244 research outputs found
Towards New Classes of Intelligent Cognitive Information Systems for Semantic Pattern Classification
This paper introduces two new classes of specialised vision systems called UBIAS and E-UBIAS. Such systems belong to the group of cognitive reasoning systems and are designed for the semantic analysis of visual patterns in the form of medical images. Proposed systems are predecessors of a new generation of intelligent systems dedicated for understanding medical diagnostic visualization and using this data as biometric characteristics
Security issues on digital watermarking algorithms
This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems
ꬔäø代ć³ć³ćć„ć¼ćæć·ć¹ćć ć®ććć®äŗŗéäøåæć³ć³ćć„ć¼ćć£ć³ć°
å士(å·„å¦)ę³ęæå¤§å¦ (Hosei University
Better, Faster, Stronger: Outcomes of a Language Sample Transcription and Coding Training Study
Although language sample analysis (LSA) is considered an important tool for high-quality child language assessment, surveys have found that its use is quite limited by school-based speech-language pathologists (SLPs). Two of the reasons often cited are limited time and limited expertise (Kemp & Klee, 1997; Pavelko et al., 2016). This study aims to evaluate the outcomes of a language sample training program on SLP studentsā accuracy, efficiency, and confidence with language sample transcription and coding. Upper-division SLP undergraduates and graduate students participated in a self-paced language sample training and practice program. Participants completed online language transcription and coding training and practiced transcribing 7-10 narrative child language samples. After each one, they entered information into the quiz tool in the universityās online learning management system and received automated, individualized, and specific feedback. The accuracy and time needed for the language transcriptions were recorded and analyzed. The results indicated that the participants significantly increased their accuracy and reduced the time needed for transcription and coding. They also reported a significant increase in their confidence level with language sample transcription. The results suggest that increased training and practice opportunities that involve specific feedback will better prepare new clinicians to use language sample analysis in clinical practice
METHODS OF COGNITIVE ANALYSIS IN MEDICAL INFORMATION SYSTEMS OF DSS-TYPE
This paper demonstrates that AI methods, in particular linguistic mechanisms of semanticmeaning reasoning can be applied to the development of intelligent IT systems. They enablealso conducting an in-depth meaning analysis in the presented DDS information systems.This paper presents also IT mechanisms of object meaning description on selected examplesof spinal cord image analysis. The procedures for such semantic reasoning are based on themodel of cognitive resonance. They have been applied to the task of meaning interpretationof a selected type of central nervous system diagnostic images, as an intelligent analysismodule in IT systems. The application presented in this paper is of research character and itserves the preparation of eļ¬cient lesion detection methods applied to a dataset originatingfrom magnetic and resonance examinations of the spinal cord structures
Innovative cryptographic approaches to computer systems security
Advanced information security aspects concern the protection and encryption of secure, strategic and important information. These scientific problems and practical solutions are rooted in cryptography, which uses algorithms and protocols for ensuring information confidentiality and information splitting techniques, as well methods of reconstructing information.Innovative approaches allow to guarantee that information security focuses around data splitting and sharing techniques as well as data reconstruction. Such algorithms dedicated to information sharing are called threshold schemes.The main idea of this thesis is to propose such techniques, which allow to create new models of systems security, dedicated to the management of shared strategic information. Special emphasis will be put on multi-level threshold schemes. What characterises such a division is the possibility of reconstructing information from sets containing various numbers of parts (shares) obtained from the divided secret information. This problem has not been fully elaborated yet, but it seems extremely important from the perspective of the future development of modern systems security.Hence in this thesis its Author will discuss the development of threshold schemes for information sharing and will demonstrate the possibility and the reasons behind using them to manage secret information in different structures and levels. These algorithms will be proposed by the Author of this dissertation and, after theoretical evaluation, will be described step by step.The Author will propose new methods of information splitting, based on new threshold