The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the years, JavaTM has become a popular language for standalone as well as Web based applications. Portability and security are the major reasons for JavaTM success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing...
Operational continuity of data centers faces challenges by experienced cyber attackers and occasional natural disasters. Assessment of a data center's resilience for complex and realistic scenarios is very important for various reasons such as: system specification, design and enhancement. Yet data center resilience evaluation is a demanding process because of the complexity of its systems and the...
In this work the authors used the OPNET software simulation tool to simulate different possible cases of the resilient information systems and its performance. To demonstrate the performance variation different performance metrics at multiple layer of the compunctions protocol have been collect. The model was configured to use real life traffic traces and generated traffic to reflect activities of...
We propose a technique for the automated detection of malignant masses in screening mammography. The technique is based on the presence of concentric layers surrounding a focal area with suspicious morphological characteristics and low relative incidence in the breast region. Mammographic locations with high concentration of concentric layers with progressively lower average intensity are considered...
The purpose of this study is to develop and evaluate a probabilistic framework for reliability analysis of information-theoretic computer-assisted detection (IT-CAD) systems in mammography. The study builds upon our previous work on a feature-based reliability analysis technique tailored to traditional CAD systems developed with a supervised learning scheme. The present study proposes a probabilistic...
The purpose of the study is to investigate the significance of MPEG-7 textural features for improving the detection of masses in screening mammograms. The detection scheme was originally based on morphological directional neighborhood features extracted from mammographic regions of interest (ROIs). Receiver operating characteristics (ROC) was performed to evaluate the performance of each set of features...
In this study we developed a new method for minicolumnar identification in brain images. We measure width of minicolumns by using myelinated bundles of axons. Using recursive spectral segmentation by Otsu thresholding we separate different parts of neocoretex and extract myelinated bundles. By tracing lines perpendicular to them we measure minicolumnar width. We also measure macrocolumnar width by...
In this paper we present an improved segmentation algorithm that recursively explores various thresholding levels until it reaches a termination criteria. This segmentation algorithm is based on earlier work adapting Otsu's thresholding approach to myelinated bundles of axons in cortical tissue. Experimentation using over 120 images has confirmed that this termination criteria provides visibly acceptable...
Previously we presented a morphologic concentric layered (MCL) algorithm for the detection of masses in screening mammograms. The algorithm achieved high sensitivity (92%) but it also generated 3.26 false positives (FPs) per image. In the present study we propose a false positive reduction strategy based on using an artificial neural network that merges feature and knowledge-based analysis of suspicious...
The investigators are engaged in developing Cybersecurity curriculum and tutorial material that illuminate this essential issue from the public interest point of view. This concerns needs, priorities, and specific relevant technologies, based on sources published by the Federal government and public organizations. As a whole, the material will cover a complete 500-level (graduate, open to undergraduates)...
Previously we presented an unsupervised self-organizing map (SOM) for segmentation of the breast region in screening mammograms. This study improves upon our earlier technique by (1) enhancing the detection of the breast region near the skin line, as well as (2) reducing the computational complexity. Contrary to the initial technique, the improved one exploits global image properties extracted at...
An efficient adaptive approach for parallel and distributed simulation (PADS) is formalized and implemented. The aggressive adaptive-risk (AAR) approach aims at reducing cascading rollbacks in large and complex simulations by clustering optimistic logical processes on each processor, and providing these processes the ability to adjust their degree of risk, at run time, to a good operating point based...
A review of the state of the art in parallel and distributed simulation (PADS) is given. Sample performance results of currently used PADS techniques are presented using a network of workstations. The results demonstrate the capabilities and limitations of these techniques, and verify the logic of the current directions in PADS research.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.