307 research outputs found

    Visual Importance-Biased Image Synthesis Animation

    Get PDF
    Present ray tracing algorithms are computationally intensive, requiring hours of computing time for complex scenes. Our previous work has dealt with the development of an overall approach to the application of visual attention to progressive and adaptive ray-tracing techniques. The approach facilitates large computational savings by modulating the supersampling rates in an image by the visual importance of the region being rendered. This paper extends the approach by incorporating temporal changes into the models and techniques developed, as it is expected that further efficiency savings can be reaped for animated scenes. Applications for this approach include entertainment, visualisation and simulation

    e-Research Meets e-Health

    Get PDF
    This paper appeared at the Australasian Workshop on Health Data and Knowledge Management (HDKM 2008), Wollongong, NSW, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 80. James R. Warren, Ping Yu, John Yearwood and Jon D. Patrick, Eds. Reproduction for academic, not-for profit purposes permitted provided this text is included.This paper considers some key aspects of e-Research methodology and infrastructure which are relevant to e-Health, and identifies some promising areas in e-Health where these aspects could be used beneficially

    DESIGN CONSIDERATIONS FOR DIGITAL IMAGE LIBRARIES

    Get PDF
    Design of digital image libraries requires choices for numerous configuration aspects, such as resolution and display settings. These aspects can be categorized into different types of design criteria based on whether they are a human viewing and usage factor, or a stage in the image library management process. The criteria can also be applied in a hierarchy of nested versions of access to the library to suit different usage circumstances. Here we present a framework for design criteria using this approach, and apply it to some example cases

    Recent Directions in Telemedicine: Review of Trends in Research and Practice

    Get PDF
    This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.Objectives: Healthcare is now routinely delivered by telecommunications-based services in all developed countries and an increasing number of developing countries. Telemedicine is used in many clinical specialities and across numerous healthcare settings, which range from mobile patient-centric applications to complex interactions amongst clinicians in tertiary referral hospital settings. This paper discusses some recent areas of significant development and progress in the field with the purpose of identifying strong trends in both research and practice activities. Methods: To establish the breadth of new ideas and directions in the field, a review of literature was made by searching PubMed for recent publications including terms (telemedicine OR telehealth) AND (challenge OR direction OR innovation OR new OR novel OR trend), for all searchable categories. 3,433 publications were identified that have appeared since January 1, 2005 (2,172 of these since January 1, 2010), based on a search conducted on June 1, 2015. Results: The current interest areas in these papers span both synchronous telemedicine, including intensive care, emergency medicine, and mental health, and asynchronous telemedicine, including wound and burns care, dermatology and ophthalmology. Conclusions: It is concluded that two major drivers of contemporary tele medicine development are a high volume demand for a particular clinical service, and/or a high criticality of need for clinical exper tise to deliver the service. These areas offer promise for further study and enhancement of applicable telemedicine methods and have the potential for large-scale deployments internationally, which would contribute significantly to the advancement of healthcare

    Cloud-based Medical Image Collection Database with Automated Annotation

    Get PDF
    Typical medical image annotation systems use manual annotation or complex proprietary software such as computer-assisted-diagnosis. A more objective approach is required to achieve generalised Content Based Image Retrieval (CBIR) functionality. The Automated Medical Image Collection Annotation (AMICA) toolkit described here addresses this need. A range of content analysis functions are provided to tag images and image regions. The user uploads a DICOM file to an online portal and the software finds and displays images that have similar characteristics. AMICA has been developed to run in the Microsoft cloud environment using the Windows Azure platform, to cater for the storage requirements of typical large medical image databases

    A conceptual framework for secure use of mobile health

    Get PDF
    Mobile health is characterised by its diversity of applicability, in a multifaceted and multidisciplinary healthcare delivery continuum. In an environment of rapid change with the increasing development of mobile health, issues related to security and privacy must be well thought out. The different competing tensions in the development of mobile health from the device technologies and associated regulation, to clinical workflow and patient acceptance, require a framework for security that reflects the complex structure of this emerging field. There are three distinct associated elements that require investigation: technology, clinical, and human factors. Each of these elements consists of multiple aspects and there are specific risk factors to be addressed successively and co-dependently in each case. The fundamental approach to defining a conceptual framework for secure use of mobile health requires systematic identification of properties for the tensions and critical factors which impact these elements. The resulting conceptual framework presented here can be used for new critique, augmentation or deployment of mobile health solutions from the perspective of data protection and security

    Evaluation Study of Australian Telehealth Projects

    Get PDF
    This paper appeared at the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 164, Anthony Maeder and Jim Warren, Ed. Reproduction for academic, not-for profit purposes permitted provided this text is included.This paper provides an overview of selected telehealth projects involving pilot or trial implementations, undertaken in Australia in the period since 2000, which have undergone substantial formal evaluations reported in the peer reviewed scientific literature. Barriers and enablers reported for these telehealth projects are identified and the evaluation aspects are presented using a recently proposed generalised evaluation framework

    The Potential for Machine Learning Analysis over Encrypted Data in Cloud-based Clinical Decision Support - Background and Review

    Get PDF
    This paper appeared at the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 164, Anthony Maeder and Jim Warren, Ed. Reproduction for academic, not-for profit purposes permitted provided this text is includedIn an effort to reduce the risk of sensitive data exposure in untrusted networks such as the public cloud, increasing attention has recently been given to encryption schemes that allow specific computations to occur on encrypted data, without the need for decryption. This relies on the fact that some encryption algorithms display the property of homomorphism, which allows them to manipulate data in a meaningful way while still in encrypted form. Such a framework would find particular relevance in Clinical Decision Support (CDS) applications deployed in the public cloud. CDS applications have an important computational and analytical role over confidential healthcare information with the aim of supporting decision-making in clinical practice. This review paper examines the history and current status of homomoprhic encryption and its potential for preserving the privacy of patient data underpinning cloud-based CDS applications

    RFID Localisation For Internet Of Things Smart Homes: A Survey

    Full text link
    The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. Localisation in indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective, high readability rates, automatic identification and, importantly, its energy efficiency characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications. It presents several comparable studies of RFID based projects in smart homes and discusses the applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home systems.Comment: 18 pages, 2 figures, 3 table

    A conceptual framework for secure mobile health

    Get PDF
    Mobile health is characterised by its diversity of applicability, in a multifaceted and multidisciplinary healthcare delivery continuum. In an environment of rapid change with the increasing development of mobile health, issues related to security and privacy must be well thought out. The different competing tensions in the development of mobile health from the device technologies and associated regulation, to clinical workflow and patient acceptance, require a framework for security that reflects the complex structure of this emerging field. There are three distinct associated elements that require investigation: technology, clinical, and human factors. Each of these elements consists of multiple aspects and there are specific risk factors to be addressed successively and co-dependently in each case. The fundamental approach to defining a conceptual framework for secure use of mobile health requires systematic identification of properties for the tensions and critical factors which impact these elements. The resulting conceptual framework presented here can be used for new critique, augmentation or deployment of mobile health solutions from the perspective of data protection and security
    • …
    corecore