to minimize those risks. The principle is that all acquisition and processing of data about recipients or blood products and tracking, must be fully computerized and that the result of all manual processes must be checked by computer before proceeding to the next step. The guidelines list the different processes and, for each of them, the functions the software must play. All together, they form the basic level all hospital blood banks should reach. Optional functions are listed. Moreover, the guidelines are also aimed to be a common tool for regional health authorities who supervise hospital blood banks. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  1. Robinson's Computerized Strabismus Model Comes of Age

    NARCIS (Netherlands)

    H.J. Simonsz (Huib); H. Spekreijse (Henk)

    1996-01-01

    textabstractIn this article we review our further development of D.A. Robinson's computerized strabismus model. First, an extensive literature study has been carried out to get more accurate data on the anatomy of the average eye and the eye muscles, and about how these vary with age and with

  2. Safety first! managing risks for a daisy chain of medical devices connected to the IT-network - first experiences applying IEC 80001-1.

    Science.gov (United States)

    Ahlbrandt, Janko; Röhrig, Rainer

    2013-01-01

    The best way to ensure patient safety is to eliminate errors. To avoid errors and resulting harm from medical devices, there are rules and laws in Germany to ensure a certain quality and process [1,2]. This does not cover scenarios where devices are connected to a data network, forming a medical IT network. Arising risks need to be addressed by operating organizations, such as hospitals. International standard IEC 80001-1 offers a process for this and defines roles and responsibilities [3]. The aim of our study was to assess the application of risk management for a small initial project. We studied a daisy chain of medical devices connected to the IT network. The number of involved proprietary protocols and interface-definitions complicates the risk management, if just for the number of involved manufacturers. Identified risks could all be addressed and did not block the setup's deployment. Risk management creates an extra effort, but can reduce harm and potential financial liabilities. We can recommend starting with small projects to familiarize with the process.

  3. Network analysis of semiconducting Zn1-xCdxS based photosensitive device using impedance spectroscopy and current-voltage measurement

    Science.gov (United States)

    Datta, Joydeep; Das, Mrinmay; Dey, Arka; Halder, Soumi; Sil, Sayantan; Ray, Partha Pratim

    2017-10-01

    ZnCdS is an intermediate ternary alloy type semiconducting material which has huge tunable structural, optical and electrical properties. Here, we have synthesized Zn1-xCdxS compound and characterized its structural, optical and charge transport properties. It is seen that the particle size is greatly influenced by the amount of alloy concentration of cadmium. The performance of semiconductor device such as Schottky diode depends mainly on the charge transportation through the metal-semiconductor junction. So, we have fabricated Al/Zn1-xCdxS/ITO device and investigated the bias dependent impedance properties through equivalent circuit network analysis to study the electron lifetime and interfacial region resistance. The result of network analysis indicates that the charge transportation through Al- Zn0.6Cd0.4S is better than the other fabricated devices. For further explanation, we have studied the capacitance-voltage (C-V) characteristic under dark and current-voltage (I-V) characteristic under dark and light. We have investigated barrier height, depletion layer width and employed SCLC (space charge limited current) theory in I-V characteristics to determine mobility, transit time and diffusion length. The mobility and diffusion length for Zn0.6Cd0.4S fabricated device are derived as 23.01 m2 V-1 s-1 and 4.4 μm respectively while both the values are less for the other devices. These values are enhanced upon illumination for all the devices but superiority comes from the Al/Zn0.6Cd0.4S/ITO device and it leads us to measure the photosensitivity, responsivity, specific detectivity. As expected, the photosensing parameters are enhanced for the Zn0.6Cd0.4S fabricated device. So, this literature not only explores the metal semiconductor charge transportation using impedance spectroscopy (IS) network analysis and SCLC theory but also explain it from the structural point of view.

  4. Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks

    Directory of Open Access Journals (Sweden)

    Baras JohnS

    2011-01-01

    Full Text Available We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs on messages sourced by the device. The authentication protocol requires a centralized infrastructure in the network: we describe the protocol in a hybrid wireless network with a satellite overlay interconnecting the wireless devices. The satellite is used as the Certificate Authority (CA and also acts as the proxy for the senders in disclosing the MAC keys to the receivers. We also design a probabilistic nonrepudiation mechanism that utilizes the satellite's role as the CA and sender proxy. Through analysis, we show that the authentication protocol is secure against malicious adversaries. We also present detailed simulation results that demonstrate that the proposed protocol is much cheaper than traditional public key-based authentication technologies for metrics like processing delay, storage requirements, and energy consumption of the smart devices.

  5. Protecting computer-based medical devices: defending against viruses and other threats.

    Science.gov (United States)

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  6. Characterization of aerobic ethanol productions in a computerized auxostat

    Energy Technology Data Exchange (ETDEWEB)

    Fraleigh, S.P.

    1989-01-01

    For many valuable bioproducts high productivity is associated with rapid growth. However, most continuous microbial cultures become unstable when the dilution rate is fixed near the value for maximum growth rate. The auxostat culture technique employs feedback control of a nutrient or metabolite to stabilize the biomass at its maximum potential growth rate. An auxostat device is therefore ideal for study of bioprocesses involving the overproduction of primary metabolites such as ethanol. Oxidoreductive transformations involving ethanol are utilized by Saccharomyces yeasts when normal respiration cannot satisfy energy needs. When rapid growth or other stress creates oxidoreductive conditions in aerobic Saccharomyces cultures, very high specific ethanol formation rates are established and biomass yield drops to levels more typical of anaerobic fermentation. Although the physiology is favorable, the potential for large-scale aerobic ethanol processes to compete with traditional anaerobic fermentations has not previously been assessed. In this study, a fully computerized auxostat device was constructed and used to characterize the specific and volumetric aerobic ethanol productivity of the yeast Saccharomyces cerevisiae. To divert substrate away from biomass and into product formation, aerobic cultures were stressed with variations of ionic balance (via extreme K{sup +} and H{sup +} setpoints) in the auxostat device. During growth with limiting K{sup +} concentrations, the goal of very low biomass yield was attained but the rate of ethanol production was poor. However, with excess K{sup +} the volumetric productivity reached 6.1 g/I,-h, a value that is comparable to optimized, continuous anaerobic cultures.

  7. Scholastic Journalism Teacher Use of Digital Devices and Social Networking Tools in a Poor, Largely Rural State

    Science.gov (United States)

    Plopper, Bruce L.; Conaway, Anne Fleming

    2013-01-01

    Research showing adolescents' ever-increasing use of digital devices, combined with calls from governmental officials to incorporate more technology into classroom activities, prompted this survey of Arkansas scholastic journalism advisers. The goal was to determine how they used digital communication devices in their teaching. Results showed lack…

  8. Impact of high power interference sources in planning and deployment of wireless sensor networks and devices in the 2.4 GHz frequency band in heterogeneous environments.

    Science.gov (United States)

    Iturri, Peio López; Nazábal, Juan Antonio; Azpilicueta, Leire; Rodriguez, Pablo; Beruete, Miguel; Fernández-Valdivielso, Carlos; Falcone, Francisco

    2012-11-12

    In this work, the impact of radiofrequency radiation leakage from microwave ovens and its effect on 802.15.4 ZigBee-compliant wireless sensor networks operating in the 2.4 GHz Industrial Scientific Medical (ISM) band is analyzed. By means of a novel radioplanning approach, based on electromagnetic field simulation of a microwave oven and determination of equivalent radiation sources applied to an in-house developed 3D ray launching algorithm, estimation of the microwave oven’s power leakage is obtained for the complete volume of an indoor scenario. The magnitude and the variable nature of the interference is analyzed and the impact in the radio link quality in operating wireless sensors is estimated and compared with radio channel measurements as well as packet measurements. The measurement results reveal the importance of selecting an adequate 802.15.4 channel, as well as the Wireless Sensor Network deployment strategy within this type of environment, in order to optimize energy consumption and increase the overall network performance. The proposed method enables one to estimate potential interference effects in devices operating within the 2.4 GHz band in the complete scenario, prior to wireless sensor network deployment, which can aid in achieving the most optimal network topology.

  9. Impact of High Power Interference Sources in Planning and Deployment of Wireless Sensor Networks and Devices in the 2.4 GHz Frequency Band in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Francisco Falcone

    2012-11-01

    Full Text Available In this work, the impact of radiofrequency radiation leakage from microwave ovens and its effect on 802.15.4 ZigBee-compliant wireless sensor networks operating in the 2.4 GHz Industrial Scientific Medical (ISM band is analyzed. By means of a novel radioplanning approach, based on electromagnetic field simulation of a microwave oven and determination of equivalent radiation sources applied to an in-house developed 3D ray launching algorithm, estimation of the microwave oven’s power leakage is obtained for the complete volume of an indoor scenario. The magnitude and the variable nature of the interference is analyzed and the impact in the radio link quality in operating wireless sensors is estimated and compared with radio channel measurements as well as packet measurements. The measurement results reveal the importance of selecting an adequate 802.15.4 channel, as well as the Wireless Sensor Network deployment strategy within this type of environment, in order to optimize energy consumption and increase the overall network performance. The proposed method enables one to estimate potential interference effects in devices operating within the 2.4 GHz band in the complete scenario, prior to wireless sensor network deployment, which can aid in achieving the most optimal network topology.

  10. [Recurrence of rectal cancer in computerized tomography].

    Science.gov (United States)

    Kuckein, D

    1981-04-01

    In contrast to conventional methods of x-ray diagnosis, recurrence of a rectum carcinoma may be visualized directly by means of computerized tomography. CT criteria of a tumor relapse are discussed. Based on own cases, it is shown that the method is usually employed too late. CT as follow-up examination should be used as a routine procedure in order to establish an early diagnosis of tumor recurrence.

  11. Computerized flow monitors detect small kicks

    Energy Technology Data Exchange (ETDEWEB)

    McCann, D.; White, D. (Sedco Forex, Paris (FR))

    1992-02-24

    This paper reports on a smart alarm system installed on a number of offshore rigs and one land rig which can detect kicks more quickly than conventional systems. This rapid kick detection improves rig safety because the smaller the detected influx, the easier it is to control the well. The extensive computerized monitoring system helps drilling personnel detect fluid influxes and fluid losses before the changes in flow would normally be apparent.

  12. Computerized models for strategic planning and marketing.

    Science.gov (United States)

    Coffey, R J

    1985-03-01

    In the rapidly changing health care industry, planning and marketing based primarily on historical information is no longer sufficient. The use of computerized models to evaluate alternatives is proposed as a key part of strategic planning and marketing. The general concept, approach, components, and uses of such models are described in general, followed by an example model including the inputs, formats, and outputs, Finally, the use and interpretation of such models are discussed.

  13. Computerized implant-dentistry: Advances toward automation

    Directory of Open Access Journals (Sweden)

    Minkle Gulati

    2015-01-01

    Full Text Available Advancements in the field of implantology such as three-dimensional imaging, implant-planning software, computer-aided-design/computer-aided-manufacturing (CAD/CAM technology, computer-guided, and navigated implant surgery have led to the computerization of implant-dentistry. This three-dimensional computer-generated implant-planning and surgery has not only enabled accurate preoperative evaluation of the anatomic limitations but has also facilitated preoperative planning of implant positions along with virtual implant placement and subsequently transferring the virtual treatment plans onto the surgical phase via static (guided or dynamic (navigated systems aided by CAD/CAM technology. Computerized-implant-dentistry being highly predictable and minimally invasive in nature has also allowed implant placement in patients with medical comorbidities (e.g. radiation therapy, blood dyscrasias, in patients with complex problems following a significant alteration of the bony anatomy as a result of benign or malignant pathology of the jaws or trauma and in patients with other physical and emotional problems. With significant achievements accomplished in the field of computerized implant-dentistry, attempts are now been made toward complete automation of implant-dentistry.

  14. Computerized implant-dentistry: Advances toward automation.

    Science.gov (United States)

    Gulati, Minkle; Anand, Vishal; Salaria, Sanjeev Kumar; Jain, Nikil; Gupta, Shilpi

    2015-01-01

    Advancements in the field of implantology such as three-dimensional imaging, implant-planning software, computer-aided-design/computer-aided-manufacturing (CAD/CAM) technology, computer-guided, and navigated implant surgery have led to the computerization of implant-dentistry. This three-dimensional computer-generated implant-planning and surgery has not only enabled accurate preoperative evaluation of the anatomic limitations but has also facilitated preoperative planning of implant positions along with virtual implant placement and subsequently transferring the virtual treatment plans onto the surgical phase via static (guided) or dynamic (navigated) systems aided by CAD/CAM technology. Computerized-implant-dentistry being highly predictable and minimally invasive in nature has also allowed implant placement in patients with medical comorbidities (e.g. radiation therapy, blood dyscrasias), in patients with complex problems following a significant alteration of the bony anatomy as a result of benign or malignant pathology of the jaws or trauma and in patients with other physical and emotional problems. With significant achievements accomplished in the field of computerized implant-dentistry, attempts are now been made toward complete automation of implant-dentistry.

  15. Desien, ConstruThe design, fabrication and evaluation of egg weighing device using capacitive sensor and neural networksction and Evaluation of Egg Weighing Device Using Capacitive Sensor and Neural Networks

    Directory of Open Access Journals (Sweden)

    S Khalili

    2015-09-01

    Full Text Available Introduction: Grading agricultural products always has a particular important position for submission to domestic and overseas markets. The grading causes more profitable product ranges and customer satisfaction. Grading treatment is carried out based on various parameters such as color, ripeness level, dimensions and weight. Product weight is one of the most effective parameters in grading operation. Egg weight is directly related to the smallness and coarseness of eggs. In egg grading, the largeness value is very important in marketing. This research aimed to design, fabricate and evaluate the egg weighing system based on its dielectric properties. Materials and Methods: To perform this research, the stages of work are divided into several sections including, design and construction of the hardware section, writing code for the software section to collect data, conducting nondestructive tests and data collection, analysis of obtained data using artificial intelligence, and giving the results of analysis for device calibration of the system as the software code. The large eggs as dielectric substances cause more increase in the capacity of the capacitive sensor. Furthermore, by derivation of a relation between capacity of capacitive sensor and egg weight, one can predict the weight of the sample. A prototype unit of weighing system was designed and fabricated. The designed unit was composed of a chassis, a voltage source, a sinusoidal signal generator, a voltage measurement unit, an AVR micro controller, a COM port, a capacitive sensor, and an LCD and a keyboard. Neural network technique was used for egg weight prediction. The designed net receives 16 voltage values at different frequencies as inputs and its output is the egg weight. In order to calibrate and evaluate the weighing unit, 150 fresh egg samples were provided on egg laying day from a local poultry farm. Experiments were divided into three groups. The experiments were carried out on

  16. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    OpenAIRE

    Blerim Rexha; Gresa Shala; Valon Xhafa

    2018-01-01

    Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capa...

  17. Sucrose-based fabrication of 3D-networked, cylindrical microfluidic channels for rapid prototyping of lab-on-a-chip and vaso-mimetic devices.

    Science.gov (United States)

    Lee, Jiwon; Paek, Jungwook; Kim, Jaeyoun

    2012-08-07

    We present a new fabrication scheme for 3D-networked, cylindrical microfluidic (MF) channels based on shaping, bonding, and assembly of sucrose fibers. It is a simple, cleanroom-free, and environment-friendly method, ideal for rapid prototyping of lab-on-a-chip devices. Despite its simplicity, it can realize complex 3D MF channel architectures such as cylindrical tapers, internal loops, end-to-side junctions, tapered junctions, and stenosis. The last two will be of special use for realizing vaso-mimetic MF structures. It also enables molding with polymers incompatible with high-temperature processing.

  18. Joint interference management and resource allocation for device-to-device (D2D) communications underlying downlink/uplink decoupled (DUDe) heterogeneous networks

    KAUST Repository

    Celik, Abdulkadir

    2017-07-31

    In this paper, resource allocation and co-tier/cross-tier interference management are investigated for D2D-enabled heterogeneous networks (HetNets) where tiers 1, 2, and 3 consist of macrocells, smallcells, and D2D pairs, respectively. We first propose a D2D-enabled fractional frequency reuse scheme for uplink (UL) HetNets where macrocell subregions are preassigned to different subbands (SBs) in order to mitigate the tier-1↔tier-1 interference. Nevertheless, cell-edge macrocell user equipments (MUEs) with high transmission powers still form dead-zones for nearby smallcell UEs (SUEs) and D2D UEs (DUEs). One of the simple but yet novel means of the dead-zone alleviation is associating the cell-edge MUEs with nearby smallcells, which is also known as downlink (DL)/UL decoupling (DUDe). Subject to quality of service (QoS) requirements and power constraints, we formulate a joint SB assignment and resource block (RB) allocation optimization as a mixed integer non-linear programming (MINLP) problem to maximize the D2D sum rate and minimize the co-tier/cross-tier interference. Based on tolerable interference limit, we propose a fast yet high-performance suboptimal solution to jointly assign available SBs and RBs to smallcells. A D2D mode selection and resource allocation framework is then developed for DUEs. As traditional DL/UL Coupled (DUCo) scheme generates significant interference proportional to cellular user density and user association bias factor, results obtained from the combination of proposed methods and developed algorithms reveal the potential of DUDe for co-tier/cross-tier interference mitigation which opens more room for spectrum reuse of DUEs.

  19. Computerized system to improve voluntary control of balance in neurological patients.

    Science.gov (United States)

    Cattaneo, D; Cardini, R

    2001-12-01

    The treatment of acquired impairments of balance is one of the most elusive problems that rehabilitative medicine faces. Computerized systems to measure how patients control their balance in static conditions were introduced long ago into clinical practice and proved to be useful; we have designed and developed a computerized system called "BioGP," which combines features of a classic stabilometric platform with those of a retraining device based on visual feedback The aim of this study was to identify homogeneous groups of patients and to provide objective proof of effectiveness for the rehabilitation of patients with balance disorders. The findings confirm that the new equipment provides clinically valid and sensitive information concerning subjects' ability to control voluntary shifts of center of pressure (COP) while standing. The information is relevant to applications using basically the same approach (1) and are encouraging for possible use of the system as a rehabilitation instrument.

  20. Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring

    Directory of Open Access Journals (Sweden)

    Salman Ali

    2015-03-01

    Full Text Available The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs. CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.

  1. Network challenges for cyber physical systems with tiny wireless devices: a case study on reliable pipeline condition monitoring.

    Science.gov (United States)

    Ali, Salman; Qaisar, Saad Bin; Saeed, Husnain; Khan, Muhammad Farhan; Naeem, Muhammad; Anpalagan, Alagan

    2015-03-25

    The synergy of computational and physical network components leading to the Internet of Things, Data and Services has been made feasible by the use of Cyber Physical Systems (CPSs). CPS engineering promises to impact system condition monitoring for a diverse range of fields from healthcare, manufacturing, and transportation to aerospace and warfare. CPS for environment monitoring applications completely transforms human-to-human, human-to-machine and machine-to-machine interactions with the use of Internet Cloud. A recent trend is to gain assistance from mergers between virtual networking and physical actuation to reliably perform all conventional and complex sensing and communication tasks. Oil and gas pipeline monitoring provides a novel example of the benefits of CPS, providing a reliable remote monitoring platform to leverage environment, strategic and economic benefits. In this paper, we evaluate the applications and technical requirements for seamlessly integrating CPS with sensor network plane from a reliability perspective and review the strategies for communicating information between remote monitoring sites and the widely deployed sensor nodes. Related challenges and issues in network architecture design and relevant protocols are also provided with classification. This is supported by a case study on implementing reliable monitoring of oil and gas pipeline installations. Network parameters like node-discovery, node-mobility, data security, link connectivity, data aggregation, information knowledge discovery and quality of service provisioning have been reviewed.

  2. Computerized adaptive control weld skate with CCTV weld guidance project

    Science.gov (United States)

    Wall, W. A.

    1976-01-01

    This report summarizes progress of the automatic computerized weld skate development portion of the Computerized Weld Skate with Closed Circuit Television (CCTV) Arc Guidance Project. The main goal of the project is to develop an automatic welding skate demonstration model equipped with CCTV weld guidance. The three main goals of the overall project are to: (1) develop a demonstration model computerized weld skate system, (2) develop a demonstration model automatic CCTV guidance system, and (3) integrate the two systems into a demonstration model of computerized weld skate with CCTV weld guidance for welding contoured parts.

  3. Visualization in the age of computerization

    CERN Document Server

    Carusi, Annamaria; Webmoor, Timothy; Woolgar, Steve

    2014-01-01

    Digitalization and computerization are now pervasive in science. This has deep consequences for our understanding of scientific knowledge and of the scientific process, and challenges longstanding assumptions and traditional frameworks of thinking of scientific knowledge. Digital media and computational processes challenge our conception of the way in which perception and cognition work in science, of the objectivity of science, and the nature of scientific objects. They bring about new relationships between science, art and other visual media, and new ways of practicing science and organizing

  4. Computerized documentation systems: blessings or curse?

    Science.gov (United States)

    Vlasses, F R

    1993-01-01

    This article considers the possibility that computerized documentation systems will negatively impact knowledge development in nursing. Ideas from three vantage points is presented. First, systems are being developed from theoretical frameworks that are not necessarily grounded in nursing, and these systems, in turn, influence the nurses's ability to process and conceptualize information. Second, computer systems may support the retrieval of empirical data to the elimination of other types of data necessary to the development of nursing knowledge. Third, computers may decrease opportunities for collegial dialogue. These factors together create an atmosphere of "technologic determinism" (Robinson & Robinson, 1990), which can inhibit the development of new ideas in nursing.

  5. A model for a seismic computerized alert network

    Science.gov (United States)

    Heaton, T.H.

    1985-01-01

    In large earthquakes, damaging ground motions may occur at large epicentral distances. Because of the relatively slow speed of seismic waves, it is possible to construct a system to provide short-term warning (as much as several tens of seconds) of imminent strong ground motions from major earthquakes. Automated safety responses could be triggered by users after receiving estimates of the arrival time and strength of shaking expected at an individual site. Although warning times are likely to be short for areas greatly damaged by relatively numerous earthquakes of moderate size, large areas that experience very strong shaking during great earthquakes would receive longer warning times.

  6. Using internet enabled mobile devices and social networking technologies to promote exercise as an intervention for young first episode psychosis patients

    Directory of Open Access Journals (Sweden)

    Sun Pamela

    2011-05-01

    Full Text Available Abstract Background Young people with first episode psychosis are at an increased risk for a range of poor health outcomes. In contrast to the growing body of evidence that suggests that exercise therapy may benefit the physical and mental health of people diagnosed with schizophrenia, there are no studies to date that have sought to extend the use of exercise therapy among patients with first episode psychosis. The aim of the study is to test the feasibility and acceptability of an exercise program that will be delivered via internet enabled mobile devices and social networking technologies among young people with first episode psychosis. Methods/Design This study is a qualitative pilot study being conducted at Orygen Youth Health Research Centre in Melbourne, Australia. Participants are young people aged 15-24 who are receiving clinical care at a specialist first episode psychosis treatment centre. Participants will also comprise young people from the general population. The exercise intervention is a 9-week running program, designed to gradually build a person's level of fitness to be able to run 5 kilometres (3 miles towards the end of the program. The program will be delivered via an internet enabled mobile device. Participants will be asked to post messages about their running experiences on the social networking website, and will also be asked to attend three face-to-face interviews. Discussion This paper describes the development of a qualitative study to pilot a running program coupled with the use of internet enabled mobile devices among young people with first episode psychosis. If the program is found to be feasible and acceptable to patients, it is hoped that further rigorous evaluations will ultimately lead to the introduction of exercise therapy as part of an evidence-based, multidisciplinary approach in routine clinical care.

