1,362 research outputs found

    Architecture and Design of Medical Processor Units for Medical Networks

    Full text link
    This paper introduces analogical and deductive methodologies for the design medical processor units (MPUs). From the study of evolution of numerous earlier processors, we derive the basis for the architecture of MPUs. These specialized processors perform unique medical functions encoded as medical operational codes (mopcs). From a pragmatic perspective, MPUs function very close to CPUs. Both processors have unique operation codes that command the hardware to perform a distinct chain of subprocesses upon operands and generate a specific result unique to the opcode and the operand(s). In medical environments, MPU decodes the mopcs and executes a series of medical sub-processes and sends out secondary commands to the medical machine. Whereas operands in a typical computer system are numerical and logical entities, the operands in medical machine are objects such as such as patients, blood samples, tissues, operating rooms, medical staff, medical bills, patient payments, etc. We follow the functional overlap between the two processes and evolve the design of medical computer systems and networks.Comment: 17 page

    The residual STL volume as a metric to evaluate accuracy and reproducibility of anatomic models for 3D printing: application in the validation of 3D-printable models of maxillofacial bone from reduced radiation dose CT images.

    Get PDF
    BackgroundThe effects of reduced radiation dose CT for the generation of maxillofacial bone STL models for 3D printing is currently unknown. Images of two full-face transplantation patients scanned with non-contrast 320-detector row CT were reconstructed at fractions of the acquisition radiation dose using noise simulation software and both filtered back-projection (FBP) and Adaptive Iterative Dose Reduction 3D (AIDR3D). The maxillofacial bone STL model segmented with thresholding from AIDR3D images at 100 % dose was considered the reference. For all other dose/reconstruction method combinations, a "residual STL volume" was calculated as the topologic subtraction of the STL model derived from that dataset from the reference and correlated to radiation dose.ResultsThe residual volume decreased with increasing radiation dose and was lower for AIDR3D compared to FBP reconstructions at all doses. As a fraction of the reference STL volume, the residual volume decreased from 2.9 % (20 % dose) to 1.4 % (50 % dose) in patient 1, and from 4.1 % to 1.9 %, respectively in patient 2 for AIDR3D reconstructions. For FBP reconstructions it decreased from 3.3 % (20 % dose) to 1.0 % (100 % dose) in patient 1, and from 5.5 % to 1.6 %, respectively in patient 2. Its morphology resembled a thin shell on the osseous surface with average thickness <0.1 mm.ConclusionThe residual volume, a topological difference metric of STL models of tissue depicted in DICOM images supports that reduction of CT dose by up to 80 % of the clinical acquisition in conjunction with iterative reconstruction yields maxillofacial bone models accurate for 3D printing

    Prospects & Challenges of Implementing Knowledge Management System in IT Industry

    Get PDF
    Recent past has seen an epidemic growth in the adoption of strategic information systems. In order to be successful, enterprises are putting in huge investments into implementation of information technology (IT) and knowledge management systems (KMS). KMS implementation in an IT industry has been discussed in this paper. Several challenges including multiple information sources, access control, and employee’s mistrust among others are being identified along with their possible solutions. Later foreseen benefits of KMS implementation including quicker problem identification, faster response time, and cost saving among others are being highlighted. The paper concludes with revealing future research possibilities

    Knowledge-based systems for knowledge management in enterprises : Workshop held at the 21st Annual German Conference on AI (KI-97)

    Get PDF

    Factors shaping the evolution of electronic documentation systems

    Get PDF
    The main goal is to prepare the space station technical and managerial structure for likely changes in the creation, capture, transfer, and utilization of knowledge. By anticipating advances, the design of Space Station Project (SSP) information systems can be tailored to facilitate a progression of increasingly sophisticated strategies as the space station evolves. Future generations of advanced information systems will use increases in power to deliver environmentally meaningful, contextually targeted, interconnected data (knowledge). The concept of a Knowledge Base Management System is emerging when the problem is focused on how information systems can perform such a conversion of raw data. Such a system would include traditional management functions for large space databases. Added artificial intelligence features might encompass co-existing knowledge representation schemes; effective control structures for deductive, plausible, and inductive reasoning; means for knowledge acquisition, refinement, and validation; explanation facilities; and dynamic human intervention. The major areas covered include: alternative knowledge representation approaches; advanced user interface capabilities; computer-supported cooperative work; the evolution of information system hardware; standardization, compatibility, and connectivity; and organizational impacts of information intensive environments

