639 research outputs found
The DICEMAN description schemes for still images and video sequences
To address the problem of visual content description, two Description Schemes (DSs) developed within the context of a European ACTS project known as DICEMAN, are presented. The DSs, designed based on an analogy with well-known tools for document description, describe both the structure and semantics of still images and video
sequences. The overall structure of both DSs including the various sub-DSs and descriptors (Ds) of which they are composed is described. In each case, the hierarchical sub-DS for describing structure can be constructed using
automatic (or semi-automatic) image/video analysis tools. The hierarchical sub-DSs for describing the semantics, however, are constructed by a user. The integration of the two DSs into a video indexing application currently
under development in DICEMAN is also briefly described.Peer ReviewedPostprint (published version
Predictive genomics: A cancer hallmark network framework for predicting tumor clinical phenotypes using genome sequencing data
We discuss a cancer hallmark network framework for modelling
genome-sequencing data to predict cancer clonal evolution and associated
clinical phenotypes. Strategies of using this framework in conjunction with
genome sequencing data in an attempt to predict personalized drug targets, drug
resistance, and metastasis for a cancer patient, as well as cancer risks for a
healthy individual are discussed. Accurate prediction of cancer clonal
evolution and clinical phenotypes will have substantial impact on timely
diagnosis, personalized management and prevention of cancer.Comment: 5 figs, related papers, visit lab homepage:
http://www.cancer-systemsbiology.org, Seminar in Cancer Biology, 201
ROC dependent event isolation method for image processing based assessment of corroded harbour structures
The localisation and calibration of damage in a structure are often difficult, time consuming, subjective and error prone. The importance of a simple, fast and relatively inexpensive non-destructive technique (NDT) with reliable measurements is thus greatly felt. The usefulness and the efficiency of any such technique are often affected by environmental conditions. The definition of damage and the subsequent interpretation of the possible consequences due to the damage introduce subjectivity into an NDT technique and affect its performance. It is of great importance in terms of practical application to find out the efficiency of an NDT technique in a probabilistic way for various damage definitions and environmental conditions through the use of receiver operating characteristic (ROC) curves. Such variations of performance of an NDT tool can be predicted through simulation processes, and the test conditions conducive to good detections can be isolated and ranked according to their relative efficiency. This paper considers a camera based image analysis technique to identify,quantify and classify damage in structures at various levels of scale. The general method has been applied to identify the affected areas on aluminium due to pitting corrosion. The method depends on the optical contrast of the corroded region with respect to its surroundings, performs intelligent edge detection through image processing techniques and computes each affected and closed region to predict the total area of the affected part, together with its spatial distribution on a two-dimensional plane. The effects of various environmental factors on the quality of such images are simulated from an original photograph. The objectivity and the amount of available information, quantification and localisation and the extent of pitting corrosion are observed, together with the various constructed ROC curves. The method provides the engineer, the owner of the structure and the end-user of the NDT technique with a tool to assess the performance of the structure in an as-built condition and decide on the appropriateness of a certain NDT, under a given environmental condition and a certain definition of damage. Moreover, it allows the findings of the NDT results to be introduced in the decision chain and risk analysis
Informational privacy protections: do state laws offer public health leaders the flexibility they need?