  7. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

    Directory of Open Access Journals (Sweden)

    Javier Blesa

    2009-11-01

    Full Text Available The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps, in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

  8. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.

    Science.gov (United States)

    Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

  9. Drug administration error related to computerized prescribing.

    Science.gov (United States)

    Le Garlantezec, P; Aupée, O; Alméras, D; Lefeuvre, L; Souleau, B; Sgarioto, A; Bohand, X

    2010-12-01

    One of the main reasons for the implementation of computer-based prescribing was to reduce medication errors. However, the risk has not fallen to zero and new kinds of errors have been detected. the following case relates one of these medication errors involving a preparation of vincristine. This antineoplastic drug was injected to a patient via a subcutaneous route of administration instead of an intravenous bolus injection. consequently, a cutaneous erythema appeared. This incident resulted from an error in the programming of the administration route of the protocol operated by a pharmacist and a physician. The pharmacist, who was responsible for the validation of the computerized medical order and then for the compounding and the dispensing of the drug, did not detect the error. this case highlights the need of improved and irreproachable therapeutic protocols. Recorded in a database, they must be validated pharmaceutically and medicinally to secure computer-based prescribing, drug handling, dispensing, and administering of the antineoplastic drugs. Even if the pharmaceutical analysis of prescriptions is made easier with computerization, we encourage the training of nurses and the evaluation of their knowledge as well as the necessity for pharmacists to learn to detect new kinds of errors and to verify periodically protocols.

  10. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases

    OpenAIRE

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-01-01

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted ...

  11. Participatory design for computerization of clinical practice guidelines

    DEFF Research Database (Denmark)

    Lyng, Karen Marie; Pedersen, B. S.

    2011-01-01

    There have been made many attempts on computerization of clinical practice guidelines (CPGs), none have, however achieved any general application in clinical work practice. The objective of this paper is: (1) to raise awareness about the impact the design method used for computerization of CPGs...

  12. FEASIBILITY OF COMPUTERIZED PSYCHOLOGICAL-TESTING WITH PSYCHIATRIC OUTPATIENTS

    NARCIS (Netherlands)

    SPINHOVEN, P; LABBE, MR; ROMBOUTS, R

    The feasibility of computerized psychological testing was investigated in a sample of 452 consecutive psychiatric outpatients. Forty-six percent of the solicited patients agreed to participate in the computerized assessment. Tested patients were significantly younger and better educated than those

  13. Developing of a Computerized Brain Diagnosing System for Case ...

    African Journals Online (AJOL)

    The main purpose of this project is to design a computerized brain diagnosing system that would be used in carrying out the daily diagnosing activity in the clinic. The developed computerized system has numerous advantages over manual operation which is very tedious and time consuming. As part of the research method ...

  14. Functional connectivity and dynamics of cortical-thalamic networks co-cultured in a dual compartment device

    Science.gov (United States)

    Kanagasabapathi, Thirukumaran T.; Massobrio, Paolo; Barone, Rocco Andrea; Tedesco, Mariateresa; Martinoia, Sergio; Wadman, Wytse J.; Decré, Michel M. J.

    2012-06-01

    Co-cultures containing dissociated cortical and thalamic cells may provide a unique model for understanding the pathophysiology in the respective neuronal sub-circuitry. In addition, developing an in vitro dissociated co-culture model offers the possibility of studying the system without influence from other neuronal sub-populations. Here we demonstrate a dual compartment system coupled to microelectrode arrays (MEAs) for co-culturing and recording spontaneous activities from neuronal sub-populations. Propagation of electrical activities between cortical and thalamic regions and their interdependence in connectivity is verified by means of a cross-correlation algorithm. We found that burst events originate in the cortical region and drive the entire cortical-thalamic network bursting behavior while mutually weak thalamic connections play a relevant role in sustaining longer burst events in cortical cells. To support these experimental findings, a neuronal network model was developed and used to investigate the interplay between network dynamics and connectivity in the cortical-thalamic system.

  15. Managing the Cooperative Network.

    Science.gov (United States)

    Segal, JoAn S.

    1983-01-01

    Discussion of the management of not-for-profit corporations which provide computerized library networks highlights marketing, nonprofit constraints, multiple goals, consumer demands, professional commitment, external influences, motivation and control, dependence on charisma, management and altruism, hybrid organizations, and rational management.…

  16. The Computerized Table Setting Test for Detecting Unilateral Neglect.

    Science.gov (United States)

    Chung, Seok Jong; Park, Eunjeong; Ye, Byoung Seok; Lee, Hye Sun; Chang, Hyuk-Jae; Song, Dongbeom; Kim, Young Dae; Heo, Ji Hoe; Nam, Hyo Suk

    2016-01-01

    Patients with unilateral neglect fail to respond normally to stimuli on the left side. To facilitate the evaluation of unilateral spatial neglect, we developed a new application that runs on a tablet device and investigated its feasibility in stroke patients. We made the computerized table setting test (CTST) to run on the tablet computer. Forty acute ischemic stroke patients (20 patients with right hemispheric infarction with neglect, 10 patients with right hemispheric infarction without neglect, and 10 patients with left hemispheric infarction) and 10 healthy controls were prospectively enrolled to validate the CTST. The test requires subjects to set a table by dragging 12 dishes located below the table on the tablet screen. The horizontal deviation of the 12 dishes from the midline of the table, the selection tendency measured by the sequence of the dish selection, and the elapsed time for table setting were calculated automatically. Parameters measured by the CTST were correlated with the results of conventional neglect tests. The horizontal deviation was significantly higher in patients with right hemispheric infarction with neglect compared with the other groups. The selection tendency and elapsed time also were significantly different in patients with right hemispheric infarction with neglect compared with the left hemispheric infarction and control groups, but were similar to those with right hemispheric infarction without neglect. The CTST is feasible to administer and comparable with conventional neglect tests. This new application may be useful for the initial diagnosis and follow-up of neglect patients.

  17. Computerized invasive measurement of time-dependent intraocular pressure

    Directory of Open Access Journals (Sweden)

    T.V.O. Campos

    2006-09-01

    Full Text Available Several methods have been described to measure intraocular pressure (IOP in clinical and research situations. However, the measurement of time varying IOP with high accuracy, mainly in situations that alter corneal properties, has not been reported until now. The present report describes a computerized system capable of recording the transitory variability of IOP, which is sufficiently sensitive to reliably measure ocular pulse peak-to-peak values. We also describe its characteristics and discuss its applicability to research and clinical studies. The device consists of a pressure transducer, a signal conditioning unit and an analog-to-digital converter coupled to a video acquisition board. A modified Cairns trabeculectomy was performed in 9 Oryctolagus cuniculus rabbits to obtain changes in IOP decay parameters and to evaluate the utility and sensitivity of the recording system. The device was effective for the study of kinetic parameters of IOP, such as decay pattern and ocular pulse waves due to cardiac and respiratory cycle rhythm. In addition, there was a significant increase of IOP versus time curve derivative when pre- and post-trabeculectomy recordings were compared. The present procedure excludes corneal thickness and error related to individual operator ability. Clinical complications due to saline infusion and pressure overload were not observed during biomicroscopic evaluation. Among the disadvantages of the procedure are the requirement of anesthesia and the use in acute recordings rather than chronic protocols. Finally, the method described may provide a reliable alternative for the study of ocular pressure dynamic alterations in man and may facilitate the investigation of the pathogenesis of glaucoma.

  18. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Device Status Data

    Science.gov (United States)

    2015-09-01

    Configuration 3 4.1 Status Codes 4 4.2 Request Time 5 4.3 Hydra BLOb Metadata 6 5. Data Processing 6 5.1 Hydra Data Processing Framework 6 5.1.1...statements on any database table or select the entire table at a user-specified interval. Hydra records its data in binary large object ( BLOb ...files.5 The data are organized into cuts inside the BLOb files. Typically each cut represents one poll on the network. 4. Hydra Configuration Hydra

  19. Self-organizing intelligent network of smart electrical heating devices as an alternative to traditional ways of heating

    Science.gov (United States)

    Zaslavsky, Aleksander M.; Tkachov, Viktor V.; Protsenko, Stanislav M.; Bublikov, Andrii V.; Suleimenov, Batyrbek; Orshubekov, Nurbek; Gromaszek, Konrad

    2017-08-01

    The paper considers the problem of automated decentralized distribution of the electric energy among unlimited-power electric heaters providing the given temperature distribution within the zones of monitored object heating in the context of maximum use of electric power which limiting level is time-dependent randomly. Principles of collective selforganization automata for solving the problem are analyzed. It has been shown that after all the automata make decision, equilibrium of Nash type is attained when unused power within the electric network is not more than a power of any non-energized electric heater.

  20. Computerized tomographic evaluation of cerebral cysticercosis

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Bo Young; Lee, Mi Sook; Jeon, Doo Sung; Kim, Hong Soo; Rhee, Hak Song [Precbyterian Medical Center, Chonju (Korea, Republic of)

    1988-08-15

    Cerebral cysticercosis, unfortunately frequent in Korea, is a parastic disease in which man serve as the intermediate host of taenia solium. The larvae have a predilection for the central nervous system and can cause a variety of neurologic symptoms. The authors reviewed 19 cases of surgically proven cerebral cysticercosis and following results were obtained. 1. The most frequent age distribution was 5th and 6th decade and male to female ratio was 14:5. 2. The most frevalent involving site was cerebral parenchyme and following by ventricles. 3. Clinical manifestations were symtom and sign of increased ICP, seizure and focal neurological dificit. 4. It was assumed that computerized tomography was the procedure of choice for the diagnosis of these parasitic brain disease.

  1. Computerization of a telescope at secondary education

    Science.gov (United States)

    García Santiago, A.; Martos Jumillas, J.

    2017-03-01

    The work we are presenting in this paper is the computerization of a refractor telescope on an EQ3 type equatorial mount through Arduino. The control of the mount is done via three different interfaces: Stellarium, an Android interface for mobile phones and a second interface for PC made with Processing. The aforementioned work was done by the authors with a double purpose: presenting the interest in astronomy in the Mathematics department, and the development of applications within the subject of Technology in 4th ESO. So, it is a collaborative project between both departments. Except for the telescope and the mount, all the resources we have used can be found in any high school: free software (Guadalinex v9), App Inventor and Processing.The project was carried out under the principle of reducing all possible costs given the economic possibilities of the institution.

  2. A COMPUTERIZED OPERATOR SUPPORT SYSTEM PROTOTYPE

    Energy Technology Data Exchange (ETDEWEB)

    Thomas A. Ulrich; Roger Lew; Ronald L. Boring; Ken Thomas

    2015-03-01

    A computerized operator support system (COSS) is proposed for use in nuclear power plants to assist control room operators in addressing time-critical plant upsets. A COSS is a collection of technologies to assist operators in monitoring overall plant performance and making timely, informed decisions on appropriate control actions for the projected plant condition. A prototype COSS was developed in order to demonstrate the concept and provide a test bed for further research. The prototype is based on four underlying elements consisting of a digital alarm system, computer-based procedures, piping and instrumentation diagram system representations, and a recommender module for mitigation actions. The initial version of the prototype is now operational at the Idaho National Laboratory using the Human System Simulation Laboratory.

  3. Termination Criteria for Computerized Classification Testing

    Directory of Open Access Journals (Sweden)

    Nathan A. Thompson

    2011-02-01

    Full Text Available Computerized classification testing (CCT is an approach to designing tests with intelligent algorithms, similar to adaptive testing, but specifically designed for the purpose of classifying examinees into categories such as - pass- and - fail.- Like adaptive testing for point estimation of ability, the key component is the termination criterion, namely the algorithm that decides whether to classify the examinee and end the test or to continue and administer another item. This paper applies a newly suggested termination criterion, the generalized likelihood ratio (GLR, to CCT. It also explores the role of the indifference region in the specification of likelihood-ratio based termination criteria, comparing the GLR to the sequential probability ratio test. Results from simulation studies suggest that the GLR is always at least as efficient as existing methods.

  4. Economic Evaluation of Computerized Structural Analysis

    Science.gov (United States)

    Fortin, P. E.

    1985-01-01

    This completed effort involved a technical and economic study of the capabilities of computer programs in the area of structural analysis. The applicability of the programs to NASA projects and to other users was studied. The applications in other industries was explored including both research and development and applied areas. The costs of several alternative analysis programs were compared. A literature search covered applicable technical literature including journals, trade publications and books. In addition to the literature search, several commercial companies that have developed computerized structural analysis programs were contacted and their technical brochures reviewed. These programs include SDRC I-DEAS, MSC/NASTRAN, SCADA, SUPERSAP, NISA/DISPLAY, STAAD-III, MICAS, GTSTRUDL, and STARS. These programs were briefly reviewed as applicable to NASA projects.

  5. Multi-objective optimization framework to obtain model-based guidelines for tuning biological synthetic devices: an adaptive network case.

    Science.gov (United States)

    Boada, Yadira; Reynoso-Meza, Gilberto; Picó, Jesús; Vignoni, Alejandro

    2016-03-11

    Model based design plays a fundamental role in synthetic biology. Exploiting modularity, i.e. using biological parts and interconnecting them to build new and more complex biological circuits is one of the key issues. In this context, mathematical models have been used to generate predictions of the behavior of the designed device. Designers not only want the ability to predict the circuit behavior once all its components have been determined, but also to help on the design and selection of its biological parts, i.e. to provide guidelines for the experimental implementation. This is tantamount to obtaining proper values of the model parameters, for the circuit behavior results from the interplay between model structure and parameters tuning. However, determining crisp values for parameters of the involved parts is not a realistic approach. Uncertainty is ubiquitous to biology, and the characterization of biological parts is not exempt from it. Moreover, the desired dynamical behavior for the designed circuit usually results from a trade-off among several goals to be optimized. We propose the use of a multi-objective optimization tuning framework to get a model-based set of guidelines for the selection of the kinetic parameters required to build a biological device with desired behavior. The design criteria are encoded in the formulation of the objectives and optimization problem itself. As a result, on the one hand the designer obtains qualitative regions/intervals of values of the circuit parameters giving rise to the predefined circuit behavior; on the other hand, he obtains useful information for its guidance in the implementation process. These parameters are chosen so that they can effectively be tuned at the wet-lab, i.e. they are effective biological tuning knobs. To show the proposed approach, the methodology is applied to the design of a well known biological circuit: a genetic incoherent feed-forward circuit showing adaptive behavior. The proposed multi

  6. Optimization of a polymer composite employing molecular mechanic simulations and artificial neural networks for a novel intravaginal bioadhesive drug delivery device.

    Science.gov (United States)

    Ndesendo, Valence M K; Pillay, Viness; Choonara, Yahya E; du Toit, Lisa C; Kumar, Pradeep; Buchmann, Eckhart; Meyer, Leith C R; Khan, Riaz A

    2012-01-01

    This study aimed at elucidating an optimal synergistic polymer composite for achieving a desirable molecular bioadhesivity and Matrix Erosion of a bioactive-loaded Intravaginal Bioadhesive Polymeric Device (IBPD) employing Molecular Mechanic Simulations and Artificial Neural Networks (ANN). Fifteen lead caplet-shaped devices were formulated by direct compression with the model bioactives zidovudine and polystyrene sulfonate. The Matrix Erosion was analyzed in simulated vaginal fluid to assess the critical integrity. Blueprinting the molecular mechanics of bioadhesion between vaginal epithelial glycoprotein (EGP), mucin (MUC) and the IBPD were performed on HyperChem 8.0.8 software (MM+ and AMBER force fields) for the quantification and characterization of correlative molecular interactions during molecular bioadhesion. Results proved that the IBPD bioadhesivity was pivoted on the conformation, orientation, and poly(acrylic acid) (PAA) composition that interacted with EGP and MUC present on the vaginal epithelium due to heterogeneous surface residue distributions (free energy= -46.33 kcalmol(-1)). ANN sensitivity testing as a connectionist model enabled strategic polymer selection for developing an IBPD with an optimally prolonged Matrix Erosion and superior molecular bioadhesivity (ME = 1.21-7.68%; BHN = 2.687-4.981 N/mm(2)). Molecular modeling aptly supported the EGP-MUC-PAA molecular interaction at the vaginal epithelium confirming the role of PAA in bioadhesion of the IBPD once inserted into the posterior fornix of the vagina.

  7. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  8. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Luis Parrilla

    2018-01-01

    Full Text Available Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  9. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    Science.gov (United States)

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  10. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-06-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive com-munication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  11. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-01-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive communication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  12. The impact of an online social network with wireless monitoring devices on physical activity and weight loss.

    Science.gov (United States)

    Greene, Jessica; Sacks, Rebecca; Piniewski, Brigitte; Kil, David; Hahn, Jin S

    2013-07-01

    Online social networks (OSNs) are a new, promising approach for catalyzing health-related behavior change. To date, the empirical evidence on their impact has been limited. Using a randomized trial, we assessed the impact of a health-oriented OSN with accelerometer and scales on participant's physical activity, weight, and clinical indicators. A sample of 349 PeaceHealth Oregon employees and family members were randomized to the iWell OSN or a control group and followed for 6 months in 2010-2011. The iWell OSN enabled participants to connect with "friends," make public postings, view contacts' postings, set goals, download the number of their steps from an accelerometer and their weight from a scale, view trends in physical activity and weight, and compete against others in physical activity. Both control and intervention participants received traditional education material on diet and physical activity. Laboratory data on weight and clinical indicators (triglycerides, high-density lipoprotein, or low-density lipoprotein), and self-reported data on physical activity, were collected at baseline, 3 months, and 6 months. At 6 months, the intervention group increased leisure walking minutes by 164% compared with 47% in the control group. The intervention group also lost more weight than the controls (5.2 pounds compared with 1.5 pounds). There were no observed significant differences in vigorous exercise or clinical indicators between the 2 groups. Among intervention participants, greater OSN use, as measured by number of private messages sent, was associated with a greater increase in leisure walking and greater weight reduction over the study period. The study provides evidence that interventions using OSNs can successfully promote increases in physical activity and weight loss.

  13. A comparison of surgical outcomes and complications between hemostatic devices for thyroid surgery: a network meta-analysis.

    Science.gov (United States)

    Luo, Yingwei; Li, Xi; Dong, Jianwei; Sun, Weifeng

    2017-03-01

    This meta-analysis compared harmonic scalpel and LigaSure® systems with the conventional clamp-and-tie technique in thyroidectomy. Medline, Cochrane, EMBASE, and Google Scholar databases were searched until December 30, 2015. Randomized controlled studies (RCTs) or two-arm prospective studies were included. The primary outcome was operation time. The data were evaluated both by pair-wise meta-analyses and network meta-analysis within a Bayesian framework using Markov chain Monte Carlo methods. Compared with the conventional hemostasis, there was a significant reduction in operation time with harmonic scalpel (HS) and LigaSure (LS) (difference in means = -24.27 min, 95 % CI -28.11 to -20.44 min, P meta-analysis also found harmonic scalpel and LigaSure to have less operation time than the conventional hemostasis, and that harmonic scalpel was associated with a significant 9.78 min reduction in operation time than LigaSure which was not seen in pair-wise comparison. Harmonic scalpel had significantly less risk of definitive recurrent laryngeal nerve palsy, intra-operation blood loss, and post-operation bleeding than the conventional hemostasis. LigaSure was associated with significantly less intra-operative blood loss than the conventional hemostasis (P = 0.023). There was no significant difference among three different procedures in rates of transient recurrent laryngeal nerve palsy. This study found that harmonic scalpel and LigaSure decreased operation time compared with the conventional hemostasis and that harmonic scalpels was associated with the lowest operation time.

  14. Development of a computerized handbook of architectural plans

    NARCIS (Netherlands)

    Koutamanis, A.

    1990-01-01

    The dissertation investigates an approach to the development of visual / spatial computer representations for architectural purposes through the development of the computerized handbook of architectural plans (chap), a knowledge-based computer system capable of recognizing the metric properties of

  15. Survey of methods for improving operator acceptance of computerized aids

    Energy Technology Data Exchange (ETDEWEB)

    Frey, P. R.; Kisner, R. A.

    1982-04-01

    The success of current attempts to improve the operational performance and safety of nuclear power plants by installing computerized operational aids in the control rooms is dependent, in part, on the operator's attitude toward the aid. Utility experience with process computer systems indicates that problems may already exist with operator acceptance of computerized aids. The growth of the role that computers have in nuclear power plants makes user acceptance of computer technology an important issue for the nuclear industry. The purpose of this report is to draw from the literature factors related to user acceptance of computerized equipment that may also be applicable to the acceptance of computerized aids used in the nuclear power plant control room.

  16. Significance of computerized tomography and nasal cytology in the ...

    African Journals Online (AJOL)

    Significance of computerized tomography and nasal cytology in the diagnosis of rhinosinusitis among asthmatic children. Karima Abdel Khalik, Laila AG Hegazy, Hassan A Wahba, Laila A Abdurrahman, Sahar SA Zaki ...

  17. Computerized Point of Sale = Faster Service + Better Accountability.

    Science.gov (United States)

    Pannell, Dorothy V.

    1991-01-01

    Describes selecting and installing a computerized point of sale for a district food service program; the equipment needed and preferred; and the training of trainers, managers, and cashiers. Also discusses the direct benefits and side benefits of the system. (MLF)

  18. Radation distribution in head & thorax computerized tomography

    Directory of Open Access Journals (Sweden)

    Mohammad Mahdavi

    2014-05-01

    Full Text Available Background: Determination of the exposure levels in the computerized tomography (CT practices is necessary to define the respected national reference levels, quality control of CT centers and the risk assessment for radiation induced cancers. Material and Methods: On the basis of this necessity, the radiation exposure distribution due to common CT practices has been investigated at Razi Hospital CT center in Rasht using tissue-equivalent phantoms and the thermoluminescent dosimeters (TLD. The Head and Thorax phantoms were used with the standard dimensions incorporating holes at the center and edges for TLD placement. Dosimetry was carried out using LiF Mg, Cu, P small chips due to their relatively tissue equivalence, high sensitivity convenient annealing procedure and the non-complex glow curve. Results: Results showed that CTDI for Head is 52.85 mGy and for Body is 68.15mGy. CTDLW for Head is 13.67 mGy and for Body is 16.94mGy . Conclusion: In comparison with other radiographical procedures, patient absorbed doses in CT imaging are usually very high. Content of dose is increased by increase of mAs.

  19. Study on forefoot by computerized tomography

    Energy Technology Data Exchange (ETDEWEB)

    Machida, Eiichi (Nihon Univ., Tokyo. School of Medicine)

    1983-10-01

    Computerized tomography (CT) was used to study coronary sections of the forefoot in both normal and abnormal human feet. CT images of the transverse arches at the metatarsal head, middle and base of the shaft were classified into five patterns. In the pattern most commonly found in normal feet, the second metatarsus appeared elevated above the other metatarsal bones at all points, and there was a gradual and even reduction in elevation from the second to the fifth metatarsal. In cases of hallux valgus, however, a variety of deformities were noted in the arc of the second to fifth metatarsals, particularly at the head. The rotation of the first metatarsus and shift of the sesamoids were measured from CT images at the head of the first metatarsus. In hallux valgus, both the rotation and the sesamoid shift appeared to have a wider angle than in the case of normal feet. In normal feet, the differences between the rotation of the first metatarsus and shift of the sesamoids were relatively small, whereas in hallux valgus there was a much greater degree of variation. Furthermore, while normal feet the variation in rotation of the first metatarsus and sesamoid shift both tended to be either great or small, in hallux valgus a large degree of sesamoid shift was sometimes found in combination with a small degree of rotation of the first metatarsus.