    A machine-checked proof of security for AWS key management service

    Get PDF
    We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS customers. Domain management is at the core of AWS KMS; it governs the top-level keys that anchor the security of encryption services at AWS. We show that the protocol securely implements an ideal distributed encryption mechanism under standard cryptographic assumptions. The proof is machine-checked in the EasyCrypt proof assistant and is the largest EasyCrypt development to date.Manuel Barbosa was supported by grant SFRH/BSAB/143018/2018 awarded by the Portuguese Foundation for Science and Technology (FCT). Vitor Pereira was supported by grant FCT-PD/BD/113967/201 awarded by FCT. This work was partially funded by national funds via FCT in the context of project PTDC/CCI-INF/31698/2017

    The covering property of the object-oriented data model: design and implementation issues

    Get PDF
    Inheritance is a necessary condition for construction of an object- oriented data model (OODM), but it is not sufficient. This is because inheritance applies to only one hierarchy. The covering construct meets this deficiency because covering maps an object in one hierarchy to a class of objects in another hierarchy. To date, covering has not been implemented into an existing OODM application. This thesis implements the covering construct into a functioning object-oriented database environment. Implementation was achieved through modification of data constructs and the creation of a user-defined relation linking two or more hierarchies. Using the Multi-model Multi-lingual Database Supercomputer (MDBS), a sample, working application is described illustrating real world applications. The results of this thesis show that the covering property can be implemented into an existing OODM without sacrificing the integrity of the data model. The cross-hierarchical mapping afforded by covering is a powerful construct that expands the capabilities of the model beyond pure inheritance. This makes the OODM suitable for a far wider range of applications. Together, inheritance and covering meet the necessary and sufficient conditions of the OODM.http://archive.org/details/thecoveringprope1094539938Lieutenant, United States NavyLieutenant, United States Navy ReserveApproved for public release; distribution is unlimited

    Success Stories in Knowledge Management Systems

    Get PDF
    Historically, information systems have focused on capturing, storing, managing, and reporting explicit knowledge. Organizations today recognize the need to integrate both explicit and tacit knowledge in formal information systems. Knowledge management continues to be a critical strategy for an organization to achieve a sustainable competitive advantage, and consequently succeed in today\u27s knowledge-based economy. Knowledge management systems (KMS) are a class of information systems that manage, store and distribute knowledge. Knowledge management systems have proliferated in practice. In turn, theoretical research on knowledge management and knowledge management systems has proliferated. Knowledge management systems have emerged as powerful sources of competitive advantage. In this paper, we describe the characteristics and concepts of knowledge management systems. We explain how these systems transform modern organizations to high levels of success and present two successful cases that demonstrate this principal. We conclude with a summary of success factors that were common within two successful knowledge management system implementations

    Methodology for the Implementation of Knowledge Management Systems

    Get PDF
    Managing knowledge means managing the processes of creation, development, distribution and utilisation of knowledge in order to improve organisational performance and increase competitive capacity. However, serious difficulties arise when attempts are made to implement knowledge management in enterprises. One of the reasons behind this situation is the lack of suitable methodologies for guiding the process of development and implementation of a Knowledge Management System, which is a computer system that allows the processes of creating, collecting, organising, accessing and using knowledge to be automated as far as possible. In this paper we propose a methodology for directing the process of developing and implementing a Knowledge Management System in any type of organisation. The methodology is organised in phases and outlines the activities to be performed, the techniques and supporting tools to be used, and the expected results for each phase. In addition, we show how the proposed methodology can be applied to the particular case of an enterpris
    • …
    corecore