schemes used for secure/strategic/important information division, using mathematical linguistic formalisms. Such procedures will be described as linguistic threshold schemes. Mathematical linguistic techniques can be used in information splitting procedures and for the development new algorithms for securing data, using these techniques. Moreover, another class of threshold schemes, called biometric threshold schemes, will be proposed. Such schemes can use selected personal or individual data to mark secret parts, split secret information and to restore the original data.The basis of these proposed innovative approaches to cyber-systems security are new protocols, which use linguistic and biometric threshold schemes.The main solution of the proposed algorithms is the creation of a new generation of computer and cyber-systems by means of applying new classes of security protocols, as described in this thesis.In addition, an attempt will be dame to define new methods that could extend the current knowledge and practical solutions and which can contribute to improving the decision-making processes by means of acquisition, storage and retrieval of secret information in different organisations and at knowledge levels.The interdisciplinary nature of the proposed solutions create the subject of security systems, which constitutes part of cryptography and informatics, being a new challenge for the research and applications.å士(å·„å¦)ę³ęæå¤§å¦ (Hosei University
Urazy klatki piersiowej - postÄpowanie w warunkach przedszpitalnych
Nierecenzowany artykuÅ poglÄ
dowyUrazy klatki piersiowej stanowiÄ
poważny problem i dotykajÄ
gÅĆ³wnie ludzi mÅodych, ktĆ³rzy
nie przestrzegajÄ
zasad bezpieczeÅstwa. Urazy te dzieli siÄ na tÄpe, ktĆ³re mogÄ
uszkodziÄ
narzÄ
dy klatki piersiowej i brzucha oraz penetrujÄ
ce, ktĆ³re bezpoÅrednio zagrażajÄ
życiu.
Priorytetem w postÄpowaniu ratowniczym jest przeprowadzenie bardzo dokÅadnie szybkiego
badania urazowego. Na jego podstawie można rozpoznaÄ obrażenia zwane āÅmiertelnÄ
dwunastkÄ
ā. W artykule przedstawiono schematy postÄpowania w niedrożnoÅci drĆ³g
oddechowych, otwartej odmie opÅucnowej, wiotkiej klatce piersiowej, prÄżnej odmie
opÅucnowej, krwawieniu do jamy opÅucnej oraz tamponadzie serca, ponieważ można je
rozpoznaÄ i skutecznie wstÄpnie zaopatrzyÄ w postÄpowaniu przedszpitalnym.Chest injuries are a serious problem mainly affecting young people who disobey the rules of
safety. Injuries are divided into blunt which can damage the organs of the chest and abdomen
and penetration which directly threaten life. The priority in the procedure is to thoroughly
research a rapid trauma. On the basis of the damage that can be identified called "deadly
dozen". This paper presents workflows in airway obstruction, open pneumothorax, flail chest,
tension pneumothorax, pleural bleeding and cardiac tamponade, because they can be
recognized and effectively pre-treated in the prehospital proceeding
Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database
In this paper we present a novel architecture for storing visual data.
Effective storing, browsing and searching collections of images is one of the
most important challenges of computer science. The design of architecture for
storing such data requires a set of tools and frameworks such as SQL database
management systems and service-oriented frameworks. The proposed solution is
based on a multi-layer architecture, which allows to replace any component
without recompilation of other components. The approach contains five
components, i.e. Model, Base Engine, Concrete Engine, CBIR service and
Presentation. They were based on two well-known design patterns: Dependency
Injection and Inverse of Control. For experimental purposes we implemented the
SURF local interest point detector as a feature extractor and -means
clustering as indexer. The presented architecture is intended for content-based
retrieval systems simulation purposes as well as for real-world CBIR tasks.Comment: Accepted for the 14th International Conference on Artificial
Intelligence and Soft Computing, ICAISC, June 14-18, 2015, Zakopane, Polan
Graph Image Languages In Semantic Description Of Spatial Coronary Arteries Structure
In this paper has been proposed developing the new syntactic ā semantic meaning descriptionof spatial coronary arteries structure. Thanks such description will be possible to makeessentially steered semantic interpretation of section coronary arteries morphology, what willallow us fast identiļ¬cation and automatisation of lumen stricture detection. In this aim hasbeen used graph image languages based on the expansive graph grammars of edNLC type,enabling creation the universal and informative meaning description of spatial coronaryarteries structure. Application of such semantic description in the integrated modules ofintelligent systems medical diagonosis, supporting the early detection stricture which defectthe ļ¬ow of oxidizing blood to given area of cardiac muscle
- ā¦