  20. Computerized adaptive testing--ready for ambulatory monitoring?

    DEFF Research Database (Denmark)

    Rose, Matthias; Bjørner, Jakob; Fischer, Felix

    2012-01-01

    Computerized adaptive tests (CATs) have abundant theoretical advantages over established static instruments, which could improve ambulatory monitoring of patient-reported outcomes (PROs). However, an empirical demonstration of their practical benefits is warranted.......Computerized adaptive tests (CATs) have abundant theoretical advantages over established static instruments, which could improve ambulatory monitoring of patient-reported outcomes (PROs). However, an empirical demonstration of their practical benefits is warranted....

  1. Computer networks monitoring

    OpenAIRE

    Antončič , Polona

    2012-01-01

    The present thesis entitled Computer Networks Monitoring introduces the basics of computer networks, the aim and the computer data reclamation from networking devices, software for the system follow-up together with the case of monitoring a real network with tens of network devices. The networks represent an important part in the modern information technology and serve for the exchange of data and sources which makes their impeccability of crucial importance. Correct and efficient sys...

  2. Electronic devices and circuits

    CERN Document Server

    Pridham, Gordon John

    1972-01-01

    Electronic Devices and Circuits, Volume 3 provides a comprehensive account on electronic devices and circuits and includes introductory network theory and physics. The physics of semiconductor devices is described, along with field effect transistors, small-signal equivalent circuits of bipolar transistors, and integrated circuits. Linear and non-linear circuits as well as logic circuits are also considered. This volume is comprised of 12 chapters and begins with an analysis of the use of Laplace transforms for analysis of filter networks, followed by a discussion on the physical properties of

  3. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  4. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  5. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  6. Computerization of Hungarian reforestation manual with machine learning methods

    Science.gov (United States)

    Czimber, Kornél; Gálos, Borbála; Mátyás, Csaba; Bidló, András; Gribovszki, Zoltán

    2017-04-01

    Hungarian forests are highly sensitive to the changing climate, especially to the available precipitation amount. Over the past two decades several drought damages were observed for tree species which are in the lower xeric limit of their distribution. From year to year these affected forest stands become more difficult to reforest with the same native species because these are not able to adapt to the increasing probability of droughts. The climate related parameter set of the Hungarian forest stand database needs updates. Air humidity that was formerly used to define the forest climate zones is not measured anymore and its value based on climate model outputs is highly uncertain. The aim was to develop a novel computerized and objective method to describe the species-specific climate conditions that is essential for survival, growth and optimal production of the forest ecosystems. The method is expected to project the species spatial distribution until 2100 on the basis of regional climate model simulations. Until now, Hungarian forest managers have been using a carefully edited spreadsheet for reforestation purposes. Applying binding regulations this spreadsheet prescribes the stand-forming and admixed tree species and their expected growth rate for each forest site types. We are going to present a new machine learning based method to replace the former spreadsheet. We took into great consideration of various methods, such as maximum likelihood, Bayesian networks, Fuzzy logic. The method calculates distributions, setups classification, which can be validated and modified by experts if necessary. Projected climate change conditions makes necessary to include into this system an additional climate zone that does not exist in our region now, as well as new options for potential tree species. In addition to or instead of the existing ones, the influence of further limiting parameters (climatic extremes, soil water retention) are also investigated. Results will be

  7. A Computerized Test of Design Fluency.

    Directory of Open Access Journals (Sweden)

    David L Woods

    Full Text Available Tests of design fluency (DF assess a participant's ability to generate geometric patterns and are thought to measure executive functions involving the non-dominant frontal lobe. Here, we describe the properties of a rapidly administered computerized design-fluency (C-DF test that measures response times, and is automatically scored. In Experiment 1, we found that the number of unique patterns produced over 90 s by 180 control participants (ages 18 to 82 years correlated with age, education, and daily computer-use. Each line in the continuous 4-line patterns required approximately 1.0 s to draw. The rate of pattern production and the incidence of repeated patterns both increased over the 90 s test. Unique pattern z-scores (corrected for age and computer-use correlated with the results of other neuropsychological tests performed on the same day. Experiment 2 analyzed C-DF test-retest reliability in 55 participants in three test sessions at weekly intervals and found high z-score intraclass correlation coefficients (ICC = 0.79. Z-scores in the first session did not differ significantly from those of Experiment 1, but performance improved significantly over repeated tests. Experiment 3 investigated the performance of Experiment 2 participants when instructed to simulate malingering. Z-scores were significantly reduced and pattern repetitions increased, but there was considerable overlap with the performance of the control population. Experiment 4 examined performance in veteran patients tested more than one year after traumatic brain injury (TBI. Patients with mild TBI performed within the normal range, but patients with severe TBI showed reduced z-scores. The C-DF test reliably measures visuospatial pattern generation ability and reveals performance deficits in patients with severe TBI.

  8. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  9. Test and evaluation of computerized nuclear material accounting methods. Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-31

    In accordance with the definition of a Material Balance Area (MBA) as a well-defined geographical area involving an Integral operation, the building housing the BFS-1 and BFS-1 critical facilities is considered to consist of one MBA. The BFS materials are in the form of small disks clad in stainless steel and each disk with nuclear material has its own serial number. Fissile material disks in the BFS MBA can be located at three key monitoring points: BFS-1 facility, BFS-2 facility and main storage of BFS fissile materials (storage 1). When used in the BFS-1 or BFS-2 critical facilities, the fissile material disks are loaded in tubes (fuel rods) forming critical assembly cores. The following specific features of the BFS MBA should be taken into account for the purpose of computerized accounting of nuclear material: (1) very large number of nuclear material items (about 70,000 fissile material items); and (2) periodically very intensive shuffling of nuclear material items. Requirements for the computerized system are determined by basic objectives of nuclear material accounting: (1) providing accurate information on the identity and location of all items in the BFS material balance area; (2) providing accurate information on location and identity of tamper-indicating devices; (3) tracking nuclear material inventories; (4) issuing periodic reports; (5) assisting with the detection of material gains or losses; (6) providing a history of nuclear material transactions; (7) preventing unauthorized access to the system and data falsification. In August 1995, the prototype computerized accounting system was installed on the BFS facility for trial operation. Information on two nuclear material types was entered into the data base: weapon-grade plutonium metal and 36% enriched uranium dioxide. The total number of the weapon-grade plutonium disks is 12,690 and the total number of the uranium dioxide disks is 1,700.

  10. Screening of myopic photorefractive keratectomy in eye bank eyes by computerized videokeratography.

    Science.gov (United States)

    Lim-Bon-Siong, R; Williams, J M; Samapunphong, S; Chuck, R S; Pepose, J S

    1998-05-01

    In contrast to incisional keratotomy, corneas that have undergone photorefractive keratectomy may be difficult to detect by inspection with slitlamp biomicroscopy alone. Eye bank corneas that have undergone high myopic refractive surgical correction could potentially result in substantial postoperative hyperopic correction if used as donor tissue for corneal transplantation. Surface irregularities or displacement of the treated optical zone within the graft in relation to the entrance pupil of the recipient could result in significant induced astigmatism and distortion. This study examines computerized videokeratographic screening of eye bank globes as a strategy for detecting myopic photorefractive keratectomy. Preoperative and postoperative corneal topographic maps of freshly enucleated human and rabbit eyes that have undergone myopic photorefractive keratectomy with an excimer laser were placed in a globe-fixating device and analyzed using a vertically oriented videokeratoscope. The same system was applied in an actual eye bank setting, and potentially transplantable globes from donors without a history of corneal surgery were analyzed. Computerized videokeratography using a vertically mounted system reliably detected photorefractive keratectomy in 12 of 12 human eye bank corneas treated by excimer photorefractive keratectomy in a range between -1.5 to -6.0 diopters. This method also detected similar changes on lased rabbit corneas enucleated 6 weeks after excimer surgery. Data processed with the tangential mode yielded a "bull's-eye" topography pattern reflecting central corneal flattening that was more sensitive in detecting myopic corrections than the conventional axial formula-based color maps. False-positive results were not detected in 96 cadaver globes sequentially screened in the eye bank. Computerized videokeratography represents a feasible method to screen donor globes for myopic photorefractive keratectomy as shown by the in vitro and rabbit models

  11. Computerized videodefecography versus defecography: do we need radiographs?

    Directory of Open Access Journals (Sweden)

    Carlos Walter Sobrado

    Full Text Available CONTEXT AND OBJECTIVE: Defecography has been recognized as a valuable method for evaluating patients with evacuation disorders. It consists of the use of static radiography and fluoroscopy to record different situations within anorectal dynamics. Conventionally, rectal parameters are measured using radiograms. It is rare for fluoroscopy alone to be used. Computer software has been developed with the specific aim of calculating these measurements from digitized videotaped images obtained during fluoroscopy, without the need for radiographic film, thereby developing a computerized videodefecography method. The objective was thus to compare measurements obtained via computerized videodefecography with conventional measurements and to discuss the advantages of the new method. DESIGN AND SETTING: Prospective study at the radiology service of Hospital das Clínicas, Universidade de São Paulo. METHOD: Ten consecutive normal subjects underwent videodefecography. The anorectal angle, anorectal junction, puborectalis muscle length, anal canal length and degree of anal relaxation were obtained via the conventional method (using radiography film and via computerized videodefecography using the ANGDIST software. Measurement and analysis of these parameters was performed by two independent physicians. RESULTS: Statistical analysis confirmed that the measurements obtained through direct radiography film assessment and using digital image analysis (computerized videodefecography were equivalent. CONCLUSIONS: Computerized videodefecography is equivalent to the traditional defecography examination. It has the advantage of offering reduced radiation exposure through saving on the use of radiography.

  12. Computerized photogrammetry used to calculate the brow position index.

    Science.gov (United States)

    Naif-de-Andrade, Naif Thadeu; Hochman, Bernardo; Naif-de-Andrade, Camila Zirlis; Ferreira, Lydia Masako

    2012-10-01

    The orbital region is of vital importance to facial expression. Brow ptosis, besides having an impact on facial harmony, is a sign of aging. Various surgical techniques have been developed to increase the efficacy of brow-lift surgery. However, no consensus method exists for an objective measurement of the eyebrow position due to the curvature of the face. Therefore, this study aimed to establish a method for measuring the eyebrow position using computerized photogrammetry. For this study, 20 orbital regions of 10 volunteers were measured by direct anthropometry using a digital caliper and by indirect anthropometry (computerized photogrammetry) using standardized digital photographs. Lines, points, and distances were defined based on the position of the anthropometric landmarks endocanthion and exocanthion and then used to calculate the brow position index (BPI). Statistical analysis was performed using Student's t test with a significance level of 5 %. The BPI values obtained by computerized photogrammetric measurements did not differ significantly from those obtained by direct anthropometric measurements (p > 0.05). The mean BPI was 84.89 ± 10.30 for the computerized photogrammetric measurements and 85.27 ± 10.67 for the direct anthropometric measurements. The BPI defined in this study and obtained by computerized photogrammetry is a reproducible and efficient method for measuring the eyebrow position. This journal requires that authors assign a level of evidence to each article.

  13. Computerized tomographic evaluation of intracranial metastases

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Bo Yong; Lee, Mi Sook; Choi, Jin Ok; Jeon, Doo Sung; Kim, Hong Soo; Rhee, Hak Song [Presbyterian Medical Center, Chonju (Korea, Republic of)

    1986-12-15

    In a study of intracranial metastases, 46 cases having satisfactory clinical, operative and histological proofs were analyzed by computerized tomography at Presbyterian Medical Center from May, 1982 to February, 1986. The results were as follows: 1. The male to female ratio of intracranial metastases were 67:33. The 5th decade group (34.8%) was the most prevalent age group, followed by the 6th decade (21.7%) and 7th decade (21.7%). 2. The number of lesions was found be: single -25 cases (54.3%); multiple -21 cases (45.7%). 3. The source of intracranial metastases found to be: lung 15 cases (32.6%); unknown 12 cases (26.0%); chorioca 3 cases (6.5%); liver 3 cases (6.5%); stomach 2 cases (4.3%); parotid, breast, kidney, prostate, melanoma, rectal ca, rhabdomyosarcoma, nasal ca, lymphoma, testicular ca, cervix, each 1 case (2.2%). 4. The locations of the intracranial metastases were as follows: Cerebral hemisphere 37.7% in parietal region Cerebral hemisphere 15.9% in in frontal region Cerebral hemisphere 13.4% in occipital region Cerebral hemisphere 10.5% in temporal region Cerebellar hemisphere 3.2% Cerebellopontine angle 3.2% Intraventricular 4.8% Meninges 4.8% Skull vault 6.5% 5. Peritumor edema was found to be: Grade II-17 cases (37.0%): Grade III-14 cases (30.4%); Grade I-8 cases (17.4%); Grade 0-7 cases (15.2%) in that order. 6. The chief complaints of intracranial metastases on admission, were as follows: Headache 30 cases (65.2%); Vomiting 11 cases (23.9%); deteriorated mental state 10 cases (21.7%); Hemiplegia 7 cases (15.2%); visual disturbance 6 cases (13.0%); hemiparesis 4 cases (8.7%); seizure 4 cases (8.7%); other symptoms were less frequent. 7. On pre-contrast scan, hyperdense lesions were present in 18 cases (39.1%); hypodense lesions in 15 cases (32.6%); mixed density in 8 cases (17.4%); isodensity was present in 5 cases (10.9%). On post-contrast scan, ring enhancement was seen in 19 cases (41.3%); nodular enhancement in 17 cases (37%), mixed ring

  14. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off-the-shelf ha......Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off...

  15. Development of computerized dose planning system and applicator for high dose rate remote afterloading irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Choi, T. J. [Keimyung Univ., Taegu (Korea); Kim, S. W. [Fatima Hospital, Taegu (Korea); Kim, O. B.; Lee, H. J.; Won, C. H. [Keimyung Univ., Taegu (Korea); Yoon, S. M. [Dong-a Univ., Pusan (Korea)

    2000-04-01

    To design and fabricate of the high dose rate source and applicators which are tandem, ovoids and colpostat for OB/Gyn brachytherapy includes the computerized dose planning system. Designed the high dose rate Ir-192 source with nuclide atomic power irradiation and investigated the dose characteristics of fabricated brachysource. We performed the effect of self-absorption and determining the gamma constant and output factor and determined the apparent activity of designed source. he automated computer planning system provided the 2D distribution and 3D includes analysis programs. Created the high dose rate source Ir-192, 10 Ci(370GBq). The effective attenuation factor from the self-absorption and source wall was examined to 0.55 of the activity of bare source and this factor is useful for determination of the apparent activity and gamma constant 4.69 Rcm{sup 2}/mCi-hr. Fabricated the colpostat was investigated the dose distributions of frontal, axial and sagittal plane in intra-cavitary radiation therapy for cervical cancer. The reduce dose at bladder and rectum area was found about 20 % of original dose. The computerized brachytherapy planning system provides the 2-dimensional isodose and 3-D include the dose-volume histogram(DVH) with graphic-user-interface mode. emoted afterloading device was built for experiment of created Ir-192 source with film dosimetry within {+-}1 mm discrepancy. 34 refs., 25 figs., 11 tabs. (Author)

  16. Pain Perception: Computerized versus Traditional Local Anesthesia in Pediatric Patients.

    Science.gov (United States)

    Mittal, M; Kumar, A; Srivastava, D; Sharma, P; Sharma, S

    2015-01-01

    Local anesthetic injection is one of the most anxiety- provoking procedure for both children and adult patients in dentistry. A computerized system for slow delivery of local anesthetic has been developed as a possible solution to reduce the pain related to the local anesthetic injection. The present study was conducted to evaluate and compare pain perception rates in pediatric patients with computerized system and traditional methods, both objectively and subjectively. It was a randomized controlled study in one hundred children aged 8-12 years in healthy physical and mental state, assessed as being cooperative, requiring extraction of maxillary primary molars. Children were divided into two groups by random sampling - Group A received buccal and palatal infiltration injection using Wand, while Group B received buccal and palatal infiltration using traditional syringe. Visual Analog scale (VAS) was used for subjective evaluation of pain perception by patient. Sound, Eye, Motor (SEM) scale was used as an objective method where sound, eye and motor reactions of patient were observed and heart rate measurement using pulse oximeter was used as the physiological parameter for objective evaluation. Patients experienced significantly less pain of injection with the computerized method during palatal infiltration, while less pain was not statistically significant during buccal infiltration. Heart rate increased during both buccal and palatal infiltration in traditional and computerized local anesthesia, but difference between traditional and computerized method was not statistically significant. It was concluded that pain perception was significantly more during traditional palatal infiltration injection as compared to computerized palatal infiltration, while there was no difference in pain perception during buccal infiltration in both the groups.

  17. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  18. Kommunikation von Risiken und Unsicherheiten der Strahlung kabelloser Netzwerke : Ergebnisse eines Gruppendelphis zur Risikokommunikation im Rahmen des EU Projektes "Sound exposure and risk assessment of wireless network devices" (SEAWIND)

    OpenAIRE

    Hilpert, Jörg; Kuhn, Rainer; Schetula, Viola; RENN Ortwin

    2013-01-01

    In dem dreijährigen EU-Projekt "Sound Exposure and Risk Assessment of Wireless Network Devices" (SEAWIND) (FP71ENV1200911) wurden die möglichen gesundheitsschädigenden Auswirkungen durch die Nutzung drahtloser Kommunikationstechnologien (z.B. GSM, UMTS, LTE, WiFi, WiMAX, RFID) - interdisziplinär erforscht. Das Projekt gliederte sich in drei Themenschwerpunkte: Mit Hilfe modernster Technologien und Messverfahren sollte die Strahlenexposition ermittelt werden (Kurzzeit- sowie Langzeitexpositio...

  19. A computerized business simulation for dental practice management.

    Science.gov (United States)

    Willis, D O; Smith, J R; Golden, P

    1997-10-01

    Computerized simulations have been used for many years for teaching principles of management in business schools. This paper describes the development of a computerized business simulation for use in dental school practice management courses. The simulation is in a competitive game format. It requires students to formulate strategies and to implement management decisions that reinforce and fulfill that strategy. Participants use the outcomes of these decisions to formulate new management decisions for the upcoming period. Student response to participation in the simulation has been positive, with students indicating that participation is valuable for developing better understanding of analytical business management techniques and interpersonal techniques such as group process and leadership skills.

  20. Design and use of a computerized test generating program

    Science.gov (United States)

    Schaefer, Edward; Marschall, Laurence A.

    1980-07-01

    An easy-to-use set of programs for the computerized generation of multiple-choice and essay examinations in an introductory astronomy course is described. The programs allow the user to establish files of test questions and to rapidly assemble printed copies of examinations suitable for photocopying. Written in ALGOL for a Burroughs B6700 computer, the programs can, in principle, be implemented on large mainframe computers or on microcomputers of a size increasingly available to physics departments. The advantages and costs of computerized test generation are discussed.

  1. Computerization of a Nursing Chart According to the Nursing Process.

    Science.gov (United States)

    Schachner, María B; González, Zulma A; Sommer, Janine A; Recondo, Francisco J; Gassino, Fernando D; Luna, Daniel R; Benítez, Sonia E

    2016-01-01

    The benefits associated with the computerization of clinical records are known since a long time ago. Documentation evolution from paper to electronic format aims to always improve communication, reduce errors and facilitate continuity of care. Ideally when improvements to nursing records are contemplated, they should consider the nurses needs, new functionality workflow impacts and correspondence with representation models of standardized data that are specific to their domains practices. The aim of this study was to describe the development and implementation of computerized nursing record at Hospital Italiano de Buenos Aires.

  2. Some aspects of evaluation of image quality in computerized tomography; Alguns aspectos da avaliacao da qualidade da imagem em tomografia computadorizada

    Energy Technology Data Exchange (ETDEWEB)

    Travassos, Paulo Cesar Baptista; Peixoto, Jose Guilherme; Almeida, Carlos Eduardo Veloso de, E-mail: pctravassos@gmail.com [Instituto de Radioprotecao e Dosimetria (IRD/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Campos, Luciana Tourinho; Magalhaes, Luis Alexandre [Universidade do Estado do Rio de Janeiro (UERJ), Rio de Janeiro, RJ (Brazil)

    2016-07-01

    The evaluation of CT scanners image quality includes measuring the Hounsfield values, HU, using a table with the limit values. This table does not consider that different devices have different effective energies, which may cause some false results. The evaluation of 90 computerized tomography, by the American College Radiology methodology, showed that some failed devices in the evaluation showed excellent linear fit between the values of the linear attenuation coefficients calculated for the actual energy used, according to the HU values. The analysis of the coefficient of determination suggests that 10 of these devices could have been approved. (author)

  3. Computerized Workstation for Tsunami Hazard Monitoring

    Science.gov (United States)

    Lavrentiev-Jr, Mikhail; Marchuk, Andrey; Romanenko, Alexey; Simonov, Konstantin; Titov, Vasiliy

    2010-05-01

    We present general structure and functionality of the proposed Computerized Workstation for Tsunami Hazard Monitoring (CWTHM). The tool allows interactive monitoring of hazard, tsunami risk assessment, and mitigation - at all stages, from the period of strong tsunamigenic earthquake preparation to inundation of the defended coastal areas. CWTHM is a software-hardware complex with a set of software applications, optimized to achieve best performance on hardware platforms in use. The complex is calibrated for selected tsunami source zone(s) and coastal zone(s) to be defended. The number of zones (both source and coastal) is determined, or restricted, by available hardware resources. The presented complex performs monitoring of selected tsunami source zone via the Internet. The authors developed original algorithms, which enable detection of the preparation zone of the strong underwater earthquake automatically. For the so-determined zone the event time, magnitude and spatial location of tsunami source are evaluated by means of energy of the seismic precursors (foreshocks) analysis. All the above parameters are updated after each foreshock. Once preparing event is detected, several scenarios are forecasted for wave amplitude parameters as well as the inundation zone. Estimations include the lowest and the highest wave amplitudes and the least and the most inundation zone. In addition to that, the most probable case is calculated. In case of multiple defended coastal zones, forecasts and estimates can be done in parallel. Each time the simulated model wave reaches deep ocean buoys or tidal gauge, expected values of wave parameters and inundation zones are updated with historical events information and pre-calculated scenarios. The Method of Splitting Tsunami (MOST) software package is used for mathematical simulation. The authors suggest code acceleration for deep water wave propagation. As a result, performance is 15 times faster compared to MOST, original version

  4. Communications for Wearable Devices

    OpenAIRE

    Tabibu, Shivram

    2017-01-01

    Wearable devices are transforming computing and the human-computer interaction and they are a primary means for motion recognition of reflexive systems. We review basic wearable deployments and their open wireless communications. An algorithm that uses accelerometer data to provide a control and communication signal is described. Challenges in the further deployment of wearable device in the field of body area network and biometric verification are discussed.

  5. Medical devices early assessment methods : Systematic literature review

    NARCIS (Netherlands)

    Markiewicz, Katarzyna; Van Til, Janine A.; Ijzerman, Maarten J.

    2014-01-01

    Objectives: The aim of this study was to get an overview of current theory and practice in early assessments of medical devices, and to identify aims and uses of early assessment methods used in practice. Methods: A systematic literature review was conducted in September 2013, using computerized

  6. Computerized strain-gauge plethysmography - An alternative method for the detection of lower limb deep venous thrombosis?

