The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is generally difficult to identify surface and deep layer muscle activity. If we could identify surface and deep layer muscle activity, we can provide effective tools for rehabilitation. Therefore, in this study, we aim to identify surface and deep layer muscle activity using surface electrodes. We focused on the intersection of muscle fibers of surface layer muscle and deep layer muscle. On such...
Modern epidemiology has made use of a number of mathematical models, including ordinary differential equation (ODE) based models and agent based models (ABMs) to describe the dynamics of how a disease may spread within a population and enable the rational design of strategies for intervention that effectively contain the spread of the disease. Although such predictions are of fundamental importance...
Welcome to the 2012 ASE International Conference on Social Informatics (SocialInformatics 2012), the 2012 ASE International Conference on Cyber Security (CyberSecurity 2012), and the 2012 ASE International Conference on Biomedical Computing (BioMedCom 2012), sponsored by the Academy of Science and Engineering (ASE) and published by the IEEE Computer Society. It is our great pleasure to hold the conferences...
Existing molecular visualizations do a good job of illuminating well-defined structures, but are ill-suited to visualizing subtle organization when the data is almost entirely disordered. We introduce a process to explore these subtle structures by visualizing an abstraction of the data. The process includes a quantitative verification step to mitigate the ambiguity induced by abstraction. We perform...
In today's global society there exists a need to understand and predict the behavior of vector-borne diseases. With globalization, human groups tend to interact with other groups that can have one or multiple types of viruses. Currently, there are many mathematical models for studying patterns of emerging infectious diseases. These mathematical models are based on differential equations and can become...
Molecular dynamics (MD) simulations provide a molecular-resolution physical description of the folding and assembly processes, but the size and the timescales of simulations are limited because the underlying algorithm is computationally demanding. We recently introduced a parallel neighbor list algorithm that was specifically optimized for MD simulations on GPUs. In our present study, we analyze...
In this study, hybrid multi-layered Group Method of Data Handling (GMDH)-type neural network algorithm using principal component-regression analysis is proposed and applied to the computer aided image diagnosis (CAD) of lung cancer. In the GMDH-type neural network, heuristic self-organization method, which is a kind of evolutional computation, is used to organize the neural network architecture. But,...
Heart rate variability (HRV) provides a non-invasive means of quantifying cardiac autonomic activity. It has been shown to be a powerful predictor of arrhythmia related complications in patients surviving the acute phase of myocardial infarction. It has also increasingly been used to measure autonomic nervous system activities. This work aims to study heart rate variability during normal or abnormal...
In tomosynthesis imaging, out-of-focus slice blur problem arises due to incomplete sampling problem. Several approaches have been proposed to deal with this problem. Algebraic reconstruction technique (ART) is one of the most commonly used methods. Total variation (TV) minimization has recently been applied to improve performance of the classical approaches. Though it is able to provide improved results,...
Copyright (c) 2013 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated...
This paper presents a security engineering process for the development of secure systems focusing on the specification and development of the Set-top Boxes. The paper describes the Set-top Box characteristics and functionalities and, using the process and its secure artefacts, models what we call a Domain Security Metamodel that defines all the security properties of that domain and implements them...
The three primary types of cloud computing services are Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). IaaS delivers computer infrastructure including servers, storage and network. PaaS offers the computer platform as a service which facilitates development and deployment of applications. In SaaS, applications are hosted and maintained by a cloud...
In todayâs software development process, security related design decisions are rarely made early in the overall process. Even if security is considered early, this means that in most cases a more-or-less encompassing security requirement analyses is made, Based on this analysis best-practices, ad-hocdesign decisions or individual expertise is used to integrate security during the development...
SQL injection attacks represent a serious threat to any database-driven site and they are one of the most frequent types of attacks. We present here a misuse pattern for retrieving data from a database using SQL injection, which describes the essential and typical characteristics of this type of attack. A misuse pattern describes from the point of view of the attacker, how a type of attack or misuse...
Security by Design and Secure Engineering are among the most pressing challenges in IT Security research and practice. Increased attacker potential and dependence on IT-Systems in economy and in critical infrastructures cause a higher demand in securely engineered systems and thus in new approaches and methodologies. This paper introduces a consistent methodology for designing secure systems during...
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop "Bring Your Own Device" policies to allow their employees to use their devices in the workplace. However, due to emerging attacks and limitations in device resources, it is difficult to trust these devices with access to critical proprietary information. To mitigate this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.