244 research outputs found

    Towards New Classes of Intelligent Cognitive Information Systems for Semantic Pattern Classification

    Get PDF
    This paper introduces two new classes of specialised vision systems called UBIAS and E-UBIAS. Such systems belong to the group of cognitive reasoning systems and are designed for the semantic analysis of visual patterns in the form of medical images. Proposed systems are predecessors of a new generation of intelligent systems dedicated for understanding medical diagnostic visualization and using this data as biometric characteristics

    Security issues on digital watermarking algorithms

    Get PDF
    This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems

    Better, Faster, Stronger: Outcomes of a Language Sample Transcription and Coding Training Study

    Get PDF
    Although language sample analysis (LSA) is considered an important tool for high-quality child language assessment, surveys have found that its use is quite limited by school-based speech-language pathologists (SLPs). Two of the reasons often cited are limited time and limited expertise (Kemp & Klee, 1997; Pavelko et al., 2016). This study aims to evaluate the outcomes of a language sample training program on SLP studentsā€™ accuracy, efficiency, and confidence with language sample transcription and coding. Upper-division SLP undergraduates and graduate students participated in a self-paced language sample training and practice program. Participants completed online language transcription and coding training and practiced transcribing 7-10 narrative child language samples. After each one, they entered information into the quiz tool in the universityā€™s online learning management system and received automated, individualized, and specific feedback. The accuracy and time needed for the language transcriptions were recorded and analyzed. The results indicated that the participants significantly increased their accuracy and reduced the time needed for transcription and coding. They also reported a significant increase in their confidence level with language sample transcription. The results suggest that increased training and practice opportunities that involve specific feedback will better prepare new clinicians to use language sample analysis in clinical practice

    METHODS OF COGNITIVE ANALYSIS IN MEDICAL INFORMATION SYSTEMS OF DSS-TYPE

    Get PDF
    This paper demonstrates that AI methods, in particular linguistic mechanisms of semanticmeaning reasoning can be applied to the development of intelligent IT systems. They enablealso conducting an in-depth meaning analysis in the presented DDS information systems.This paper presents also IT mechanisms of object meaning description on selected examplesof spinal cord image analysis. The procedures for such semantic reasoning are based on themodel of cognitive resonance. They have been applied to the task of meaning interpretationof a selected type of central nervous system diagnostic images, as an intelligent analysismodule in IT systems. The application presented in this paper is of research character and itserves the preparation of eļ¬ƒcient lesion detection methods applied to a dataset originatingfrom magnetic and resonance examinations of the spinal cord structures

    Human centered computing for future generation computer systems

    Get PDF

    Innovative cryptographic approaches to computer systems security

    Get PDF
    Advanced information security aspects concern the protection and encryption of secure, strategic and important information. These scientific problems and practical solutions are rooted in cryptography, which uses algorithms and protocols for ensuring information confidentiality and information splitting techniques, as well methods of reconstructing information.Innovative approaches allow to guarantee that information security focuses around data splitting and sharing techniques as well as data reconstruction. Such algorithms dedicated to information sharing are called threshold schemes.The main idea of this thesis is to propose such techniques, which allow to create new models of systems security, dedicated to the management of shared strategic information. Special emphasis will be put on multi-level threshold schemes. What characterises such a division is the possibility of reconstructing information from sets containing various numbers of parts (shares) obtained from the divided secret information. This problem has not been fully elaborated yet, but it seems extremely important from the perspective of the future development of modern systems security.Hence in this thesis its Author will discuss the development of threshold schemes for information sharing and will demonstrate the possibility and the reasons behind using them to manage secret information in different structures and levels. These algorithms will be proposed by the Author of this dissertation and, after theoretical evaluation, will be described step by step.The Author will propose new methods of information splitting, based on new threshold schemes used for secure/strategic/important information division, using mathematical linguistic formalisms. Such procedures will be described as linguistic threshold schemes. Mathematical linguistic techniques can be used in information splitting procedures and for the development new algorithms for securing data, using these techniques. Moreover, another class of threshold schemes, called biometric threshold schemes, will be proposed. Such schemes can use selected personal or individual data to mark secret parts, split secret information and to restore the original data.The basis of these proposed innovative approaches to cyber-systems security are new protocols, which use linguistic and biometric threshold schemes.The main solution of the proposed algorithms is the creation of a new generation of computer and cyber-systems by means of applying new classes of security protocols, as described in this thesis.In addition, an attempt will be dame to define new methods that could extend the current knowledge and practical solutions and which can contribute to improving the decision-making processes by means of acquisition, storage and retrieval of secret information in different organisations and at knowledge levels.The interdisciplinary nature of the proposed solutions create the subject of security systems, which constitutes part of cryptography and informatics, being a new challenge for the research and applications.博士(å·„å­¦)ę³•ę”æ大学 (Hosei University