    Energy Technology Data Exchange (ETDEWEB)

    Elford, Julian; Wells, Irving; Cowie, Jim; Hurlock, Carol; Sanders, Hilary

    2000-01-01

    AIM: To test the ability of computerized strain-gauge plethysmography to act as a screening test for lower limb deep venous thrombosis (DVT). MATERIALS AND METHODS: Over an 8-month period, all patients referred to our Medical Assessment Unit with suspected lower limb DVT were considered for inclusion in the study. Each patient underwent both plethysmography and ascending venography within 24 h, and the presence or absence of thrombus in the popliteal, superficial femoral or iliac veins was noted. The results of the two tests were then used to determine the accuracy of computerized strain-gauge plethysmography in detecting above knee DVT. RESULTS: The screening tests and venograms of 239 patients referred with clinically suspected lower limb DVT were compared. The false negative rate of plethysmography was 15.4%, which is significantly different from the 4.8% claimed by the manufacturers of this device (P = 0.00003). CONCLUSIONS: In a population of acute admissions with suspected lower limb DVT, computerized strain-gauge plethysmography is not suitable for use as a screening test due to an unacceptably high proportion of false negative screens. J. Elford (2000)

  7. Computerized CAMAC and NIM module library

    Energy Technology Data Exchange (ETDEWEB)

    Pope, G.F.; McDonald, R.J.

    1990-08-01

    The Lawrence Berkeley Laboratory owns a large number of CAMAC and NIM modules which can be connected together to form data acquisition systems used in experiments. Many of these modules are contained in pools'' for common usage. This paper describes a system of storage and inventory control that allows easy check-out and check-in of the modules utilizing networked Macintosh computers, FoxBase+/Mac software, and bar-code technology. It also provides search capability for the user and tracking capability for the pool administrator. This inventory system has applications to any pool of items that are routinely loaned. 8 figs.

  8. Computerized Tomography Technique for the Investigation of the Maxillary First Molar Mesiobuccal Root

    Directory of Open Access Journals (Sweden)

    Stefano Corbella

    2013-01-01

    Full Text Available The aim of this paper was to review the literature about the use of computerized tomography to evaluate the presence and characteristics of the second mesiobuccal canal in the maxillary first molar. An electronic search was performed. Frequencies of the presence of second mesiobuccal canal and root anatomy characteristics were extracted from the selected studies. Pooled frequencies were calculated as weighted means. Seven articles were included. A second mesiobuccal canal was present in 59.32% of the teeth, and it was noncommunicating in 58.45% of teeth presenting the canal itself. The most common root canal morphology was single canal or two separated canals. The present paper showed that cone beam CT is a viable radiologic device for the evaluation of the mesiobuccal root of maxillary first molars. In fact, it was observed that the frequency of second mesiobuccal canal detection is similar to those presented by clinical studies or micro-CT evaluations.

  9. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  10. Fundamentals of semiconductor devices

    CERN Document Server

    Lindmayer, Joseph

    1965-01-01

    Semiconductor properties ; semiconductor junctions or diodes ; transistor fundamentals ; inhomogeneous impurity distributions, drift or graded-base transistors ; high-frequency properties of transistors ; band structure of semiconductors ; high current densities and mechanisms of carrier transport ; transistor transient response and recombination processes ; surfaces, field-effect transistors, and composite junctions ; additional semiconductor characteristics ; additional semiconductor devices and microcircuits ; more metal, insulator, and semiconductor combinations for devices ; four-pole parameters and configuration rotation ; four-poles of combined networks and devices ; equivalent circuits ; the error function and its properties ; Fermi-Dirac statistics ; useful physical constants.

  11. [Ergonomics in computerized workplace--an ophthalmological view].

    Science.gov (United States)

    Mrugacz, Małgorzata; Szumiński, Michał

    2009-01-01

    Ergonomics in computerized workplace contributes to create special environmental conditions depending on people's needs and possibilities. Ergonomically created room with accurate type of lighting, temperature and humidity, furniture and location of PC unit and monitor is essential to avoid symptoms of computer stress syndrome.

  12. Physicians' responses to computerized drug interaction alerts with password overrides.

    Science.gov (United States)

    Nasuhara, Yasuyuki; Sakushima, Ken; Endoh, Akira; Umeki, Reona; Oki, Hiromitsu; Yamada, Takehiro; Iseki, Ken; Ishikawa, Makoto

    2015-08-28

    Although evidence has suggested that computerized drug-drug interaction alert systems may reduce the occurrence of drug-drug interactions, the numerous reminders and alerts generated by such systems could represent an excessive burden for clinicians, resulting in a high override rate of not only unimportant, but also important alerts. We analyzed physicians' responses to alerts of relative contraindications and contraindications for coadministration in a computerized drug-drug interaction alert system at Hokkaido University Hospital. In this system, the physician must enter a password to override an alert and continue an order. All of the drug-drug interaction alerts generated between December 2011 and November 2012 at Hokkaido University Hospital were included in this study. The system generated a total of 170 alerts of relative contraindications and contraindication for coadministration; 59 (34.7 %) of the corresponding orders were cancelled after the alert was accepted, and 111 (65.3 %) were overridden. The most frequent contraindication alert was for the combination of 3-hydroxy-3-methylglutaryl-coenzyme A reductase inhibitors and fibrates. No incidents involving drug-drug interactions were reported among patients who were prescribed contraindicated drug pairs after an override. Although computerized drug-drug interaction alert systems that require password overrides appear useful for promoting medication safety, having to enter passwords to override alerts may represent an excessive burden for the prescribing physician. Therefore, both patient safety and physicians' workloads should be taken into consideration in future designs of computerized drug-drug interaction alert systems.

  13. Discovering Visual Scanning Patterns in a Computerized Cancellation Test

    Science.gov (United States)

    Huang, Ho-Chuan; Wang, Tsui-Ying

    2013-01-01

    The purpose of this study was to develop an attention sequential mining mechanism for investigating the sequential patterns of children's visual scanning process in a computerized cancellation test. Participants had to locate and cancel the target amongst other non-targets in a structured form, and a random form with Chinese stimuli. Twenty-three…

  14. Wilderness Management... A Computerized System for Summarizing Permit Information

    Science.gov (United States)

    Gary H. Elsner

    1972-01-01

    Permits were first needed for visits to wilderness areas in California during summer 1971. A computerized system for analyzing these permits and summarizing information from them has been developed. It produces four types of summary tables: point-of-origin of visitors; daily variation in total number of persons present; variations in group size; and variations in...

  15. The Design Of Computerized Database Of Scientific Reports Of ...

    African Journals Online (AJOL)

    ... journal articles, seminar papers, conference proceedings etc. The analysis revealed the shortcomings of the manual system and the alternative system design, that is, computerized database was developed to address these problems. Visual Basic 6.0 and Microsoft Access 2000 were the software packages used for the ...

  16. 381 Developing of a Computerized Brain Diagnosing System for ...

    African Journals Online (AJOL)

    User

    computerized brain diagnosing system that would be used in carrying out the daily diagnosing activity in the clinic .... Stand-alone Units are being used to monitor and control operations in factories and office buildings. .... he understood in terms of the numeric manipulations involved in expected value computations, which is ...

  17. Computerized Adaptive Testing System Design: Preliminary Design Considerations.

    Science.gov (United States)

    Croll, Paul R.

    A functional design model for a computerized adaptive testing (CAT) system was developed and presented through a series of hierarchy plus input-process-output (HIPO) diagrams. System functions were translated into system structure: specifically, into 34 software components. Implementation of the design in a physical system was addressed through…

  18. Computerized Typesetting and Other New Applications in a Publishing House

    Science.gov (United States)

    Järvi, Timo

    The author was involved during years 1964-67 in a change process from manual typesetting to a computerized one. This paper describes the design and implementation of new graphical applications as well as the programming of IBM 1401. It also presents some reflections on the social affects of these changes.

  19. A Computerized Reference Library Using ZOG. Technical Report No. 7.

    Science.gov (United States)

    Gregg, Lee W.; Hannah, Joyce E.

    To assist researchers, practitioners, and students in locating journal articles, books, papers, and reports relevant to all aspects of document design, the Document Design Project staff at Carnegie-Mellon University (CMU) is designing and building a computerized reference library using the operating system ZOG. The library will include material…

  20. Duplicated laboratory tests: evaluation of a computerized alert intervention abstract.

    Science.gov (United States)

    Bridges, Sharon A; Papa, Linda; Norris, Anne E; Chase, Susan K

    2014-01-01

    Redundant testing contributes to reductions in healthcare system efficiency. The purpose of this study was to: (1) determine if the use of a computerized alert would reduce the number and cost of duplicated Acute Hepatitis Profile (AHP) laboratory tests and (2) assess what patient, test, and system factors were associated with duplication. This study used a quasi-experimental pre- and post-test design to determine the proportion of duplication of the AHP test before and after implementation of a computerized alert intervention. The AHP test was duplicated if the test was requested again within 15 days of the initial test being performed and the result present in the medical record. The intervention consisted of a computerized alert (pop-up window) that indicated to the clinician that the test had recently been ordered. A total of 674 AHP tests were performed in the pre-intervention period and 692 in the postintervention group. In the pre-intervention period, 53 (7.9%) were duplicated and in postintervention, 18 (2.6%) were duplicated (pimplementation of the alert was shown to significantly reduce associated costs of duplicated AHP tests (p≤.001). Implementation of computerized alerts may be useful in reducing duplicate laboratory tests and improving healthcare system efficiency. © 2012 National Association for Healthcare Quality.

  1. Attitudes towards Computerization in Canadian Universities. Technical Paper #4.

    Science.gov (United States)

    Misfeldt, Renee; Stahl, William A.

    This report summarizes the attitudinal portion of a nation-wide survey on the computerization of Canadian universities. Six different questionnaires, each of which contained the same questions on attitudes, were mailed to faculty, deans, admissions, officers, registrars, computer center directors, and other administrators at 63 Canadian…

  2. A Computerized System for Workplace Design for Visually Impaired Workers.

    Science.gov (United States)

    Chen, J-G; Hou, C-A

    1991-01-01

    VITAL (Vision Impaired Task and Assignment Lexicon) is an integrated computerized system that performs workplace design tasks for visually impaired workers. VITAL consists of three modules: ergonomics consultation, disability index, and work measurement. Evaluation indicated that VITAL could be used as a tool to help nonprofessional vocational…

  3. Computerized adaptive testing for measuring development of young children

    NARCIS (Netherlands)

    Jacobusse, G.; Buuren, S. van

    2007-01-01

    Developmental indicators that are used for routine measurement in The Netherlands are usually chosen to optimally identify delayed children. Measurements on the majority of children without problems are therefore quite imprecise. This study explores the use of computerized adaptive testing (CAT) to

  4. Multidimensional Computerized Adaptive Testing for Indonesia Junior High School Biology

    Science.gov (United States)

    Kuo, Bor-Chen; Daud, Muslem; Yang, Chih-Wei

    2015-01-01

    This paper describes a curriculum-based multidimensional computerized adaptive test that was developed for Indonesia junior high school Biology. In adherence to the Indonesian curriculum of different Biology dimensions, 300 items was constructed, and then tested to 2238 students. A multidimensional random coefficients multinomial logit model was…

  5. California Superfund sites: Insights from a computerized database

    Energy Technology Data Exchange (ETDEWEB)

    Layefsky, M.E.; Smith, D.F.; Mendell, M.J.; Schlag, R.D.; Neutra, R.R. (California Department of Health Services, Berkeley (USA))

    A computerized database of 93 California State Superfund waste sites was created to assess the feasibility of using such a system for a variety of public health purposes. Though available data were limited in many respects, analysis of the database proved useful in summarizing features of hazardous waste sites that could be of considerable public health interest.

  6. Computerized tomography and angiography - competing processes in liver diagnostics

    Energy Technology Data Exchange (ETDEWEB)

    Wunschik, F.; Luetgemeier, J.; Hoerst, M.

    1981-02-01

    In the diagnostics of liver diseases, computerized tomography is a valuable method. It is particularly superior to angiography in detecting cysts, parasitosis and abscesses. Angiography however is better for known solid tumours regarding differencial diagnosis. Both methods supplement each other in the tumour and bile ducts diagnostics.

  7. Changes in the Approaches of Teachers Following Computerization of Schools

    Science.gov (United States)

    Wasserman, Egoza; Millgram, Yitzchak

    2005-01-01

    This article examines the change in teachers' attitudes and instruction following computerization of their schools. Parameters chosen to assure the success of the study were: teachers' training courses, establishment of teachers' teams, teachers' expectations and willingness, and teachers' use of the computer in the school. The study took place in…

  8. Computerized adaptive testing in industrial and organizational psychology

    NARCIS (Netherlands)

    Makransky, Guido

    2012-01-01

    The overarching goal of this dissertation is to increase the precision and efficiency of the measurement tools that are used to make selection decisions in industrial/organizational psychology, by introducing psychometric innovations in the framework of computerized adaptive testing (CAT). Chapter 1

  9. Computerized Classification Testing and Its Relationship to the Testing Goal

    NARCIS (Netherlands)

    van Groen, Maaike; Eggen, Theodorus Johannes Hendrikus Maria; Veldkamp, Bernard P.

    2012-01-01

    Assessment can serve different goals. If the aim of testing is to classify respondents into one of multiple levels instead of obtaining a precise estimate of the respondent’s ability, computerized classification testing can be used. This type of testing requires algorithms for item selection and

  10. The lower esophageal sphincter shown by a computerized representation

    NARCIS (Netherlands)

    Bemelman, W. A.; van der Hulst, V. P.; Dijkhuis, T.; van der Hoeven, C. W.; Klopper, P. J.

    1990-01-01

    The clinical application of manometry of the lower esophageal sphincter (LES) remains controversial. This is because of the large variability in recorded lower esophageal sphincter pressure (LESP). In this paper a computerized method providing a three-dimensional image of the LES is described. In 12

  11. Who Can Afford a Computerized Bookstore? Almost Anyone.

    Science.gov (United States)

    Miller, Charles

    1982-01-01

    The decision to computerize operations in the DeAnza Community College bookstore was followed by a number of decisions about financing options (purchase, lease/purchase, lease, timesharing). A timesharing agreement was reached with a local bank, with no capital outlay and at a cost equivalent to an accountant's position. (MSE)

  12. Quality control of online calibration in computerized assessment

    NARCIS (Netherlands)

    Glas, Cornelis A.W.

    In computerized adaptive testing, updating item parameter estimates using adaptive testing data is often called online calibration. This study investigated how to evaluate whether the adaptive testing data used for online calibration sufficiently fit the item response model used. Three approaches

  13. 45 CFR 302.85 - Mandatory computerized support enforcement system.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Mandatory computerized support enforcement system. 302.85 Section 302.85 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT... “Automated Systems for Child Support Enforcement: A Guide for States.” This guide is available from the Child...

  14. Multistage Computerized Adaptive Testing with Uniform Item Exposure

    Science.gov (United States)

    Edwards, Michael C.; Flora, David B.; Thissen, David

    2012-01-01

    This article describes a computerized adaptive test (CAT) based on the uniform item exposure multi-form structure (uMFS). The uMFS is a specialization of the multi-form structure (MFS) idea described by Armstrong, Jones, Berliner, and Pashley (1998). In an MFS CAT, the examinee first responds to a small fixed block of items. The items comprising…

  15. Journal of EEA, Vol. 30, 2013 COMPUTERIZED FACILITIES ...

    African Journals Online (AJOL)

    dell

    Journal of EEA, Vol. 30, 2013. COMPUTERIZED FACILITIES LAYOUT DESIGN. Ameha Mulugeta, Birhanu Beshah and Daniel Kitaw. School of Mechanical and Industrial Engineering. Addis Ababa Institute of Technology, Addis Ababa University. ABSTRACT. Facilities are crucial as they usually represent the largest and the ...

  16. Online Calibration via Variable Length Computerized Adaptive Testing

    Science.gov (United States)

    Chang, Yuan-chin Ivan; Lu, Hung-Yi

    2010-01-01

    Item calibration is an essential issue in modern item response theory based psychological or educational testing. Due to the popularity of computerized adaptive testing, methods to efficiently calibrate new items have become more important than that in the time when paper and pencil test administration is the norm. There are many calibration…

  17. Computerized crime linkage systems: a critical review and research agenda

    NARCIS (Netherlands)

    Bennell, C.; Snook, B.; MacDonald, S.; House, J. C.; Taylor, Paul J

    2012-01-01

    Computerized crime linkage systems are meant to assist the police in determining whether crimes have been committed by the same offender. In this article, the authors assess these systems critically and identify four assumptions that affect the effectiveness of these systems. These assumptions are

  18. Flexible Exchange of Farming Device Data

    DEFF Research Database (Denmark)

    Iftikhar, Nadeem; Pedersen, Torben Bach

    2011-01-01

    A new trend in the farming business is to replace conventional farming devices with computerized farming devices. Accordingly, numerous computer-based farming devices for logging, processing and exchanging data have recently been installed on moving farm machinery such as tractors. The exchange...... of data generally takes place between the devices and farming systems, mostly installed at the premises of farmers, contractors, advisory services etc. In most cases, data exchange is based on farming data exchange standards and is bi-directional. Bi-directional data exchange allows different devices...... and systems to exchange data based on a predefined set of rules. In consequence, many hand-coded data exchange solutions have been developed in the farming business. Although efforts regarding incorporating data exchange standards have been made, their actual usage so far has been limited, due to the fact...

  19. A Randomized Controlled Trial of the "Cool Teens" CD-ROM Computerized Program for Adolescent Anxiety

    Science.gov (United States)

    Wuthrich, Viviana M.; Rapee, Ronald M.; Cunningham, Michael J.; Lyneham, Heidi J.; Hudson, Jennifer L.; Schniering, Carolyn A.

    2012-01-01

    Objective: Computerized cognitive behavioral interventions for anxiety disorders in adults have been shown to be efficacious, but limited data are available on the use of computerized interventions with young persons. Adolescents in particular are difficult to engage in treatment and may be especially suited to computerized technologies. This…

  20. Survey of medical examiner office computerization. From the National Association of Medical Examiners (N.A.M.E.).

    Science.gov (United States)

    Hanzlick, R

    1994-06-01

    Following a suggestion that the National Association of Medical Examiners (N.A.M.E.) develop a N.A.M.E. Information Center (NIC), N.A.M.E. conducted a survey to evaluate the current status of medical examiner office automation (computerization) in the United States. Responses were received from 80 unique reporting areas, including 75 medical examiner offices, which represent approximately 30% of the 258 medical examiner jurisdictions in the country. A total of 58 responders (65%) indicated that their office was automated. At least 38 states have one or more automated death investigation office, and electronic data exist for approximately 145,000 deaths per year, or approximately 30% of all deaths certified by medical examiners and coroners annually and approximately 6% of all deaths per year in the United States. Although computerized offices vary substantially in size and in their choice of hardware and software, a typical computerized medical examiner office (a) is in a single county with 1,000-6,000 death reports per year, (b) keeps electronic records on all cases reported, (c) uses an IBM or compatible personal computer (PC) or PC network with off-the-shelf software, (d) stores data on cause of death, manner of death, how injuries occur, and toxicology results, and (e) is interested in sharing its data. Considerable electronic death investigation data exist that can provide timely and valuable information for mortality and public health studies.

  1. Three-dimensional computerized mobilization of the cervical spine for the treatment of chronic neck pain: a pilot study.

    Science.gov (United States)

    River, Yaron; Aharony, Shelly; Bracha, Jillian; Levital, Tamir; Gerwin, Robert

    2014-07-01

    Manual therapies for chronic neck pain are imprecise, inconsistent, and brief due to therapist fatigue. A previous study showed that computerized mobilization of the cervical spine in the sagittal plane is a safe and potentially effective treatment of chronic neck pain. To investigate the safety and efficacy of computerized mobilization of the cervical spine in a three-dimensional space for the treatment of chronic neck pain. Pilot, open trial. Physical therapy outpatient department. Nine patients with chronic neck pain. A computerized cradle capable of three-dimensional neck mobilizations was used. Treatment sessions lasted 20 minutes, biweekly, for six weeks. Visual analog scale (VAS) for pain, cervical range of motion (CROM), neck disability index (NDI), joint position error (JPE), and muscle algometry. Comparing baseline at week one with week six (end of treatment), the VAS scores dropped by 2.9 points (P movement studied by the CROM showed a combined increase of 11% (P = 0.01). The NDI decreased significantly from 16 to 10 (P = 0.03), and the JPE decreased significantly from 3.7° to 1.9° (P = 0.047). There was no change in the pressure pain threshold in any muscle tested. There were no significant adverse effects. These preliminary results demonstrate that this novel, computerized, three-dimensional cervical mobilization device is probably safe. The data also suggest that this method is effective in alleviating neck pain and associated headache, and in increasing the CROM, although the sample size was small in this open trial. Wiley Periodicals, Inc.

  2. Insertion devices

    CERN Document Server

    Bahrdt, J

    2006-01-01

    The interaction of an insertion device with the electron beam in a storage ring is discussed. The radiation property including brightness, ux and polarization of an ideal and real planar and helical / elliptical device is described. The magnet design of planar, helical, quasiperiodic devices and of devices with a reduced on axis power density are resumed.

  3. Device for data-acquisition from transient signals: kinetic considerations

    OpenAIRE

    Sampedro, A. Sanchez; Vives, S. Sagrado; Calatayud, J. Martinez

    1990-01-01

    This paper reports on the evaluation and testing of a home-made device. Data-acquisition, treatment of transient signals and the hardware and software involved are discussed. Some practical aspects are developed in order to power the autonomy of procedures using the device. Kinetic and multi-signal calculations are considered in order to cover the actual tendencies in continuous-flow analysis. Somepractical advantages versus the use of classical chart recorders or commercial computerized-inst...

  4. Morphological analysis of the vestibular aqueduct by computerized tomography images

    Energy Technology Data Exchange (ETDEWEB)

    Marques, Sergio Ricardo [Morphology and Genetics Department, Sao Paulo Federal University-Paulista Medical School, Disciplina de Anatomia Descritiva e Topografica, Rua Botucatu, 740-Edificio Leitao da Cunha, CEP 04023-900, Vila Clementino, Sao Paulo (Brazil)]. E-mail: sergioanat.morf@epm.br; Smith, Ricardo Luiz [Morphology and Genetics Department, Sao Paulo Federal University-Paulista Medical School, Disciplina de Anatomia Descritiva e Topografica, Rua Botucatu, 740-Edificio Leitao da Cunha, CEP 04023-900, Vila Clementino, Sao Paulo (Brazil); Isotani, Sadao [Institute of Physics, University of Sao Paulo, Sao Paulo (Brazil); Alonso, Luis Garcia [Morphology and Genetics Department, Sao Paulo Federal University-Paulista Medical School, Disciplina de Anatomia Descritiva e Topografica, Rua Botucatu, 740-Edificio Leitao da Cunha, CEP 04023-900, Vila Clementino, Sao Paulo (Brazil); Anadao, Carlos Augusto [Otorhinolaryngology Department, Sao Paulo Federal University-Paulista Medical School, Sao Paulo (Brazil); Prates, Jose Carlos [Morphology and Genetics Department, Sao Paulo Federal University-Paulista Medical School, Disciplina de Anatomia Descritiva e Topografica, Rua Botucatu, 740-Edificio Leitao da Cunha, CEP 04023-900, Vila Clementino, Sao Paulo (Brazil); Lederman, Henrique Manoel [Image Diagnosis Department, Sao Paulo Federal University-Paulista Medical School, Sao Paulo (Brazil)

    2007-01-15

    Objective: In the last two decades, advances in the computerized tomography (CT) field revise the internal and medium ear evaluation. Therefore, the aim of this study is to analyze the morphology and morphometric aspects of the vestibular aqueduct on the basis of computerized tomography images (CTI). Material and method: Computerized tomography images of vestibular aqueducts were acquired from patients (n = 110) with an age range of 1-92 years. Thereafter, from the vestibular aqueducts images a morphometric analysis was performed. Through a computerized image processing system, the vestibular aqueduct measurements comprised of its area, external opening, length and the distance from the vestibular aqueduct to the internal acoustic meatus. Results: The morphology of the vestibular aqueduct may be funnel-shaped, filiform or tubular and the respective proportions were found to be at 44%, 33% and 22% in children and 21.7%, 53.3% and 25% in adults. The morphometric data showed to be of 4.86 mm{sup 2} of area, 2.24 mm of the external opening, 4.73 mm of length and 11.88 mm of the distance from the vestibular aqueduct to the internal acoustic meatus, in children, and in adults it was of 4.93 mm{sup 2}, 2.09 mm, 4.44 mm, and 11.35 mm, respectively. Conclusions: Computerized tomography showed that the vestibular aqueduct presents high morphological variability. The morphometric analysis showed that the differences found between groups of children and adults or between groups of both genders were not statistically significant.