Some scholars have argued that there is a tension between privacy and the public's health. This study explores that tension in a contemporary context by examining the current status of informational privacy laws and by inquiring whether current state statutes are adequate to protect the privacy of public health information during a time when terrorism and globalization appears to be forcing a choice between liberty and security. Two methods were used in this study: 1) a point-in-time policy analysis of state public health privacy laws using criteria previously established by a panel of public health privacy experts; and 2) key informant interviews with federal officials, national organizations, and state health officials and privacy officers. The findings suggested that despite much attention over the past decade, including the development of model state statutes, few states have laws that comprehensively address both public health privacy and disclosure. Both federal and state officials viewed privacy protections for health-related data as important and recognized the tension between privacy interests and the need to share information. Sociopolitical factors and interest groups have driven change in the laws of some states while other states have made few changes to their laws over the past decade. State officials suggested that state public health privacy statutes, where they exist at all, are generally adequate for state public health practice. However, both state and federal officials suggested state laws are sometimes barriers to the inter-jurisdictional sharing of information and may present challenges in the future as federal policies promoting the electronic sharing of health-related information are implemented. And, federal and state key informants acknowledged that the lack of uniformity in laws and practices related to the acquisition, use, and storage of public health information across states is a source of confusion for individuals, health care providers, and government agencies. A universal framework for protecting the privacy of public health information may be useful or necessary and with health reform imminent, the development of electronic medical records, and a pandemic of a novel influenza virus, there may be a window of opportunity to develop policies supporting such a framework
Improved image analysis based corrosion assessment using preprocessing techniques
The importance of non-destructive techniques (NDT) in structural health monitoring programmes is being critically felt in the recent times. The quality of the measured data, often affected by various environmental conditions can be a guiding factor in terms usefulness and prediction efficiencies of the various detection and monitoring methods used in this regard. Often, a preprocessing of the acquired data in relation to the affecting environmental parameters can improve the information quality and lead towards a significantly more efficient and correct prediction process. The improvement can be directly related to the final decision making policy about a structure or a network of structures and is compatible with general probabilistic frameworks of such assessment and decision making programmes. This paper considers a preprocessing technique employed for an image analysis based structural health monitoring methodology to identify sub-marine pitting corrosion in the presence of variable luminosity, contrast and noise affecting the quality of images. A preprocessing of the gray-level threshold of the various images is observed to bring about a significant improvement in terms of damage detection as compared to an automatically computed gray-level threshold. The case dependent adjustments of the threshold enable to obtain the best possible information from an existing image. The corresponding improvements are observed in a qualitative manner in the present study
Recommended from our members
Risks and Outcomes Associated with Disorganized/Controlling Patterns of Attachment at Age Three in the NICHD Study of Early Child Care and Youth Development
Disorganized/controlling attachment in preschool has been found to be associated with maternal and child maladjustment, making it of keen interest in the study of psychopathology. Additional work is needed, however, to better understand disorganized/controlling attachment occurring as early as age three. The primary aims of this study were to evaluate risk factors and outcomes associated with disorganized/controlling behavior at age three and to evaluate the risk factors and outcomes differentiating the four subtypes of disorganized/controlling attachment. Analyses were conducted with the first two phases of the NICHD Study of Early Child Care and Youth Development, a prospective study of 1,364 children from birth. At 36 months of age, across the attachment-relevant domains of maternal well-being, mother-child interactions, and child social adaptation, the disorganized/controlling group evidenced the most maladaptive patterns in comparison to both secure and insecure-organized groups. At 54 months of age, the disorganized/controlling group displayed the highest levels of internalizing and externalizing behavior problems, as rated by mothers and teachers, and the lowest quality relationships with teachers. Significant differences found among the disorganized/controlling subtypes indicated that the behaviorally disorganized and controlling-punitive subtypes had more maladaptive patterns across variables than did the controlling-caregiving and controlling-mixed subtypes
Integrating nursing theory, practice and research through collaborative research
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/75657/1/j.1365-2648.1989.tb00912.x.pd
Serotonin receptor antagonism improves distal perfusion after hindlimb ischemia in ApoE-/-Mice
Becoming-Bertha: virtual difference and repetition in postcolonial 'writing back', a Deleuzian reading of Jean Rhysâs Wide Sargasso Sea
Critical responses to Wide Sargasso Sea have seized upon Rhysâs novel as an exemplary model of writing back. Looking beyond the actual repetitions which recall BrontĂ«âs text, I explore Rhysâs novel as an expression of virtual difference and becomings that exemplify Deleuzeâs three syntheses of time. Elaborating the processes of becoming that Deleuzeâs third synthesis depicts, Antoinetteâs fate emerges not as a violence against an original identity. Rather, what the reader witnesses is a series of becomings or masks, some of which are validated, some of which are not, and it is in the rejection of certain masks, forcing Antoinette to become-Bertha, that the greatest violence lies
TCT-164 Assessment of the efficacy of ex vivo platelet transfusion in the restoration of platelet function in acute coronary syndrome and PCI presenters treated with clopidogrel, prasugrel or ticagrelor - The APTITUDE study
- âŠ