14,598 research outputs found

    On the Use of XML in Medical Imaging Web-Based Applications

    Get PDF
    The rapid growth of digital technology in medical fields over recent years has increased the need for applications able to manage patient medical records, imaging data, and chart information. Web-based applications are implemented with the purpose to link digital databases, storage and transmission protocols, management of large volumes of data and security concepts, allowing the possibility to read, analyze, and even diagnose remotely from the medical center where the information was acquired. The objective of this paper is to analyze the use of the Extensible Markup Language (XML) language in web-based applications that aid in diagnosis or treatment of patients, considering how this protocol allows indexing and exchanging the huge amount of information associated with each medical case. The purpose of this paper is to point out the main advantages and drawbacks of the XML technology in order to provide key ideas for future web-based applicationsPeer ReviewedPostprint (author's final draft

    Learning about innovation in Europe’s regional policy

    Get PDF
    In the good old times scholars and practitioners arguing in favor of a regional dimension of innovation policies felt like being the avant-garde of new, forward-looking thinking against the old-fashioned conventional wisdom, according to which “grand” industrial policy inherently required the full strength of the Nation State or – for some – the new European “super-State”. The former looked for answers from a new territorial and systemic perspective, paying particular attention to SMEs and endogenous capacities rather than searching from exogenous help by, for example, luring inward investment, typically branch plants from multinational companies, through fiscal incentives . At the same time, the emphasis on innovation implied a departure from traditional regional policies, focused on the transfer of resources from “rich” to “poor” areas and on providing basic infrastructures to disadvantaged regions in the name of cohesion objectives.

    The changing face of innovation policy: implications for the Northern Ireland economy

    Get PDF
    No description supplie

    Risk analysis methodology survey

    Get PDF
    NASA regulations require that formal risk analysis be performed on a program at each of several milestones as it moves toward full-scale development. Program risk analysis is discussed as a systems analysis approach, an iterative process (identification, assessment, management), and a collection of techniques. These techniques, which range from simple to complex network-based simulation were surveyed. A Program Risk Analysis Handbook was prepared in order to provide both analyst and manager with a guide for selection of the most appropriate technique

    Code Difference Guided Adversarial Example Generation for Deep Code Models

    Full text link
    Adversarial examples are important to test and enhance the robustness of deep code models. As source code is discrete and has to strictly stick to complex grammar and semantics constraints, the adversarial example generation techniques in other domains are hardly applicable. Moreover, the adversarial example generation techniques specific to deep code models still suffer from unsatisfactory effectiveness due to the enormous ingredient search space. In this work, we propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differences between the target input (i.e., a given code snippet as the model input) and reference inputs (i.e., the inputs that have small code differences but different prediction results with the target input) to guide the generation of adversarial examples. It considers both structure differences and identifier differences to preserve the original semantics. Hence, the ingredient search space can be largely reduced as the one constituted by the two kinds of code differences, and thus the testing process can be improved by designing and guiding corresponding equivalent structure transformations and identifier renaming transformations. Our experiments on 15 deep code models demonstrate the effectiveness and efficiency of CODA, the naturalness of its generated examples, and its capability of enhancing model robustness after adversarial fine-tuning. For example, CODA reveals 88.05% and 72.51% more faults in models than the state-of-the-art techniques (i.e., CARROT and ALERT) on average, respectively.Comment: Accepted by ASE 202
    • 

    corecore