  5. Device for inspection of the primary distribution networks (TM) via pulse injection; Dispositivo para inspecao de rede MT via injecao de pulso

    Energy Technology Data Exchange (ETDEWEB)

    Ortolani, Francesco; Calone, Roberto; Paulon, Pietro [Enel SpA, Roma(Italy); Leikermoser, Albert [ARS, Linz (Austria)

    2011-11-15

    This paper describes the performance, functions, and field experience with a portable instrument designed to monitor the condition of harmony, based on the pulse injection method, which still has the ability to estimate zero parameters sequence and the maximum current of ground fault, even in networks with isolated neutral. The equipment analyzes a wide range of network characteristics of clearing.

  6. Bedside computerization of the ICU, design issues: benefits of computerization versus ease of paper & pen.

    Science.gov (United States)

    Grewal, R; Arcus, J; Bowen, J; Fitzpatrick, K; Hammond, W E; Hickey, L; Stead, W W

    1991-01-01

    This paper describes the design considerations for the implementation of a bedside computer system in an intensive care environment. Specific issues discussed include application design, implementation problems, design revisions, and design solutions. Specific examples of the above issues include passive data acquisition from bedside devices and computer systems, automated nursing assessments, respiratory therapy assessments and integrated reports.

  7. Functional control of the renal transplant via sequential computerized tomography

    Energy Technology Data Exchange (ETDEWEB)

    Treugut, H.; Nyman, U.; Hildell, J.; Molde, A.

    1981-08-01

    The enhancement of cortex medulla and arteria iliaca can be visualized separately, evaluated densitometrically and represented graphically by means of sequential computerized tomography of the renal transplant following intravenous contrast medium bolus injection. Since this enhancement performance is mainly dependent on perfusion, it is possible to determine the perfusion value of individual measurement areas. For example, a cortical defective perfusion, as is known in rejection, becomes evident as a flattening-out of the initial rise of cortex enhancement and can be distinguished from the largely normal type of curve obtained in acute tubular necrosis (ATN). The angiographically known prolonged 'wash-out time' in rejection corresponds to a long-lasting corticomedullary density gradient. Despite restricted informative value because of the relatively small number of patients, it appears that sequential computerized tomography enables differentiation of postoperative anuria.

  8. Clinical nurse specialist leadership in computerized provider order entry design.

    Science.gov (United States)

    Roggow, Darla J; Solie, Carol J; Tracy, Mary Fran; Gjere, Niki

    2005-01-01

    The purpose of this clinical project was to design and implement a computerized provider order entry system. Well-designed clinical computer systems can advance best practice and quality decision making, leading to improvements in patient and organizational outcomes. An Orders Design Group composed of clinical nurse specialists (CNSs), staff nurses, and information management personnel was formed. CNSs used competencies in the system sphere to lead the integration of the needs of patients, nurses, and organizations into new technologies. CNSs facilitated implementation of a collaboratively designed interdisciplinary computerized order entry process. Evaluation of the design and implementation process demonstrated greater success with the order entry system under the leadership of CNSs than past initiatives where CNSs were not in leadership roles. CNS competencies in designing and implementing innovative system-level solutions are key to clinical information systems design.

  9. Computerized Tests. New practical and ethical challenges for Psychological Assessment

    Directory of Open Access Journals (Sweden)

    Gabriela Susana Lozzia

    2013-08-01

    Full Text Available The purpose of this study is to bring the readers in our field of knowledge closer to the new problems and solutions resulting from the application of computer systems to Psychological Assessment. Therefore, this work puts forward a suitable implementation of Computer-based and Internet-delivered Testing, includes a description of the new technologies that can be applied to Psychological Assessment: administration of traditional paper-and-pencil tests through computers, elaboration of automated reports, computerized adaptive tests, automated test construction and automatic generation of items, as well as the specific guidelines and regulations governing the development of each of these areas. This study provides an outline of the current issues connected with the appropriate use of Computerized Tests by way of conclusion and finally encourages psychologists to keep debating and reflecting on these topics.

  10. Photovoltaic device

    Science.gov (United States)

    Reese, Jason A.; Keenihan, James R.; Gaston, Ryan S.; Kauffmann, Keith L.; Langmaid, Joseph A.; Lopez, Leonardo C.; Maak, Kevin D.; Mills, Michael E.; Ramesh, Narayan; Teli, Samar R.

    2015-09-01

    The present invention is premised upon an improved photovoltaic device ("PV device"), more particularly to an improved photovoltaic device (10) with a multilayered photovoltaic cell assembly (100) and a body portion (200) joined at an interface region (410) and including an intermediate layer (500), at least one interconnecting structural member (1500), relieving feature (2500), unique component geometry, or any combination thereof.

  11. Photovoltaic device

    Energy Technology Data Exchange (ETDEWEB)

    Reese, Jason A; Keenihan, James R; Gaston, Ryan S; Kauffmann, Keith L; Langmaid, Joseph A; Lopez, Leonardo; Maak, Kevin D; Mills, Michael E; Ramesh, Narayan; Teli, Samar R

    2017-03-21

    The present invention is premised upon an improved photovoltaic device ("PV device"), more particularly to an improved photovoltaic device with a multilayered photovoltaic cell assembly and a body portion joined at an interface region and including an intermediate layer, at least one interconnecting structural member, relieving feature, unique component geometry, or any combination thereof.

  12. Concentration device

    DEFF Research Database (Denmark)

    2013-01-01

    A concentration device (2) for filter filtration concentration of particles (4) from a volume of a fluid (6). The concentration device (2) comprises a filter (8) configured to filter particles (4) of a predefined size in the volume of the fluid (6). The concentration device (2) comprises...

  13. Computerized adaptive testing in industrial and organizational psychology

    OpenAIRE

    Makransky, Guido

    2012-01-01

    The overarching goal of this dissertation is to increase the precision and efficiency of the measurement tools that are used to make selection decisions in industrial/organizational psychology, by introducing psychometric innovations in the framework of computerized adaptive testing (CAT). Chapter 1 presents a general introduction to CAT and item response theory (IRT). Chapter 2 illustrates an automatic online calibration design that can be used in adaptive testing. The method makes it more a...

  14. Intelligent milking systems : computerized dairy cows management and control systems

    OpenAIRE

    Munyoro, John

    2014-01-01

    The purpose of this thesis is to define an Intelligent Milking System as a modern technology and innovation in the dairy farming that allows farmers to use computerized machines to do diversified activities regarding their dairy cattle management and productions systems. This thesis will explain why Kenya should adopt the use of this milking system in its dairy sector. In addition, it will explore how this system works in a typical dairy farm and highlight important considerations that wi...

  15. Computerized tomography in the diagnosis and treatment of orbital cellulitis

    Energy Technology Data Exchange (ETDEWEB)

    Hirsch, M.; Lifshitz, T.

    1988-05-01

    Acute sinusitis remains the major cause of orbital cellulitis in children, despite the extensive use of antibiotics. Staging of orbital cellulitis on the basis of clinical signs is difficult but is easily achieved by computerized tomography. The CT findings in a series of 9 children with orbital cellulitis in different stages are reported. The information obtained by CT contributes to the selection of an adequate surgical approach, if a therapeutic trial with antibiotics fails.

  16. Information integrity and privacy for computerized medical patient records

    Energy Technology Data Exchange (ETDEWEB)

    Gallegos, J.; Hamilton, V.; Gaylor, T.; McCurley, K.; Meeks, T.

    1996-09-01

    Sandia National Laboratories and Oceania, Inc. entered into a Cooperative Research and Development Agreement (CRADA) in November 1993 to provide ``Information Integrity and Privacy for Computerized Medical Patient Records`` (CRADA No. SC93/01183). The main objective of the project was to develop information protection methods that are appropriate for databases of patient records in health information systems. This document describes the findings and alternative solutions that resulted from this CRADA.

  17. Computerization in Higher Medical Education of the USA and Ukraine

    Directory of Open Access Journals (Sweden)

    Lyubov Manyuk

    2016-05-01

    Full Text Available The article researches the development of computer-oriented learning and information and communication technologies implementation in the USA, describes the state of computerization and modernization at higher medical educational institutions of Ukraine, analyzes the experience of Danylo Halytsky Lviv National Medical University (DHLNMU, and the department of Latin and foreign languages in particular, in the sphere of new educational and Internet technologies usage for study. As the result of the study the first computerized programs used for the future physicians training have been characterized. It has been stated that for the first time computer technologies in higher medical education were used in the USA and served accessory learning function aimed at facilitating and improving pedagogical instruments and methods. Furthermore, the paper proves that information and communication technologies are commonly used as accessory learning tools by Ukrainian medical students. The process of computerization and ICTs implementation in the scope of higher medical education has been developing rapidly and has a big potential according to the results of the survey carried out at DHLNMU that are described in this paper.

  18. Computerized Posturographic Measurement in Elderly Women with Unilateral Knee Osteoarthritis

    Science.gov (United States)

    Lim, Kil-Byung

    2012-01-01

    Objective To identify the subtle change of postural control in elderly patients with unilateral knee osteoarthritis (OA) with computerized dynamic posturography. Method Twenty-two healthy women and twenty-six women with unilateral knee OA, aged 60 and over, were enrolled. The computerized posturographic measures included a weight bearing pattern during squatting and sit-to-stand, sway velocity of center of gravity (COG) during one leg standing, on-axis velocity and directional control of COG during rhythmic weight shift, rising index during sit-to-stand, end sway during tandem walk, and movement time during step up/over. Results It was shown that patients bore significantly less weight on the affected side during the 30° and 60° squat and sit-to-stand. Sway velocity of COG during one leg standing was greater whereas the on-axis velocity and directional control during the front/back rhythmic weight shift were significantly lower in the patient group. The rising index during sit-to-stand was significantly lower and movement time during step up/over with the affected side was significantly longer in patients. Conclusion This study demonstrated in detail a decline of postural balance by utilizing computerized posturography in elderly women with unilateral knee OA. They had less weight-bearing, more sway, and less ability of intentional postural control on the affected side. PMID:23185725

  19. Additional usage possibilities for the computerized Hess screen

    Science.gov (United States)

    Svede, Aiga; Dzenis, Janis

    2003-08-01

    The purpose of the study was to work out a method how to use the computerized Hess screen in proximal vergence measurements. Proximal vergence or vergence due to knowledge of nearness is one of four independent components making up the total vergence response. Proximal vergence is expressed as a ratio - proximal convergence/test distance (PC/T). The computerized Hess screen is usually used to detect and to measure an ocular misalignment in patients with paralytic strabismus in different directions of gaze. The computerized Hess screen can be used to assess PC/T ratio in different directions of gaze, providing the open-loop disparity vergence and accommodation systems and assuming that tonic vergence is stable. The fusional system loop is opned using red/green filter goggles, objects with different size and color, a completely darkened room, and vertical dissociation (using a prism). The accommodation system loop is opened using pinhole. The test was performed on 16 neurologically and binocularly normal subjects (14 women, 2 men; average 24 y., 20-38 y.) Average PC/T ratio in a primary position for the whole group was 2.8pd/D with a standard deviation +/-0.8 pd/D, which correlates with results in literature obtained by other methods.

  20. Resource management for device-to-device underlay communication

    CERN Document Server

    Song, Lingyang; Xu, Chen

    2013-01-01

    Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication.This

  1. A Novel Computerized Test for Detecting and Monitoring Visual Attentional Deficits and Delirium in the ICU.

    Science.gov (United States)

    Green, Cameron; Hendry, Kirsty; Wilson, Elizabeth S; Walsh, Timothy; Allerhand, Mike; MacLullich, Alasdair M J; Tieges, Zoë

    2017-07-01

    Delirium in the ICU is associated with poor outcomes but is under-detected. Here we evaluated performance of a novel, graded test for objectively detecting inattention in delirium, implemented on a custom-built computerized device (Edinburgh Delirium Test Box-ICU). A pilot study was conducted, followed by a prospective case-control study. Royal Infirmary of Edinburgh General ICU. A pilot study was conducted in an opportunistic sample of 20 patients. This was followed by a validation study in 30 selected patients with and without delirium (median age, 63 yr; range, 23-84) who were assessed with the Edinburgh Delirium Test Box-ICU on up to 5 separate days. Presence of delirium was assessed using the Confusion Assessment Method for the ICU. The Edinburgh Delirium Test Box-ICU involves a behavioral assessment and a computerized test of attention, requiring patients to count slowly presented lights. Thirty patients were assessed a total of 79 times (n = 31, 23, 15, 8, and 2 for subsequent assessments; 38% delirious). Edinburgh Delirium Test Box-ICU scores (range, 0-11) were lower for patients with delirium than those without at the first (median, 0 vs 9.5), second (median, 3.5 vs 9), and third (median, 0 vs 10.5) assessments (all p Delirium Test Box-ICU score less than or equal to 5 was 100% sensitive and 92% specific to delirium across assessments. Longitudinally, participants' Edinburgh Delirium Test Box-ICU performance was associated with delirium status. These findings suggest that the Edinburgh Delirium Test Box-ICU has diagnostic utility in detecting ICU delirium in patients with Richmond Agitation and Sedation Scale Score greater than -3. The Edinburgh Delirium Test Box-ICU has potential additional value in longitudinally tracking attentional deficits because it provides a range of scores and is sensitive to change.

  2. Penetration testing using mobile devices

    CSIR Research Space (South Africa)

    Shelembe, S

    2012-10-01

    Full Text Available Slide 3 Previous/traditional methods ? Host-based vulnerability scanning ? Network based vulnerability scanning ? Application scanning ? Web Application Assessment Proxy ? CSIR 2012 Slide 4 Previous/traditional methods ? Advantage: more... Mobile Device Mobile OS Pen-testing application ? How it works Current Android hacking applications: ? WiFi Analyzer ? SpoofApp ? FaceNiff ? Penetrate Pro ? Anti-Android Network Toolkit ? ConnectBot ? Network Discovery ? Wireless Tether...

  3. Reflecting on the ethical administration of computerized medical records

    Science.gov (United States)

    Collmann, Jeff R.

    1995-05-01

    This presentation examines the ethical issues raised by computerized image management and communication systems (IMAC), the ethical principals that should guide development of policies, procedures and practices for IMACS systems, and who should be involved in developing a hospital's approach to these issues. The ready access of computerized records creates special hazards of which hospitals must beware. Hospitals must maintain confidentiality of patient's records while making records available to authorized users as efficiently as possible. The general conditions of contemporary health care undermine protecting the confidentiality of patient record. Patients may not provide health care institutions with information about themselves under conditions of informed consent. The field of information science must design sophisticated systems of computer security that stratify access, create audit trails on data changes and system use, safeguard patient data from corruption, and protect the databases from outside invasion. Radiology professionals must both work with information science experts in their own hospitals to create institutional safeguards and include the adequacy of security measures as a criterion for evaluating PACS systems. New policies and procedures on maintaining computerized patient records must be developed that obligate all members of the health care staff, not just care givers. Patients must be informed about the existence of computerized medical records, the rules and practices that govern their dissemination and given the opportunity to give or withhold consent for their use. Departmental and hospital policies on confidentiality should be reviewed to determine if revisions are necessary to manage computer-based records. Well developed discussions of the ethical principles and administrative policies on confidentiality and informed consent and of the risks posed by computer-based patient records systems should be included in initial and continuing

  4. Computerized Respiratory Sounds: Novel Outcomes for Pulmonary Rehabilitation in COPD.

    Science.gov (United States)

    Jácome, Cristina; Marques, Alda

    2017-02-01

    Computerized respiratory sounds are a simple and noninvasive measure to assess lung function. Nevertheless, their potential to detect changes after pulmonary rehabilitation (PR) is unknown and needs clarification if respiratory acoustics are to be used in clinical practice. Thus, this study investigated the short- and mid-term effects of PR on computerized respiratory sounds in subjects with COPD. Forty-one subjects with COPD completed a 12-week PR program and a 3-month follow-up. Secondary outcome measures included dyspnea, self-reported sputum, FEV1, exercise tolerance, self-reported physical activity, health-related quality of life, and peripheral muscle strength. Computerized respiratory sounds, the primary outcomes, were recorded at right/left posterior chest using 2 stethoscopes. Air flow was recorded with a pneumotachograph. Normal respiratory sounds, crackles, and wheezes were analyzed with validated algorithms. There was a significant effect over time in all secondary outcomes, with the exception of FEV1 and of the impact domain of the St George Respiratory Questionnaire. Inspiratory and expiratory median frequencies of normal respiratory sounds in the 100-300 Hz band were significantly lower immediately (-2.3 Hz [95% CI -4 to -0.7] and -1.9 Hz [95% CI -3.3 to -0.5]) and at 3 months (-2.1 Hz [95% CI -3.6 to -0.7] and -2 Hz [95% CI -3.6 to -0.5]) post-PR. The mean number of expiratory crackles (-0.8, 95% CI -1.3 to -0.3) and inspiratory wheeze occupation rate (median 5.9 vs 0) were significantly lower immediately post-PR. Computerized respiratory sounds were sensitive to short- and mid-term effects of PR in subjects with COPD. These findings are encouraging for the clinical use of respiratory acoustics. Future research is needed to strengthen these findings and explore the potential of computerized respiratory sounds to assess the effectiveness of other clinical interventions in COPD. Copyright © 2017 by Daedalus Enterprises.

  5. Computerized Prediction of Risk for Developing Breast Cancer Based on Bilateral Mammographic Breast Tissue Asymmetry

    Science.gov (United States)

    Wang, Xingwei; Lederman, Dror; Tan, Jun; Wang, Xiao Hui; Zheng, Bin

    2011-01-01

    This study developed and assessed a computerized scheme to detect breast abnormalities and predict the risk of developing cancer based on bilateral mammographic tissue asymmetry. A digital mammography database of 100 randomly selected negative cases and 100 positive cases for having high-risk of developing breast cancer was established. Each case includes four images of craniocaudal (CC) and mediolateral oblique (MLO) views of the left and right breast. To detect bilateral mammographic tissue asymmetry, a pool of 20 computed features was assembled. A genetic algorithm was applied to select optimal features and build an artificial neural network based classifier to predict the likelihood of a test case being positive. The leave-one-case-out validation method was used to evaluate the classifier performance. Several approaches were investigated to improve the classification performance including extracting asymmetrical tissue features from either selected regions of interests or the entire segmented breast area depicted on bilateral images in one view, and the fusion of classification results from two views. The results showed that (1) using the features computed from the entire breast area, the classifier yielded the higher performance than using ROIs, and (2) using a weighted average fusion method, the classifier achieved the highest performance with the area under ROC curve of 0.781±0.023. At 90% specificity, the scheme detected 58.3% of high-risk cases in which cancers developed and verified 6 to 18 months later. The study demonstrated the feasibility of applying a computerized scheme to detect cases with high risk of developing breast cancer based on computer-detected bilateral mammographic tissue asymmetry. PMID:21482168

  6. 78 FR 17940 - Certain Computerized Orthopedic Surgical Devices, Software, Implants, and Components Thereof...

    Science.gov (United States)

    2013-03-25

    ... Worldwide of the United Kingdom and Stanmore Inc. of MA. ] Proposed respondents, other interested parties... United States economy, the production of like or directly competitive articles in the United States, or... obtained by accessing its Internet server at United States International Trade Commission (USITC) at USITC...

  7. Electronic devices and circuits

    CERN Document Server

    Pridham, Gordon John

    1968-01-01

    Electronic Devices and Circuits, Volume 1 deals with the design and applications of electronic devices and circuits such as passive components, diodes, triodes and transistors, rectification and power supplies, amplifying circuits, electronic instruments, and oscillators. These topics are supported with introductory network theory and physics. This volume is comprised of nine chapters and begins by explaining the operation of resistive, inductive, and capacitive elements in direct and alternating current circuits. The theory for some of the expressions quoted in later chapters is presented. Th

  8. Open Innovation in Practice: Goal Complementarity and Closed NPD Networks to Explain Differences in Innovation Performance for SMEs in the Medical Devices Sector

    NARCIS (Netherlands)

    Pullen, A.J.J.; de Weerd-Nederhof, Petronella C.; Groen, Arend J.; Fisscher, O.A.M.

    2012-01-01

    Cooperation with other organizations increases the innovation performance of organization, especially for small and medium-sized enterprises (SMEs) as they encounter liabilities of “smallness” (e.g., limited financial resources, and manpower). In the medical devices sector, collaboration with

  9. Stress and Anxiety in Children After the Use of Computerized Dental Anesthesia

    OpenAIRE

    Queiroz, Alexandra M.; Carvalho, Ariany B.; Censi, Laís L.; Cardoso, Carmen L.; Leite-Panissi, Christie R.; Silva, Raquel Assed Bezerra da; Carvalho, Fabricio Kitazono de; Nelson-Filho, Paulo; Silva, Lea Assed Bezerra da

    2015-01-01

    The aim of this study was to evaluate the transitory stress levels and the anxiety state in children submitted to conventional and computerized dental anesthesia. Twenty children (7 to 12 years) were randomly assigned to receive conventional and computerized dental anesthesia. To investigate the hypothesis that transitory stress could be lower after using computerized anesthesia compared to conventional anesthesia, cortisol levels in saliva were measured before and after each technique. Anxie...

  10. Computerized tools in psychology: cross cultural and genetically informative studies of memory

    OpenAIRE

    Ismatullina V.; Zakharov I.; Nikulchev E.; Malykh S.

    2016-01-01

    In this article we presented the computerized tools for psychological studies of memory. The importance of implementing computerized automated tools for psychological studies is discussed. It has been shown that this tools can be used both for cross-cultural and genetically informative studies. The validity of these tools for cross-cultural and genetically informative studies of memory can be seen as the first step to use automated computerized tools for big data collection in psychology.

  11. Computerized tools in psychology: cross cultural and genetically informative studies of memory

    Directory of Open Access Journals (Sweden)

    Ismatullina V.

    2016-01-01

    Full Text Available In this article we presented the computerized tools for psychological studies of memory. The importance of implementing computerized automated tools for psychological studies is discussed. It has been shown that this tools can be used both for cross-cultural and genetically informative studies. The validity of these tools for cross-cultural and genetically informative studies of memory can be seen as the first step to use automated computerized tools for big data collection in psychology.