    Urazy klatki piersiowej - postępowanie w warunkach przedszpitalnych

    Get PDF
    Nierecenzowany artykuł poglądowyUrazy klatki piersiowej stanowią poważny problem i dotykają gÅ‚Ć³wnie ludzi młodych, ktĆ³rzy nie przestrzegają zasad bezpieczeństwa. Urazy te dzieli się na tępe, ktĆ³re mogą uszkodzić narządy klatki piersiowej i brzucha oraz penetrujące, ktĆ³re bezpośrednio zagrażają życiu. Priorytetem w postępowaniu ratowniczym jest przeprowadzenie bardzo dokładnie szybkiego badania urazowego. Na jego podstawie można rozpoznać obrażenia zwane ā€žÅ›miertelną dwunastkąā€. W artykule przedstawiono schematy postępowania w niedrożności drĆ³g oddechowych, otwartej odmie opłucnowej, wiotkiej klatce piersiowej, prężnej odmie opłucnowej, krwawieniu do jamy opłucnej oraz tamponadzie serca, ponieważ można je rozpoznać i skutecznie wstępnie zaopatrzyć w postępowaniu przedszpitalnym.Chest injuries are a serious problem mainly affecting young people who disobey the rules of safety. Injuries are divided into blunt which can damage the organs of the chest and abdomen and penetration which directly threaten life. The priority in the procedure is to thoroughly research a rapid trauma. On the basis of the damage that can be identified called "deadly dozen". This paper presents workflows in airway obstruction, open pneumothorax, flail chest, tension pneumothorax, pleural bleeding and cardiac tamponade, because they can be recognized and effectively pre-treated in the prehospital proceeding

    Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database

    Full text link
    In this paper we present a novel architecture for storing visual data. Effective storing, browsing and searching collections of images is one of the most important challenges of computer science. The design of architecture for storing such data requires a set of tools and frameworks such as SQL database management systems and service-oriented frameworks. The proposed solution is based on a multi-layer architecture, which allows to replace any component without recompilation of other components. The approach contains five components, i.e. Model, Base Engine, Concrete Engine, CBIR service and Presentation. They were based on two well-known design patterns: Dependency Injection and Inverse of Control. For experimental purposes we implemented the SURF local interest point detector as a feature extractor and KK-means clustering as indexer. The presented architecture is intended for content-based retrieval systems simulation purposes as well as for real-world CBIR tasks.Comment: Accepted for the 14th International Conference on Artificial Intelligence and Soft Computing, ICAISC, June 14-18, 2015, Zakopane, Polan

    Graph Image Languages In Semantic Description Of Spatial Coronary Arteries Structure

    Get PDF
    In this paper has been proposed developing the new syntactic ā€“ semantic meaning descriptionof spatial coronary arteries structure. Thanks such description will be possible to makeessentially steered semantic interpretation of section coronary arteries morphology, what willallow us fast identiļ¬cation and automatisation of lumen stricture detection. In this aim hasbeen used graph image languages based on the expansive graph grammars of edNLC type,enabling creation the universal and informative meaning description of spatial coronaryarteries structure. Application of such semantic description in the integrated modules ofintelligent systems medical diagonosis, supporting the early detection stricture which defectthe ļ¬‚ow of oxidizing blood to given area of cardiac muscle
    • ā€¦
    corecore