  12. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  13. Facsimile Network System in RCP

    Science.gov (United States)

    Muramatsu, Kazuya

    Recruit Computer Print Corp. has compiled Weekly Housing Magazine by use of its own CTS (Computerized Type Setting) resulting in the real estate database as byproduct. Based on the database it has made the network linking with sponsors, real estate companies. It has transmitted lists for data cleaning directly from computer enabling to save manpower and reduce time in the compilation process. The author describes the objectives, details, functions and promise of the system.

  14. Design and evaluation of computerized operating procedures in nuclear power plants.

    Science.gov (United States)

    Hwang, Fei-Hui; Hwang, Sheue-Ling

    2003-01-15

    A small-scale virtual system has been developed in this study to enhance operators' understanding and operating performance. For this, a computerized graphical interface based on Dynamic Work Causality Equation (DWCE) has been designed to transform the operating procedure into a flowchart. Furthermore, the Programmable Logic Controller (PLC) was installed to connect the signboard (proposed system) with the computerized graphical interface. An experiment was conducted to verify the effect of computerized graphic interface, indicating that the computerized system significantly decreases learning time and improves operational performance.

  15. Computerized tailored physical activity reports. A randomized controlled trial.

    Science.gov (United States)

    Carroll, Jennifer K; Lewis, Beth A; Marcus, Bess H; Lehman, Erik B; Shaffer, Michele L; Sciamanna, Christopher N

    2010-08-01

    Computerized, tailored interventions have the potential to be a cost-effective means to assist a wide variety of individuals with behavior change. This study examined the effect of computerized tailored physical activity reports on primary care patients' physical activity at 6 months. Two-group randomized clinical trial with physicians as the unit of randomization. Patients were placed in the intervention (n=187) or control group (n=207) based on their physician's assignment. Primary care physicians (n=22) and their adult patients (n=394) from Philadelphia PA. The study and analyses were conducted from 2004 to 2010. The intervention group completed physical activity surveys at baseline, 1, 3, and 6 months. Based on their responses, participants received four feedback reports at each time point. The reports aimed to motivate participants to increase physical activity, personalized to participants' needs; they also included an activity prescription. The control group received identical procedures, except that they received general reports on preventive screening based on their responses to preventive screening questions. Minutes of physical activity measured by the 7-Day Physical Activity Recall interview at 6 months. Participants were 69% female, 59% African-American, and had diverse educational and income levels; the retention rate was 89.6%. After adjusting for baseline levels of activity and gender, there were no differences in physical activity at 6 months. The intervention group increased their total physical activity by a mean of 139 minutes; the control group had a mean increase of 109 minutes (p=0.45). Although physical activity increased within both groups, computerized tailored physical activity reports did not significantly increase physical activity between groups at 6 months among ethnically and socioeconomically diverse adults in primary care. 2010 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  16. COMPUTERIZED HEAT-TREATMENT IN A ZIMBABWEAN FACTORY

    Directory of Open Access Journals (Sweden)

    M. Collier

    2012-01-01

    Full Text Available In the context of Zimbabwe's current economic problems, parts of the manufacturing industry are turning their attention to the possibility of utilising local design talent in upgrading their manufacturing plants. This paper describes a project undertaken by the National University of Science and Technology to convert the heat-treatment process in a major manufacturing plant from semi -manual to a computerized one. The system comprises microcontroller connection to the furnaces and sensors, and communicates with a central computer on which software for a windowed user-interface is hosted. Experimental results for the system are presented, and a strategy for other companies in the same predicament is proposed.

  17. A new method for tibial torsion measurement by computerized tomography.

    Science.gov (United States)

    Madadi, Firooz; Madadi, Firoozeh; Maleki, Arash; Shamie, Arya Nick; Washington, Eleby Rudolph; Yazdanshenas, Hamed

    2016-03-01

    Computerized tomography (CT) is the gold standard technique for tibial torsion assessment. This study compared two methods of tibial torsion assessment and proposed a new method, which could be of value in cases of abnormal fibular changes. The CT-scanograms of 60 participants were assessed by using two different techniques, differed in determination of the distal tibial axis. The interobserver reliability was 0.861 and 0.863 in the first and second methods, respectively. The intraobserver reliability in both measurement methods was 0.868. We proposed a reliable method, independent of the fibular midpoint, in assessment of tibial torsion by CT.

  18. Nuclear Computerized Library for Assessing Reactor Reliability (NUCLARR)

    Energy Technology Data Exchange (ETDEWEB)

    Gilbert, B.G.; Richards, R.E.; Reece, W.J.; Gertman, D.I.

    1992-10-01

    This Reference Guide contains instructions on how to install and use Version 3.5 of the NRC-sponsored Nuclear Computerized Library for Assessing Reactor Reliability (NUCLARR). The NUCLARR data management system is contained in compressed files on the floppy diskettes that accompany this Reference Guide. NUCLARR is comprised of hardware component failure data (HCFD) and human error probability (HEP) data, both of which are available via a user-friendly, menu driven retrieval system. The data may be saved to a file in a format compatible with IRRAS 3.0 and commercially available statistical packages, or used to formulate log-plots and reports of data retrieval and aggregation findings.

  19. Concerto: A Framework for Computerized Adaptive Test Applications

    Directory of Open Access Journals (Sweden)

    Eren Can AYBEK

    2016-12-01

    Full Text Available In the studies of computerized adaptive tests (CAT, real life CAT applications are used besides of post-hoc simulations which held by real-data. The purpose of this study is to introduce Concerto, a CAT platform which provides practical framework for researchers, and demonstrate the installation of Concerto and run a sample CAT application. For this purpose; configuration of Concerto to Linux server, installation of server and necessary software, installation of Concerto and downloading, editing and running a sample CAT application have been demonstrated step-by-step.

  20. Portable computerized tester improves flight-line maintenance

    Science.gov (United States)

    Grinberg, Y.

    1985-11-01

    The present general purpose and portable Computerized Organizational Level Tester (COLT) for the flight-line maintenance of advanced weapons systems is in effect a fully functioning replica of contemporary automated test equipment architectures previously available only in laboratory test installations. The COLT's automated equipment architecture has been scaled down to a ruggedized, portable, suitcase-sized field tester for both analog and digital equipment. Tester software is designed to minimize programming effort, and possesses a real time executive kernel which transparently interfaces high level user commands with tester hardware. Automatic software-generation tools are incorporated.

  1. Computerized tomography used as a routine procedure at postmortem investigations

    DEFF Research Database (Denmark)

    Leth, Peter Mygind

    2009-01-01

    This is a prospective investigation of a consecutive series of 250 deceased individuals who were computerized tomography (CT)-scanned and autopsied. In 13% of patients, important findings at the CT-scanning were not found at the autopsy, and in 48% of patients, important autopsy findings were not...... and allows fractures and inner organs to be seen "in situ." CT provides documentation in digital form - easily stored - permits review by others and provides pictures that may be more suitable for presentation in court than autopsy photos....

  2. Technical innovation: Multidimensional computerized software enabled subtraction computed tomographic angiography.

    Science.gov (United States)

    Bhatia, Mona; Rosset, Antoine; Platon, Alexandra; Didier, Dominique; Becker, Christoph D; Poletti, Pierre-Alexandre

    2010-01-01

    Computed tomographic angiography (CTA) is a frequent noninvasive alternative to digital subtraction angiography. We previously reported the development of a new subtraction software to overcome limitations of adjacent bone and calcification in CT angiographic subtraction. Our aim was to further develop and improve this fast and automated computerized software, universally available for free use and compatible with most CT scanners, thus enabling better delineation of vascular structures, artifact reduction, and shorter reading times with potential clinical benefits. This computer-based free software will be available as an open source in the next release of OsiriX at the Web site http://www.osirix-viewer.com.

  3. Two-Phase Flow Regime Identification by Ultrasonic Computerized Tomography

    Directory of Open Access Journals (Sweden)

    Mohd Hafiz FAZALUL RAHIMAN

    2010-05-01

    Full Text Available This paper describes the development of ultrasonic computerized tomography for identifying the liquid and gas flow regimes. The work reported in this paper demonstrates image reconstruction techniques applied to an experimental vessel using non-invasive technique. The investigations were based on the transmission and the reception of ultrasonic sensors that were mounted circularly on the surface of an experimental vessel. The algorithms used to reconstruct the concentration profile for two-phase flow using fan-shaped beam scanning geometry were also presented.

  4. Securing Personal Network Clusters

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  5. QoE-Aware Device-to-Device Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Liang ZHOU

    2015-08-01

    Full Text Available Multimedia services over mobile device-to-device (D2D networks has recently received considerable attention. In this scenario, each device is equipped with a cellular communication interface, as well as a D2D interface over a shared medium. In this work, we study the performance properties of the mobile D2D communications in the framework of user satisfaction, and develop a fully distributed QoE-aware multimedia communication scheme (QAMCS. Specifically, we translate the opportunistic multimedia communications issue into a stochastic optimization problem, which opens up a new degree of performance to exploit. Moreover, QAMCS is designed for a heterogeneous and dynamic environment, in which user demand, device mobility, and transmission fashion may vary across different devices and applications. Importantly, QAMCS is able to maximize the user satisfaction and only needs each device to implement its own scheme individually in the absence of a central controller.

  6. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  7. Computerized quantitative evaluation of mammographic accreditation phantom images

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yongbum; Tsai, Du-Yih; Shinohara, Norimitsu [Department of Radiological Technology, School of Health Sciences, Niigata University, 2-746 Asahimachidori, Chuouku, Niigata 951-8518 (Japan); Department of Radiological Technology, Gifu Univesity of Medical Science, 1-795 Hiraga-aza-nagamine, Seki, Gifu 501-3892 (Japan)

    2010-12-15

    Purpose: The objective was to develop and investigate an automated scoring scheme of the American College of Radiology (ACR) mammographic accreditation phantom (RMI 156, Middleton, WI) images. Methods: The developed method consisted of background subtraction, determination of region of interest, classification of fiber and mass objects by Mahalanobis distance, detection of specks by template matching, and rule-based scoring. Fifty-one phantom images were collected from 51 facilities for this study (one facility provided one image). A medical physicist and two radiologic technologists also scored the images. The human and computerized scores were compared. Results: In terms of meeting the ACR's criteria, the accuracies of the developed method for computerized evaluation of fiber, mass, and speck were 90%, 80%, and 98%, respectively. Contingency table analysis revealed significant association between observer and computer scores for microcalcifications (p<5%) but not for masses and fibers. Conclusions: The developed method may achieve a stable assessment of visibility for test objects in mammographic accreditation phantom image in whether the phantom image meets the ACR's criteria in the evaluation test, although there is room left for improvement in the approach for fiber and mass objects.

  8. Computerized ultrasound differentiation of curly birch from silver birch

    Science.gov (United States)

    Salmi, Ari; Hintikka, Tuomas; Karppinen, Timo; Forsman, Pia; Hæggström, Edward

    2007-01-01

    We report on computerized differentiation of two birch types. Curly birch (CB, Betula pendula var. carelica Sok) commands a higher price than a normal silver birch (SB, Betula pendula Roth). Hence it is crucial to differentiate the two wood types when the trees are young. We studied the possibility to use ultrasound for such differentiation. A propagation velocity of 4MHz longitudinal tone bursts, transmitted through block samples of 20×20mm2 cross section, comprising of both CB and SB woods, was determined. The samples originating from southern Finland were sawed so that the sound propagation direction was longitudinal or radial with respect to the trunk. One sample set comprised of seven different sample thicknesses with a range of 2-12mm. From the time-of-flight measurements of the samples (19±1%weight humidity) the wave propagation velocity under laboratory conditions (50±5%RH, 23±1°C) was determined from a least-squares fit. The results indicate a significant difference (t-test p =0.032 and velocity difference of 24±8%) in longitudinal direction and a highly significant difference (t-test p =0.001 and velocity difference of 22±10%) in the radial direction between the two wood types. A blinded probability of detection test was conducted using 48 samples originating from two different trunks as well as from single trunks' curly and noncurly sections. The results indicate 93% probability of correct type classification using computerized clusterization.

  9. Findings of psychopathology and computerized tomography in neuropsychiatric diseases

    Energy Technology Data Exchange (ETDEWEB)

    Gross, G.; Huber, G.; Schuettler, R.

    1982-08-01

    1978-1980 we examined 451 patients of the Psychiatric University Clinic of Bonn by computerized tomography. From 260 patients with characterized diseases of the brain and brain damages, 78 patients had neuropsychiatric diseases of old age, i.e. cerebro-vascular processes (average age of 63.7 years) and 9 patients had primary degenerative processes of the brain (average age of 62.1 years). Patients with diseases of the cerebral vessels showed irreversible psychopathological syndromes in 87%. The rate of pathological findings in CT increases in relation to degree of severity of the chronic (irreversible) organic psychosyndromes from 76% in pseudoneurasthenics syndromes to 93% in patients with organic changes of personality and to 100% in patients with dementia. The ambiguity of the conception of the multi-infarct-dementia is discussed. Only 19% of the sample with irreversible psychopathological changes showed localized neurological deficits and infarctions in CT, but none of them more than one. In all patients with dementia a cortical atrophy was found. There is a significant positive correlation between cerebral atrophy in CT and irreversible organic psychosyndrome. These findings with computerized tomography demonstrate in accordance with earlier pneumoencephalographic findings that distinct types of irreversible psychosyndromes can be correlated to distinct types of cerebral atrophy. But these statistical correlations between the degree of the severity of the loss of psychic functions and the reduction of cerebral tissue are not necessarily valid for any single case.

  10. Fetal heart rate monitoring: from Doppler to computerized analysis.

    Science.gov (United States)

    Kwon, Ji Young; Park, In Yang

    2016-03-01

    The monitoring of fetal heart rate (FHR) status is an important method to check well-being of the baby during labor. Since the electronic FHR monitoring was introduced 40 years ago, it has been expected to be an innovative screening test to detect fetuses who are becoming hypoxic and who may benefit from cesarean delivery or operative vaginal delivery. However, several randomized controlled trials have failed to prove that electronic FHR monitoring had any benefit of reducing the perinatal mortality and morbidity. Also it is now clear that the FHR monitoring had high intra- and interobserver disagreements and increased the rate of cesarean delivery. Despite such limitations, the FHR monitoring is still one of the most important obstetric procedures in clinical practice, and the cardiotocogram is the most-used equipment. To supplement cardiotocogram, new methods of computerized FHR analysis and electrocardiogram have been developed, and several clinical researches have been currently performed. Computerized equipment makes us to analyze beat-to-beat variability and short term heart rate patterns. Furthermore, researches about multiparameters of FHR variability will be ongoing.

  11. Neurocognitive performance profile postparathyroidectomy: a pilot study of computerized assessment.

    Science.gov (United States)

    Bell, Caitlin F; Warrick, Mathew M; Gallagher, Kathleen C; Baregamian, Naira

    2017-11-10

    Neurocognitive symptoms attributable to primary hyperparathyroidism are important diagnostic criteria, yet the basic characterization and assessment of neurocognitive deficits in primary hyperparathyroidism are not defined fully. In this prospective pilot study, patients with unequivocal biochemical diagnosis of primary hyperparathyroidism were evaluated for neurocognitive performance preoperatively and postparathyroidectomy (2 weeks, 6 months) using a battery of computerized modular tests designed by LUMOSITY. The individual test scores and aggregate scores representing a subject's total neurocognitive performance profile were calculated. Statistical comparisons between groups were performed using univariate analysis and repeated measures of analysis of variance. In the study, 34 participants were assessed preoperatively; 18 completed all 3 assessments, 2 completed pretest and 6-month assessments, and 30 completed preoperative and 2-week postparathyroidectomy assessments. Primary hyperparathyroidism patients demonstrated significant deficits in memory, attention, mental flexibility, and speed of processing when compared with controls. Total neurocognitive performance profile score was significantly lower at the preoperative (P = .0001) and 2-week postparathyroidectomy (P = .0004) time points when compared with controls; this difference was bridged by 6 months postparathyroidectomy. Computerized neurocognitive performance profile assessment validated the neurocognitive benefits of parathyroidectomy. Additional study is needed to determine if this novel method provides long-term, objective, quantifiable, and accessible neurocognitive performance profile assessment in primary hyperparathyroidism patients and can serve as a valuable diagnostic and prognostic tool. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. A Computerized Version of the Scrambled Sentences Test

    Directory of Open Access Journals (Sweden)

    Roberto Viviani

    2018-01-01

    Full Text Available The scrambled sentences test (SST, an experimental procedure that involves participants writing down their cognitions, has been used to elicit individual differences in depressiveness and vulnerability to depression. We describe here a modification of the SST to adapt it to computerized administration, with a particular view of its use in large samples and functional neuroimaging applications. In a first study with the computerized version, we reproduce the preponderance of positive cognitions in the healthy and the inverse association of these cognitions with individual measures of depressiveness. We also report a tendency of self-referential cognitions to elicit higher positive cognition rates. In a second study, we describe the patterns of neural activations elicited by emotional and neutral sentences in a functional neuroimaging study, showing that it replicates and extends previous findings obtained with the original version of the SST. During the formation of emotional cognitions, ventral areas such as the ventral anterior cingulus and the supramarginal gyrus were relatively activated. This activation pattern speaks for the recruitment of mechanisms coordinating motivational and associative processes in the formation of value-based decisions.

  13. Application of computerized tomography to the investigation of ionospheric structures

    Energy Technology Data Exchange (ETDEWEB)

    Raymund, T.D.; Austen, J.R.; Franke, S.J.; Liu, C.H.; Klobuchar, J.A.

    1990-10-01

    Ionospheric total electron content (TEC) measurements, obtained simultaneously at several locations, can be processed using computerized tomography (CT) algorithms to obtain two-dimensional images of ionospheric electron density. Using TEC data computerized ionospheric tomography (CIT) reconstructs an image of the electron density structures in a vertical slice above the receiving stations. We successfully applied this technique to realistic simulations of ionospheric density variations over 16 degree of latitude and a height range of 50 to 1000 km. A method for approximating the peak height and scale height of the electron density profile will be discussed as well as a reconstruction technique based on the multiplicative algebraic reconstruction technique algorithm and a back projection based initial guess. The quality of reconstructions is considered for two geometries and image resolutions. In particular, the image of a mid-latitude trough with background horizontal density gradient and large-scale irregular structures has been reconstructed from TEC data generated from a model based on an incoherent scatter radar observation. The CT reconstructed image was compared with the original contour map obtained by the incoherent scatter radar. Good agreement has been achieved. The CIT technique has also been applied to a modeled ionosphere to calculate the range rate corrections for a Doppler-tracking radar. Reprint

  14. Computerized cognitive training with older adults: a systematic review.

    Directory of Open Access Journals (Sweden)

    Alexandra M Kueider

    Full Text Available A systematic review to examine the efficacy of computer-based cognitive interventions for cognitively healthy older adults was conducted. Studies were included if they met the following criteria: average sample age of at least 55 years at time of training; participants did not have Alzheimer's disease or mild cognitive impairment; and the study measured cognitive outcomes as a result of training. Theoretical articles, review articles, and book chapters that did not include original data were excluded. We identified 151 studies published between 1984 and 2011, of which 38 met inclusion criteria and were further classified into three groups by the type of computerized program used: classic cognitive training tasks, neuropsychological software, and video games. Reported pre-post training effect sizes for intervention groups ranged from 0.06 to 6.32 for classic cognitive training interventions, 0.19 to 7.14 for neuropsychological software interventions, and 0.09 to 1.70 for video game interventions. Most studies reported older adults did not need to be technologically savvy in order to successfully complete or benefit from training. Overall, findings are comparable or better than those from reviews of more traditional, paper-and-pencil cognitive training approaches suggesting that computerized training is an effective, less labor intensive alternative.

  15. Using computerized clinical nursing data bases for nursing research.

    Science.gov (United States)

    Nail, L M; Lange, L L

    1996-01-01

    Computerized clinical nursing data bases (CCNDBs) have significant potential as sources of data for research on the processes and outcomes of nursing care. The emergence of nurse-managed practice sites, in which patient care is driven predominantly by nurses' decisions, has prompted renewed interest in using data from these practices to answer questions that are important to nurses. The purpose of this article is to articulate strategies for using CCNDBs for nursing research. Recognition of the differences between clinical and research data bases is essential. The steps involved in obtaining and using computerized clinical data can be grouped into three phases: (1) locating and accessing CCNDBs, (2) assessing the content and quality of the data, and (3) extracting and analyzing the data. Processes involved in phase 1 include determining the research question, identifying eligible CCNDBs, negotiating access to the CCNDB, and ensuring the privacy and confidentiality of subjects. In phase 2 the processes include determining the content of the candidate CCNDBs, assessing the quality of the data in candidate CCNDBs, and determining the technical usability of data in candidate CCNDBs. Phase 3 involves mapping CCNDB data elements to research variables; determining data and record selection criteria; writing and implementing a query to select the desired records; designing a data base and record structure for research variables; performing analytic procedures on the research data; and reporting results of the research. Phases and procedures are discussed in detail in the article.

  16. Co-release of dicloxacillin and thioridazine from catheter material containing an interpenetrating polymer network for inhibiting device-associated Staphylococcus aureus infection

    DEFF Research Database (Denmark)

    Stenger, Michael; Klein, Kasper; Grønnemose, Rasmus B

    2016-01-01

    Approximately half of all nosocomial bloodstream infections are caused by bacterial colonization of vascular catheters. Attempts have been made to improve devices using anti-adhesive or antimicrobial coatings; however, it is often difficult to bind coatings stably to catheter materials, and the low...... to an enhanced loading capacity of DCX when co-loaded with TDZ. Lastly, the IPN catheters were tested in a novel porcine model of central venous catheter-related infection, in which drug-loaded IPN catheters were found to significantly decrease the frequency of infection....

  17. Ferroelectric devices

    CERN Document Server

    Uchino, Kenji

    2009-01-01

    Updating its bestselling predecessor, Ferroelectric Devices, Second Edition assesses the last decade of developments-and setbacks-in the commercialization of ferroelectricity. Field pioneer and esteemed author Uchino provides insight into why this relatively nascent and interdisciplinary process has failed so far without a systematic accumulation of fundamental knowledge regarding materials and device development.Filling the informational void, this collection of information reviews state-of-the-art research and development trends reflecting nano and optical technologies, environmental regulat

  18. Catalytic devices

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Ming; Zhang, Xiang

    2018-01-23

    This disclosure provides systems, methods, and apparatus related to catalytic devices. In one aspect, a device includes a substrate, an electrically insulating layer disposed on the substrate, a layer of material disposed on the electrically insulating layer, and a catalyst disposed on the layer of material. The substrate comprises an electrically conductive material. The substrate and the layer of material are electrically coupled to one another and configured to have a voltage applied across them.

  19. Discussion of “Attitude of Physicians Towards Automatic Alerting in Computerized Physician Order Entry Systems”

    DEFF Research Database (Denmark)

    Bates, D. W.; Baysari, M. T.; Dugas, M.

    2013-01-01

    With these comments on the paper “Attitude of Physicians Towards Automatic Alerting in Computerized Physician Order Entry Systems”, written by Martin Jung and coauthors, with Dr. Elske Ammenwerth as senior author, the journal wants to stimulate a broad discussion on computerized physician order...

  20. Computerized Adaptive Test (CAT) Applications and Item Response Theory Models for Polytomous Items

    Science.gov (United States)

    Aybek, Eren Can; Demirtasli, R. Nukhet

    2017-01-01

    This article aims to provide a theoretical framework for computerized adaptive tests (CAT) and item response theory models for polytomous items. Besides that, it aims to introduce the simulation and live CAT software to the related researchers. Computerized adaptive test algorithm, assumptions of item response theory models, nominal response…

  1. Acceptance of Computerized Compared to Paper-and-Pencil Assessment in Psychiatric Inpatients.

    Science.gov (United States)

    Weber, Bernhard; Schneider, Barbara; Fritze, Jurgen; Gille, Boris; Hornung, Stefan; Kuhner, Thorsten; Maurer, Konrad

    2003-01-01

    Investigated the acceptance of computerized assessment, particularly compared to conventional paper-and-pencil techniques, in seriously impaired psychiatric inpatients. Describes the development of a self-rating questionnaire (OPQ, Operation and Preference Questionnaire) and reports results that showed computerized assessment was convincingly…

  2. Differential diagnosis in computerized tomography. 2. rev. and enl. ed.; Differenzialdiagnosen in der Computertomografie

    Energy Technology Data Exchange (ETDEWEB)

    Burgener, Francis A.; Meyers, Steven P. [Rochester Univ., NY (United States). Dept. of Imaging Sciences; Herzog, Christopher [Rotkreuzklinikum Muenchen (Germany); Zaunbauer, Wolfgang [Kantonsspital St. Gallen (Switzerland). Inst. fuer Radiologie

    2013-02-01

    The book on differential diagnosis in computerized tomography is aimed to support radiologists and physicians with experience concerning the interpretation of computerized tomography images by detailed descriptions of CT diagnoses. The book covers the following topics: intracranial indications, head and neck, spinal cord, muscle-skeleton system, thorax, abdomen and pelvis.

  3. The Effect of College Students' Self-Generated Computerized Mind Mapping on Their Reading Achievement

    Science.gov (United States)

    Sabbah, Sabah Salman

    2015-01-01

    This study explored the potential effect of college students' self-generated computerized mind maps on their reading comprehension. It also investigated the subjects' attitudes toward generating computerized mind maps for reading comprehension. The study was conducted in response to the inability of the foundation-level students, who were learning…

  4. Effects of Computerized Decision Support Systems on Management of Atrial Fibrillation: A Scoping Review

    NARCIS (Netherlands)

    Sheibani, Reza; Nabovati, Ehsan; Sheibani, Mehdi; Abu-Hanna, Ameen; Heidari-Bakavoli, Alireza; Eslami, Saeid

    2017-01-01

    Potential role of computerized decision support system on management of atrial fibrillation is not well understood. To systematically review studies that evaluate the effects of computerized decision support systems and decision aids on aspects pertaining to atrial fibrillation. We searched Medline,

  5. Computerized Dynamic Testing : A Study of the Potential of an Approach Using Sensor Technology

    NARCIS (Netherlands)

    Resing, W.C.M.; Steijn, W.M.P.; Stevenson, C.E.; Elliott, J.G.

    2011-01-01

    This study explored the use of computerized dynamic testing in education for 8-year-old children. As for other domains, it was expected that the use of a computer would help overcome difficulties encountered with traditional dynamic test procedures. A recently developed computerized console was

  6. Spiral computed tomographic imaging related to computerized ultrasonographic images of carotid plaque morphology and histology

    DEFF Research Database (Denmark)

    Grønholdt, Marie-Louise; Wagner, A; Wiebe, B M

    2001-01-01

    Echolucency of carotid atherosclerotic plaques, as evaluated by computerized B-mode ultrasonographic images, has been associated with an increased incidence of brain infarcts on cerebral computed tomographic scans. We tested the hypotheses that characterization of carotid plaques on spiral computed...... tomographic images correlates with that on computerized B-mode ultrasonographic images and that spiral computed tomographic imaging predicts the histomorphometric plaque content....

  7. Experiences of handwriting and using a computerized ATD in school: adolescents with Asperger's syndrome.

    Science.gov (United States)

    Breivik, Ingrid; Hemmingsson, Helena

    2013-09-01

    Adolescents with Asperger's syndrome (AS), often have handwriting difficulties that affect their academic performance. The purpose of this descriptive multiple-case mixed-method study was to highlight how adolescents with AS experience writing in the school setting when writing by hand and when using a computerized Assistive Technology Device (ATD), for writing. A qualitative content analysis approach was used, including interviews with five adolescents, their parents, and their teachers. This was complemented by asking the adolescents to rate their perceived performance and satisfaction of writing with and without the ATD. All adolescents described handwriting difficulties, but a reduced ability to express oneself in writing was also common. Initiating and completing writing tasks was often so demanding that it caused resistance to the activity. Several advantages when using the ATD were described by the participants and the self-ratings showed higher scores for performance of and satisfaction with writing when the ATD was used. The results show that teachers' encouragement seemed to be important for the initiation and continuation of use of the ATD.

  8. [Development of a computerized three-dimension system for displaying and analyzing mandibular helical axis pathways].

    Science.gov (United States)

    Chen, Li; Zhang, Hao; Feng, Hailan; Zhang, Fengjun

    2014-12-01

    This paper is aimed to develop a computerized three dimensional system for displaying and analyzing mandibular helical axis pathways. Mandibular movements were recorded using a six-degrees-of-freedom ultrasonic jaw movement recording device. The three-dimensional digital models of the midface and the mandible were reconstructed and segmented from CT skull images. The digital models were then transformed to the coordinate system of mandibular motion data by using an optical measuring system. The system was programmed on the base of the Visualization ToolKit and Open Scene Graphics Library. According to the motion data, transformation matrices were calculated to simulate mandibular movements. Meanwhile, mandibular helical axis pathways were calculated and displayed three dimensionally by means of an eigenvalues method. The following parameters of mandibular helical axis were calculated: the rotation around instantaneous helical axis, the translation along it, its spatial orientation, its position and distance relative to any special reference point. These parameters could be exported to describe comprehensively the whole mandiblular movements. It could be concluded that our system would contribute to the study of mandiblular helical axis pathways.

  9. Trustworthy execution on mobile devices

    CERN Document Server

    Vasudevan, Amit; Newsome, James

    2013-01-01

    This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.

  10. Computerized three-class classification of MRI-based prognostic markers for breast cancer

    Science.gov (United States)

    Bhooshan, Neha; Giger, Maryellen; Edwards, Darrin; Yuan, Yading; Jansen, Sanaz; Li, Hui; Lan, Li; Sattar, Husain; Newstead, Gillian

    2011-09-01

    The purpose of this study is to investigate whether computerized analysis using three-class Bayesian artificial neural network (BANN) feature selection and classification can characterize tumor grades (grade 1, grade 2 and grade 3) of breast lesions for prognostic classification on DCE-MRI. A database of 26 IDC grade 1 lesions, 86 IDC grade 2 lesions and 58 IDC grade 3 lesions was collected. The computer automatically segmented the lesions, and kinetic and morphological lesion features were automatically extracted. The discrimination tasks—grade 1 versus grade 3, grade 2 versus grade 3, and grade 1 versus grade 2 lesions—were investigated. Step-wise feature selection was conducted by three-class BANNs. Classification was performed with three-class BANNs using leave-one-lesion-out cross-validation to yield computer-estimated probabilities of being grade 3 lesion, grade 2 lesion and grade 1 lesion. Two-class ROC analysis was used to evaluate the performances. We achieved AUC values of 0.80 ± 0.05, 0.78 ± 0.05 and 0.62 ± 0.05 for grade 1 versus grade 3, grade 1 versus grade 2, and grade 2 versus grade 3, respectively. This study shows the potential for (1) applying three-class BANN feature selection and classification to CADx and (2) expanding the role of DCE-MRI CADx from diagnostic to prognostic classification in distinguishing tumor grades.

  11. Computerized Tomography with Total Variation and with Shearlets

    CERN Document Server

    Garduño, Edgar

    2016-01-01

    To reduce the x-ray dose in computerized tomography (CT), many constrained optimization approaches have been proposed aiming at minimizing a regularizing function that measures lack of consistency with some prior knowledge about the object that is being imaged, subject to a (predetermined) level of consistency with the detected attenuation of x-rays. Proponents of the shearlet transform in the regularizing function claim that the reconstructions so obtained are better than those produced using TV for texture preservation (but may be worse for noise reduction). In this paper we report results related to this claim. In our reported experiments using simulated CT data collection of the head, reconstructions whose shearlet transform has a small $\\ell_1$-norm are not more efficacious than reconstructions that have a small TV value. Our experiments for making such comparisons use the recently-developed superiorization methodology for both regularizing functions. Superiorization is an automated procedure for turning...

  12. Gallium-67 lung index computerization in interstitial pneumonitis.

    Science.gov (United States)

    Specht, H D; Brown, P H; Haines, J E; McNeill, M

    1987-12-01

    To improve ease of use, precision, and reduce interobserver variability of the 67Ga lung index, we developed and tested a computer method that yields similar numeric values and uses previous indexing principles, except that the computer matrix unit is the fractional area assessed. Patients were referred for suspected interstitial lung disease. Fifty-three image studies were available for both manual and computer indexing. Linear regression analysis gave a correlation of 0.884. Decision matrix analysis of 58 different nonimmunosuppressed patients resulted in 93% sensitivity and 76% specificity. Receiver operating characteristic curve analysis showed that the ideal index cutoff was 50. Because there is tighter control over 67Ga uptake intensity and spatial distribution assessment, the computerized 67Ga index appears to perform better than the manual analysis.

  13. Computerized asset management and maintenance systems in ST

    CERN Document Server

    Sánchez-Corral, E

    1999-01-01

    The ST division manages and therefore maintains the CERN technical installations. A maintenance database application exists for every technical domain. A total of six different databases were built during the last 10 years and are based on the RAPIER maintenance program. As the Computerized Asset Management and Maintenance Systems (CAMMS) technology has evolved, the RAPIER system has become obsolete. Therefore we are forced to migrate to its latest version, MP5, before the year 2000. The migration path must be defined, leading from the current situation to a fully operational MP5 application. The major elements of each migration path consist in determining the functionality to use, defining the operation of it, adapting and/or creating procedures, converting data and providing training. A migration is always a process of change. The migration presents a unique opportunity to evaluate the current implementations, adapt them to the requirements and exploit the new features offered. Obsolete data and inconsisten...

  14. The computerized OMAHA system in microsoft office excel.

    Science.gov (United States)

    Lai, Xiaobin; Wong, Frances K Y; Zhang, Peiqiang; Leung, Carenx W Y; Lee, Lai H; Wong, Jessica S Y; Lo, Yim F; Ching, Shirley S Y

    2014-01-01

    The OMAHA System was adopted as the documentation system in an interventional study. To systematically record client care and facilitate data analysis, two Office Excel files were developed. The first Excel file (File A) was designed to record problems, care procedure, and outcomes for individual clients according to the OMAHA System. It was used by the intervention nurses in the study. The second Excel file (File B) was the summary of all clients that had been automatically extracted from File A. Data in File B can be analyzed directly in Excel or imported in PASW for further analysis. Both files have four parts to record basic information and the three parts of the OMAHA System. The computerized OMAHA System simplified the documentation procedure and facilitated the management and analysis of data.

  15. A Practitioner's Guide for Variable-length Computerized Classification Testing

    Directory of Open Access Journals (Sweden)

    Nathan A. Thompson

    2007-01-01

    Full Text Available Variable-length computerized classification tests, CCTs, (Lin & Spray, 2000; Thompson, 2006 are a powerful and efficient approach to testing for the purpose of classifying examinees into groups. CCTs are designed by the specification of at least five technical components: psychometric model, calibrated item bank, starting point, item selection algorithm, and termination criterion. Several options exist for each of these CCT components, creating a myriad of possible designs. Confusion among designs is exacerbated by the lack of a standardized nomenclature. This article outlines the components of a CCT, common options for each component, and the interaction of options for different components, so that practitioners may more efficiently design CCTs. It also offers a suggestion of nomenclature.

  16. Computerized experience-sampling approach for realtime assessment of stress

    Directory of Open Access Journals (Sweden)

    S. Serino

    2013-03-01

    Full Text Available The incredible advancement in the ICT sector has challenged technology developers, designers, and psychologists to reflect on how to develop technologies to promote mental health. Computerized experience-sampling method appears to be a promising assessment approach to investigate the real-time fluctuation of experience in daily life in order to detect stressful events. At this purpose, we developed PsychLog (http://psychlog.com a free open-source mobile experience sampling platform that allows psychophysiological data to be collected, aggregated, visualized and collated into reports. Results showed a good classification of relaxing and stressful events, defining the two groups with psychological analysis and verifying the discrimination with physiological measures. Within the paradigm of Positive Technology, our innovative approach offers for researchers and clinicians new effective opportunities for the assessment and treatment of the psychological stress in daily situations.

  17. Motion Estimation and Compensation Strategies in Dynamic Computerized Tomography

    Science.gov (United States)

    Hahn, Bernadette N.

    2017-12-01

    A main challenge in computerized tomography consists in imaging moving objects. Temporal changes during the measuring process lead to inconsistent data sets, and applying standard reconstruction techniques causes motion artefacts which can severely impose a reliable diagnostics. Therefore, novel reconstruction techniques are required which compensate for the dynamic behavior. This article builds on recent results from a microlocal analysis of the dynamic setting, which enable us to formulate efficient analytic motion compensation algorithms for contour extraction. Since these methods require information about the dynamic behavior, we further introduce a motion estimation approach which determines parameters of affine and certain non-affine deformations directly from measured motion-corrupted Radon-data. Our methods are illustrated with numerical examples for both types of motion.

  18. Application of computerized tomography to the investigation of ionospheric structures

    Energy Technology Data Exchange (ETDEWEB)

    Raymund, T.D.; Franke, S.J.; Liu, C.H.; Austen, J.R.; Klobuchar, J.A. (Illinois Univ., Urbana (USA) Tennessee Technological Univ., Cookeville (USA) USAF, Geophysics Laboratory, Hanscom AFB, MA (USA))

    1990-10-01

    It is shown that ionospheric total electron content measurements, obtained simultaneously at several locations, can be processed using computerized tomography (CT) algorithms to obtain two-dimensional images of ionospheric electron density. CT, using ionospheric total electron content data, is applied to simulate density variations over 16 deg of latitude and a height range of 50 to 1000 km. A method of approximating the peak height and scale height of the electron density profile is presented, as well as a reconstruction technique using a multiplicative algebraic algorithm and a back projection based initial guess. The quality of the images is examined for two geometries and resolutions. It is suggested that the reconstruction algorithm is sufficiently robust to perform well even in the presence of broad-band noise of reasonable level. 12 refs.

  19. Item Overexposure in Computerized Classification Tests Using Sequential Item Selection

    Directory of Open Access Journals (Sweden)

    Alan Huebner

    2012-06-01

    Full Text Available Computerized classification tests (CCTs often use sequential item selection which administers items according to maximizing psychometric information at a cut point demarcating passing and failing scores. This paper illustrates why this method of item selection leads to the overexposure of a significant number of items, and the performances of three different methods for controlling maximum item exposure rates in CCTs are compared. Specifically, the Sympson-Hetter, restricted, and item eligibility methods are examined in two studies realistically simulating different types of CCTs and are evaluated based upon criteria including classification accuracy, the number of items exceeding the desired maximum exposure rate, and test overlap. The pros and cons of each method are discussed from a practical perspective.

  20. Computerized assessment of social approach behavior in mouse

    Directory of Open Access Journals (Sweden)

    Damon T Page

    2009-11-01

    Full Text Available Altered sociability is a core feature of a variety of human neurological disorders, including autism. Social behaviors may be tested in animal models, such as mice, to study the biological bases of sociability and how this is altered in neurodevelopmental disorders. An easily quantifiable social behavior frequently used to assess sociability in the mouse is the tendency to approach and interact with an unfamiliar mouse. Here we present a novel computer-assisted method for scoring social approach behavior in mice using a three-chambered apparatus. We find consistent results between data scored using the computer assisted method and a human observer, making computerized assessment a reliable, low cost, high-throughput method for testing sociability.

  1. Reliability and accuracy of three different computerized cephalometric analysis software.

    Science.gov (United States)

    Rusu, Oana; Petcu, Ana Elena; Drăgan, Eliza; Haba, Danisia; Moscalu, Mihaela; Zetu, Irina Nicoleta

    2015-01-01

    The aim of this investigation was to determine, compare and evaluate three different computerized tracing programs, where the lateral cephalograms were digitized on the screen. 39 randomly selected cephalometric radiographs were used in the present study. Three programs Planmeca Romexis® (Romexis 3.2.0., Helsinki, Finland), Orthalis (France) and AxCeph (A.C 2.3.0.74, Ljubljana, Slovenia) were evaluated. 12 skeletal, 9 dental and 3 soft tissue parameters were measured that consisted of 11 linear and 13 angular measurements. Statistical analysis was carried out using multivariate analysis of variance (MANOVA), Levene test, Tukey Honestly Significant Difference (HSD) test and Kruskal-Wallis test. The measurements obtained with the cephalometric analyses programs used in the study were reliable.

  2. Computerized evaluation of mammographic image quality using phantom images.

    Science.gov (United States)

    Dougherty, G

    1998-01-01

    A simple, quick and computerized method for quantitatively evaluating the image quality of mammography phantom images has been developed. Images of the American College of Radiology (ACR) mammographic accreditation phantoms were acquired under different X-ray techniques, scored and ranked subjectively by five expert readers, and digitized for quantitative analysis. The contrast and signal-to-noise (contrast-to-noise) ratios of the main nodule and microcalcification group were obtained accurately and reproducibly using an image processing protocol. The contrast values were successful at discriminating differences in image quality due to variations in scatter conditions (as a result of different kVp's, and the presence or absence of an acrylic scatterer and/or a moving Bucky grid). They were more precise, reproducible and sensitive than the ACR score. In particular, the contrast of the main nodule was highly correlated (r(s) = 0.988: pimage quality by our panel of expert readers.

  3. PENERAPAN SISTIM PENDUKUNG KEPUTUSAN DALAM SISTEM PENGUJIAN COMPUTERIZED ADAPTIVE TESTING

    Directory of Open Access Journals (Sweden)

    Rukli Rukli

    2011-11-01

    Full Text Available This study aims to make design decision support system adaptive to examinee ability to go to college. Decision support systems are made using one parameter logistic model by taking into account the difficulty level of questions adapted to the ability of the examinee. Questions are selected so that the items follow the ability of examinee more accurate assessment of ability with a lesser number of items. CAT a web-based applications require lesser number of items in determining the ability of examinee. College can determine the appropriate characteristics of the ability of examinee acceptance criteria for each department with domain weighting, and then determine the minimum level of capability that will be received and an appropriate amount to be received.   Key word: Decision Support System, Computerized Adaptive Testing

  4. Identification device

    Science.gov (United States)

    Lin, Jian-Shian; Su, Chih-Chieh; Chou, Ta-Hsin; Wu, Mount-Learn; Lai, Chieh-Lung; Hsu, Che-Lung; Lan, Hsiao-Chin; Huang, Hung-I.; Liu, Yung-Chih; Tu, Zong-Ru; Lee, Chien-Chieh; Chang, Jenq-Yang

    2007-09-01

    In this Letter, the identification device disclosed in the present invention is comprised of: a carrier and a plurality of pseudo-pixels; wherein each of the plural pseudo-pixels is formed on the carrier and is further comprised of at least a light grating composed of a plurality of light grids. In a preferred aspect, each of the plural light grids is formed on the carrier while spacing from each other by an interval ranged between 50nm and 900nm. As the aforesaid identification device can present specific colors and patterns while it is being viewed by naked eye with respect to a specific viewing angle, the identification device is preferred for security and anti-counterfeit applications since the specific colors and patterns will become invisible when it is viewed while deviating from the specific viewing angle.

  5. 45 CFR 310.5 - What options are available for Computerized Tribal IV-D Systems and office automation?

    Science.gov (United States)

    2010-10-01

    ... IV-D Systems and office automation? 310.5 Section 310.5 Public Welfare Regulations Relating to Public... AUTOMATION Requirements for Computerized Tribal IV-D Systems and Office Automation § 310.5 What options are available for Computerized Tribal IV-D Systems and office automation? (a) Allowable computerized support...

  6. Student Practices, Learning, and Attitudes When Using Computerized Ranking Tasks

    Science.gov (United States)

    Lee, Kevin M.; Prather, E. E.; Collaboration of Astronomy Teaching Scholars CATS

    2011-01-01

    Ranking Tasks are a novel type of conceptual exercise based on a technique called rule assessment. Ranking Tasks present students with a series of four to eight icons that describe slightly different variations of a basic physical situation. Students are then asked to identify the order, or ranking, of the various situations based on some physical outcome or result. The structure of Ranking Tasks makes it difficult for students to rely strictly on memorized answers and mechanical substitution of formulae. In addition, by changing the presentation of the different scenarios (e.g., photographs, line diagrams, graphs, tables, etc.) we find that Ranking Tasks require students to develop mental schema that are more flexible and robust. Ranking tasks may be implemented on the computer which requires students to order the icons through drag-and-drop. Computer implementation allows the incorporation of background material, grading with feedback, and providing additional similar versions of the task through randomization so that students can build expertise through practice. This poster will summarize the results of a study of student usage of computerized ranking tasks. We will investigate 1) student practices (How do they make use of these tools?), 2) knowledge and skill building (Do student scores improve with iteration and are there diminishing returns?), and 3) student attitudes toward using computerized Ranking Tasks (Do they like using them?). This material is based upon work supported by the National Science Foundation under Grant No. 0715517, a CCLI Phase III Grant for the Collaboration of Astronomy Teaching Scholars (CATS). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

  7. From punched cards to computerized patient records: a personal journey.

    Science.gov (United States)

    Peterson, Hans E

    2006-01-01

    This paper presents the early history of the development of CPR in Sweden, the importance of international cooperation and standardisation and how this cooperation has been facilitated by IMIA, the European Union and the standards organisations. It ends with the lessons learned after 35 years of experience put together by the Swedish Institute for Health Services Development, SPRI, in a 5 year project initiated by the Swedish Government and with participation of most health care providers in the country. Starting with the first attempts to use punched cards to store and use patient information for clinical use the author describes his troublesome and difficult road to a Computerized Patient Record that could be used both for the work with the patient and as a tool to follow up both the diagnostic and therapeutic processes and for clinical research. The most important results of the efforts to develop a computerized patient record in Sweden are published in many reports, among them three SPRI reports published in the late 1990s, and they are: Standardized information architecture, a common terminology, rules for communication, security and safety, electronic addresses to all units and users and an agreed upon patient and user identification. The future CPR must be problem oriented, capable of only adding new information instead of repeating already-known data and be available in real time regardless of geographic location. It must be possible to present the information in the CPR as 'views' where the healthcare provider has stated in advance the information needed for his patients. There can be a number of 'views' for different occasions.

  8. New method of scoliosis assessment: preliminary results using computerized photogrammetry.

    Science.gov (United States)

    Aroeira, Rozilene Maria Cota; Leal, Jefferson Soares; de Melo Pertence, Antônio Eustáquio

    2011-09-01

    A new method for nonradiographic evaluation of scoliosis was independently compared with the Cobb radiographic method, for the quantification of scoliotic curvature. To develop a protocol for computerized photogrammetry, as a nonradiographic method, for the quantification of scoliosis, and to mathematically relate this proposed method with the Cobb radiographic method. Repeated exposure to radiation of children can be harmful to their health. Nevertheless, no nonradiographic method until now proposed has gained popularity as a routine method for evaluation, mainly due to a low correspondence to the Cobb radiographic method. Patients undergoing standing posteroanterior full-length spine radiographs, who were willing to participate in this study, were submitted to dorsal digital photography in the orthostatic position with special surface markers over the spinous process, specifically the vertebrae C7 to L5. The radiographic and photographic images were sent separately for independent analysis to two examiners, trained in quantification of scoliosis for the types of images received. The scoliosis curvature angles obtained through computerized photogrammetry (the new method) were compared to those obtained through the Cobb radiographic method. Sixteen individuals were evaluated (14 female and 2 male). All presented idiopathic scoliosis, and were between 21.4 ± 6.1 years of age; 52.9 ± 5.8 kg in weight; 1.63 ± 0.05 m in height, with a body mass index of 19.8 ± 0.2. There was no statistically significant difference between the scoliosis angle measurements obtained in the comparative analysis of both methods, and a mathematical relationship was formulated between both methods. The preliminary results presented demonstrate equivalence between the two methods. More studies are needed to firmly assess the potential of this new method as a coadjuvant tool in the routine following of scoliosis treatment.

  9. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  10. Magnetic resonance tracking of catheters and mechatronic devices operating in the vascular network with an embedded photovoltaic-based microelectronic circuit.

    Science.gov (United States)

    Sharafi, Azadeh; Martel, Sylvain

    2013-01-01

    Tracking of a catheter through the arterial system is critical in several medical interventions. To avoid excessive dose of x-ray irradiation, Magnetic Resonance Imaging (MRI) has been proposed. In such a case, a simple ferromagnetic sphere placed at the tip of the catheter could be used. However, due to the artifact created by the ferromagnetic core, it becomes impossible to gather an image of the tissues surrounding such a marker. Hence, in this paper we propose replacing the ferromagnetic marker with a microchip containing a coil and a photovoltaic cell. By radiating light to the photovoltaic cell, the coil generates a magnetic field which is detected as an artifact in MR images. By turning off the light, the effect of the coil is eliminated allowing images of tissues next to the marker to be taken. In this paper, simulated results based on experimental data from the preliminary designs suggest that this approach could be viable not only for catheters but also, it could potentially be used in various tools as well as mechatronic devices being moved inside the body.

  11. Low-cost computing and network communication for a point-of-care device to perform a 3-part leukocyte differential

    Science.gov (United States)

    Powless, Amy J.; Feekin, Lauren E.; Hutcheson, Joshua A.; Alapat, Daisy V.; Muldoon, Timothy J.

    2016-03-01

    Point-of-care approaches for 3-part leukocyte differentials (granulocyte, monocyte, and lymphocyte), traditionally performed using a hematology analyzer within a panel of tests called a complete blood count (CBC), are essential not only to reduce cost but to provide faster results in low resource areas. Recent developments in lab-on-a-chip devices have shown promise in reducing the size and reagents used, relating to a decrease in overall cost. Furthermore, smartphone diagnostic approaches have shown much promise in the area of point-of-care diagnostics, but the relatively high per-unit cost may limit their utility in some settings. We present here a method to reduce computing cost of a simple epi-fluorescence imaging system using a Raspberry Pi (single-board computer, Raspberry Pi to a main server and return results back to the user, exporting the bulk of the computational requirements. Six images were acquired per minute with up to 200 cells per field of view. Preliminary results showed that the differential count varied significantly in monocytes with a 1 minute time difference indicating the importance of time-gating to produce an accurate/consist differential.

  12. Morphometric computerized analysis on the dentinal tubules and the collagen fibers in the dentine of human permanent teeth.

    Science.gov (United States)

    Marchetti, C; Piacentini, C; Menghini, P

    1992-01-01

    A morphometric analysis has been performed on important components of human dentine using an image computerized analyzer. The dentinal tubule diameter and their area percentage were calculated. Moreover the area percentage of the collagen fibers in the dentinal matrix was measured. These parameters have been evaluated in different areas of the coronal and the radicular dentine in permanent teeth. Measurements have been performed on undecalcified and decalcified teeth and on teeth treated with enzymatic digestion to remove the organic non collagen matrix and to evidentiate the collagen fiber network. The values obtained in different areas of the tooth and in samples submitted to different treatments were evaluated by statistical analysis. Dentinal tubule diameter and area percentage significatively decrease from the inner to the peripheral dentine both in the undecalcified teeth as in the decalcified ones and in the samples undergone to enzymatic digestion. The collagen fiber percentage in the organic matrix is significatively lower in the mantle dentine.

  13. Device Applications of Nonlinear Dynamics

    CERN Document Server

    Baglio, Salvatore

    2006-01-01

    This edited book is devoted specifically to the applications of complex nonlinear dynamic phenomena to real systems and device applications. While in the past decades there has been significant progress in the theory of nonlinear phenomena under an assortment of system boundary conditions and preparations, there exist comparatively few devices that actually take this rich behavior into account. "Device Applications of Nonlinear Dynamics" applies and exploits this knowledge to make devices which operate more efficiently and cheaply, while affording the promise of much better performance. Given the current explosion of ideas in areas as diverse as molecular motors, nonlinear filtering theory, noise-enhanced propagation, stochastic resonance and networked systems, the time is right to integrate the progress of complex systems research into real devices.

  14. Incorporation of clinical data into a computerized method for the assessment of mammographic breast lesions

    Science.gov (United States)

    Huo, Zhimin; Giger, Maryellen L.

    2000-06-01

    We previously developed a computerized method to classify mammographic masses as benign or malignant. In this method, mammographic features that are similar to the ones used by radiologists are automatically extracted to characterize a mass lesion. These features are then merged by an artificial neural network (ANN), which yields an estimated likelihood of malignancy for each mass. The performance of the method was evaluated on an independent database consisting of 110 cases (60 benign and 50 malignant cases). The method achieved an Az of 0.91 from round-robin analysis in the task of differentiating between benign and malignant masses using the computer-extracted features only. As the most important clinical risk factor for breast cancer, age achieved a performance level (Az equals 0.79) similar to that (Az equals 0.77 and 0.80) of the computer-extracted spiculation features, which are the most important indicators for malignancy of a mass, in differentiating between the malignant and benign cases. In this study, age is included as an additional input feature to the ANN. The performance of the scheme (Az equals 0.93) is improved when age is included. However, the improvement is not found to be statistically significant. Our results indicated that age may be a strong feature in predicting malignancy of a mass. For this database, however, the inclusion of age may not have a strong impact on the determination of the likelihood for a mammographic mass lesion when the major mammographic characteristics (e.g., spiculation) of a mass are accurately extracted and analyzed along with other features using an artificial neural network.

  15. COMPUTER CONTROLLED EXPERIMENTAL DEVICE FOR INVESTIGATIONS OF TRIBOLOGICAL INFLUENCES IN SHEET METAL FORMING

    OpenAIRE

    Milan Djordjevic; Srbislav Aleksandrović; Tomislav Vujinović; Milentije Stefanović; Vukić Lazić; Ružica Nikolić

    2012-01-01

    Sheet metal forming, especially deep drawing process, is influenced by many factors. Blank holding force and drawbead displacement are two of them that can be controlled during the forming process. For this purpose, electro-hydraulic computerized sheet-metal strip sliding device has been constructed. Basic characteristic of this device is realization of variable contact pressure and drawbead height as functions of time or stripe displacement. There are both, pressure and drawbead, ten linear ...

  16. An Evaluation of Hand-Force Prediction Using Artificial Neural-Network Regression Models of Surface EMG Signals for Handwear Devices

    Directory of Open Access Journals (Sweden)

    Masayuki Yokoyama

    2017-01-01

    Full Text Available Hand-force prediction is an important technology for hand-oriented user interface systems. Specifically, surface electromyography (sEMG is a promising technique for hand-force prediction, which requires a sensor with a small design space and low hardware costs. In this study, we applied several artificial neural-network (ANN regression models with different numbers of neurons and hidden layers and evaluated handgrip forces by using a dynamometer. A handwear with dry electrodes on the dorsal interosseous muscles was used for our evaluation. Eleven healthy subjects participated in our experiments. sEMG signals with six different levels of forces from 0 N to 200 N and maximum voluntary contraction (MVC are measured to train and test our ANN regression models. We evaluated three different methods (intrasession, intrasubject, and intersubject evaluation, and our experimental results show a high correlation (0.840, 0.770, and 0.789 each between the predicted forces and observed forces, which are normalized by the MVC for each subject. Our results also reveal that ANNs with deeper layers of up to four hidden layers show fewer errors in intrasession and intrasubject evaluations.

  17. Detection device

    Science.gov (United States)

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  18. Medical Devices

    NARCIS (Netherlands)

    Verkerke, Gijsbertus Jacob; Mahieu, H.F.; Geertsema, A.A.; Hermann, I.F.; van Horn, J.R.; Hummel, J. Marjan; van Loon, J.P.; Mihaylov, D.; van der Plaats, A.; Schraffordt Koops, H.; Schutte, H.K.; Veth, R.P.H.; de Vries, M.P.; Rakhorst, G.; Shi, Donglu

    2004-01-01

    The development of new medical devices is a very time-consuming and costly process. Besides the time between the initial idea and the time that manufacturing and testing of prototypes takes place, the time needed for the development of production facilities, production of test series, marketing,

  19. Printing Device

    NARCIS (Netherlands)

    Berg, van den M.J.; Markies, P.R.; Zuilhof, H.

    2014-01-01

    An ink jetprinting device includes a pressure chamber formed by a plurality of wall segments, a first aperture extending through a wall segment and communicating with an ink jet orifice and a second aperture extending through a wall segment and communicating with an ink supply duct. The pressure

  20. Computerized Virtual Reality Simulation in Preclinical Dentistry: Can a Computerized Simulator Replace the Conventional Phantom Heads and Human Instruction?

    Science.gov (United States)

    Plessas, Anastasios

    2017-10-01

    In preclinical dental education, the acquisition of clinical, technical skills, and the transfer of these skills to the clinic are paramount. Phantom heads provide an efficient way to teach preclinical students dental procedures safely while increasing their dexterity skills considerably. Modern computerized phantom head training units incorporate features of virtual reality technology and the ability to offer concurrent augmented feedback. The aims of this review were to examine and evaluate the dental literature for evidence supporting their use and to discuss the role of augmented feedback versus the facilitator's instruction. Adjunctive training in these units seems to enhance student's learning and skill acquisition and reduce the required faculty supervision time. However, the virtual augmented feedback cannot be used as the sole method of feedback, and the facilitator's input is still critical. Well-powered longitudinal randomized trials exploring the impact of these units on student's clinical performance and issues of cost-effectiveness are warranted.

  1. Giving Devices the Ability to Exercise Reason

    Directory of Open Access Journals (Sweden)

    Thomas Keeley

    2008-10-01

    Full Text Available One of the capabilities that separates humans from computers has been the ability to exercise "reason / judgment". Computers and computerized devices have provided excellent platforms for following rules. Computer programs provide the scripts for processing the rules. The exercise of reason, however, is more of an image processing function than a function composed of a series of rules. The exercise of reason is more right brain than left brain. It involves the interpretation of information and balancing inter-related alternatives. This paper will discuss a new way to define and process information that will give devices the ability to exercise human-like reasoning and judgment. The paper will discuss the characteristics of a "dynamic graphical language" in the context of addressing judgment, since judgment is often required to adjust rules when operating in a dynamic environment. The paper will touch on architecture issues and how judgment is integrated with rule processing.

  2. Evaluation of computerized health management information system for primary health care in rural India.

    Science.gov (United States)

    Krishnan, Anand; Nongkynrih, Baridalyne; Yadav, Kapil; Singh, Satyavir; Gupta, Vivek

    2010-11-16

    The Comprehensive Rural Health Services Project Ballabgarh, run by All India Institute of Medical Sciences (AIIMS), New Delhi has a computerized Health Management Information System (HMIS) since 1988. The HMIS at Ballabgarh has undergone evolution and is currently in its third version which uses generic and open source software. This study was conducted to evaluate the effectiveness of a computerized Health Management Information System in rural health system in India. The data for evaluation were collected by in-depth interviews of the stakeholders i.e. program managers (authors) and health workers. Health Workers from AIIMS and Non-AIIMS Primary Health Centers were interviewed to compare the manual with computerized HMIS. A cost comparison between the two methods was carried out based on market costs. The resource utilization for both manual and computerized HMIS was identified based on workers' interviews. There have been no major hardware problems in use of computerized HMIS. More than 95% of data was found to be accurate. Health workers acknowledge the usefulness of HMIS in service delivery, data storage, generation of workplans and reports. For program managers, it provides a better tool for monitoring and supervision and data management. The initial cost incurred in computerization of two Primary Health Centers was estimated to be Indian National Rupee (INR) 1674,217 (USD 35,622). Equivalent annual incremental cost of capital items was estimated as INR 198,017 (USD 4213). The annual savings is around INR 894,283 (USD 11,924). The major advantage of computerization has been in saving of time of health workers in record keeping and report generation. The initial capital costs of computerization can be recovered within two years of implementation if the system is fully operational. Computerization has enabled implementation of a good system for service delivery, monitoring and supervision.

  3. Evaluation of computerized health management information system for primary health care in rural India

    Directory of Open Access Journals (Sweden)

    Singh Satyavir

    2010-11-01

    Full Text Available Abstract Background The Comprehensive Rural Health Services Project Ballabgarh, run by All India Institute of Medical Sciences (AIIMS, New Delhi has a computerized Health Management Information System (HMIS since 1988. The HMIS at Ballabgarh has undergone evolution and is currently in its third version which uses generic and open source software. This study was conducted to evaluate the effectiveness of a computerized Health Management Information System in rural health system in India. Methods The data for evaluation were collected by in-depth interviews of the stakeholders i.e. program managers (authors and health workers. Health Workers from AIIMS and Non-AIIMS Primary Health Centers were interviewed to compare the manual with computerized HMIS. A cost comparison between the two methods was carried out based on market costs. The resource utilization for both manual and computerized HMIS was identified based on workers' interviews. Results There have been no major hardware problems in use of computerized HMIS. More than 95% of data was found to be accurate. Health workers acknowledge the usefulness of HMIS in service delivery, data storage, generation of workplans and reports. For program managers, it provides a better tool for monitoring and supervision and data management. The initial cost incurred in computerization of two Primary Health Centers was estimated to be Indian National Rupee (INR 1674,217 (USD 35,622. Equivalent annual incremental cost of capital items was estimated as INR 198,017 (USD 4213. The annual savings is around INR 894,283 (USD 11,924. Conclusion The major advantage of computerization has been in saving of time of health workers in record keeping and report generation. The initial capital costs of computerization can be recovered within two years of implementation if the system is fully operational. Computerization has enabled implementation of a good system for service delivery, monitoring and supervision.

  4. Nanophotonic Devices for Optical Interconnect

    DEFF Research Database (Denmark)

    Van Thourhout, D.; Spuesens, T.; Selvaraja, S.K.

    2010-01-01

    We review recent progress in nanophotonic devices for compact optical interconnect networks. We focus on microdisk-laser-based transmitters and discuss improved design and advanced functionality including all-optical wavelength conversion and flip-flops. Next we discuss the fabrication uniformity...

  5. Wavelength conversion devices and techniques

    DEFF Research Database (Denmark)

    Stubkjær, Kristian; Jørgensen, Carsten; Danielsen, Søren Lykke

    1996-01-01

    wavelengths in an easy way and preferably without opto-electronic conversion. Here, we will first briefly look at advantages of employing optical wavelength converters in WDM networks and next review the optical wavelength conversion devices with emphasis on recent developments....

  6. Network and Service Monitoring in Heterogeneous Home Networks

    NARCIS (Netherlands)

    Delphinanto, A.

    2012-01-01

    Home networks are becoming dynamic and technologically heterogeneous. They consist of an increasing number of devices which offer several functionalities and can be used for many different services. In the home, these devices are interconnected using a mixture of networking technologies (for

  7. Networking Technologies for Future Home Networks Using 60 GHz Radio

    NARCIS (Netherlands)

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity

  8. Laser device

    Science.gov (United States)

    Scott, Jill R.; Tremblay, Paul L.

    2008-08-19

    A laser device includes a virtual source configured to aim laser energy that originates from a true source. The virtual source has a vertical rotational axis during vertical motion of the virtual source and the vertical axis passes through an exit point from which the laser energy emanates independent of virtual source position. The emanating laser energy is collinear with an orientation line. The laser device includes a virtual source manipulation mechanism that positions the virtual source. The manipulation mechanism has a center of lateral pivot approximately coincident with a lateral index and a center of vertical pivot approximately coincident with a vertical index. The vertical index and lateral index intersect at an index origin. The virtual source and manipulation mechanism auto align the orientation line through the index origin during virtual source motion.

  9. "Distinvar" device

    CERN Multimedia

    CERN PhotoLab

    1965-01-01

    The alignment of one of the accelerator magnets being checked by the AR Division survey group. A "distinvar" device, invented by the group, using calibrated invar wires stretched between the fixed survey pillar (on the left) and a fixed point on the magnet. In two days it is thus possible to measure the alignment of the 100 magnets with an accuracy better than 1/10.

  10. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  11. Testing MIMO Devices Over the Air

    DEFF Research Database (Denmark)

    Nielsen, Jesper Ødum; Alrabadi, Osama; Fan, Wei

    2012-01-01

    A system for performance evaluation of LTE devices has been presented, with evaluation in both a live network and with a channel sounder. The results serve as reference for OTA evaluations in the anechoic room based on multi-probe setups.......A system for performance evaluation of LTE devices has been presented, with evaluation in both a live network and with a channel sounder. The results serve as reference for OTA evaluations in the anechoic room based on multi-probe setups....

  12. The genre tutorial and social networks terminology

    Directory of Open Access Journals (Sweden)

    Márcio Sales Santiago

    2014-02-01

    Full Text Available This paper analyzes the terminology in the Internet social networks tutorials. A tutorial is a specialized text, full of terms, aiming to teach an individual or group of individuals who need some guidelines to operationalize a computerized tool, such as a social network. It is necessary to identify linguistic and terminological characteristics from the specialized lexical units in this digital genre. Social networks terminology is described and exemplified here. The results show that it is possible to refer to two specific terminologies in tutorials which help to determine the terminological profile of the thematic area, specifically from the point of view of denomination.

  13. A flexible computerized system for environmental data acquisition and transmission

    Science.gov (United States)

    Zappalà, G.

    2009-04-01

    -based instrumentation. The data acquisition and transmission system is based on IEEE P996.1 standard boards, implementing a PC-like architecture; basically, it consists in a Pentium family CPU (the fist prototypes used a 40 MHz 386 CPU), a variable number of RS-232 ports to connect measuring instruments and communication devices, an analog to digital converter (8 inputs 12 or 16 bit), power outputs with connected circuit status feedback to drive actuators and switch on and off the measuring systems, satellite and/or cellular phone modem, GPS; the mass storage is supplied by Disk on Chip (DOC) devices. According to the needs, it can be fully or only partly implemented. The software environment is Datalight ROMDOS v. 6, an MS-DOS compatible Operating System. The software has been written in Microsoft Professional Compiled BASIC v. 7.1. and Microsoft Macro Assembler v. 5.0. It enables to fully control the system instruments both in local and remote mode using a special set of macro commands (that can be combined into sequences using a simple text editor) that include also conditional execution of branches; this feature can be very useful in case of partial operativity of the system due, for instance, to low battery level or failure of some instrument. Available commands include: • System management commands • Instrument management commands • Conditional branch commands • Data transmission commands Collected data are locally stored and can be transmitted as e-mails, so increasing their safety against loosing and making the global data path fault tolerant using the peculiarities of the e-mail system. The first version was used in a network of coastal monitoring buoys funded by the Italian SAM program; a second one to equip an automatic multiple launcher for expendable probes to be used in ships of opportunity, designed and built in the framework of an EU funded program, "MFSTEP". Every hour, a "sequence manager" starts a macro-command sequence, that can be different for each time

  14. A computerized loop based approach for identification of ...

    Indian Academy of Sciences (India)

    Some artificial intelligence based methods such as neural networks (Kong et ... the efficiency and limitations of various methods dealing with this problem. Irrespective of so many available ..... Kong F G, Li Q and Zhang W J 1999 An artificial neural network approach to mechanism kinematic chain isomorphism identification.

  15. Computerized tomography of Castleman's disease simulating a false renal artery aneurysm: a case report.

    Science.gov (United States)

    Friedman, L; Dubowitz, B; Papert, B; Porteous, P

    1987-07-01

    We report a case of retroperitoneal Castleman's disease of the hyaline vascular type simulating a false renal artery aneurysm. Excretory urography with computerized tomography and angiographic findings are presented. All 3 investigations demonstrated a homogeneously enhancing hypervascular retroperitoneal mass.

  16. Evaluating the use of computerized stimulus preference assessments in foster care.

    Science.gov (United States)

    Whitehouse, Cristina M; Vollmer, Timothy R; Colbert, Bennie

    2014-01-01

    The purpose of these studies was to extend the use of stimulus preference assessments to children in foster care. In Study 1, subjects completed a computerized 4-point Likert-type questionnaire designed to assess preference for a wide range of stimuli and activities. Next, items identified as highly preferred (HP) and less preferred (LP) on the questionnaire were tested using a computerized paired-stimulus preference assessment. Results showed complete correspondence between the results of the computerized preference assessments for 11 of 17 subjects. Studies 2 and 3 evaluated whether the stimuli identified as HP in Study 1 would function as reinforcers. Overall, subjects allocated their engagement to HP items, and those HP items could be used as reinforcers for math problem completion. Collectively, these studies demonstrated that computerized preference assessments may be a feasible method of identifying preferences in the foster care system. Implications for their use in foster care are discussed. © Society for the Experimental Analysis of Behavior.

  17. The School Building Principal and Inventory Control: A Case for Computerization.

    Science.gov (United States)

    Stronge, James

    1987-01-01

    General and special purpose database programs are appropriate for inventory control at the school building level. A fixed asset equipment inventory example illustrates the feasibility of computerized inventory control. (MLF)

  18. The Deference Due the Oracle: Computerized Text Analysis in a Basic Writing Class.

    Science.gov (United States)

    Otte, George

    1989-01-01

    Describes how a computerized text analysis program can help students discover error patterns in their writing, and notes how students' responses to analyses can reduce errors and improve their writing. (MM)

  19. Incremental Validity of New Computerized Aptitude Tests for Predicting Training Performance in Nine Navy Technical Schools

    National Research Council Canada - National Science Library

    Wolfe, John H; Larson, Gerald E; Alderton, David L

    2006-01-01

    During their second week of basic training, 4,989 Navy recruits assigned to one of nine technical training schools were administered a battery of six experimental computerized aptitude tests measuring four constructs...

  20. RF device forensics using passband filter analysis

    Science.gov (United States)

    King-Smith, Deen; Mikkilineni, Aravind K.; Gelfand, Saul; Delp, Edward J., III

    2009-02-01

    Given the wide use of Radio Frequency (RF) devices for applications ranging from data networks to wireless sensors, it is of interest to be able to characterize individual devices to verify compliance with FCC Part 15 rules. In an effort to characterize these types of devices we have developed a system that utilizes specially designed probe signals to elicit a response from the device from which unique characteristics can be extracted. The features that uniquely characterize a device are referred to as device signatures or device fingerprints. We apply this approach to RF devices which employ different bandpass filters, and construct training based classifiers which are highly accurate. We also introduce a model-based framework for optimal detection that can be employed to obtain performance limits, and to study model mismatch and probe optimization.