Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Engineering

Attitudes Of Health Professionals To Electronic Data Sharing Within An Integrated Care Electronic Health Record (Icehr), Charyl O'Malley, Damon Berry, Mary Sharp Nov 2010

Attitudes Of Health Professionals To Electronic Data Sharing Within An Integrated Care Electronic Health Record (Icehr), Charyl O'Malley, Damon Berry, Mary Sharp

Conference Papers

It is estimated that 98,000 people die in hospitals yearly in the USA as a result of medical errors (Agency for Healthcare Research and Quality, 2009). Electronic Health Records (EHR) can offer improved patient safety. EHRs are being implemented by many countries, however, not all health professionals have welcomed them (MORI Social Research Institute, 2006). As outlined in the National Health Information Strategy (NHIS) document, Ireland has plans to introduce an EHR. Attitudes of health professionals are a significant factor for the successful implementation and adoption of a new clinical information system. This study aimed to gauge the attitude of …


A Quiet Success Story In The Laboratory: Survey Of 30 Implementations Of The Astm 1394 Standard For Analyser Interfaces, Brian Markey, Damon Berry Nov 2010

A Quiet Success Story In The Laboratory: Survey Of 30 Implementations Of The Astm 1394 Standard For Analyser Interfaces, Brian Markey, Damon Berry

Conference Papers

In 1991 the American Society of Testing and Materials (ASTM) introduced the first version of a standard called ASTM E1394-91 for communication between centralised clinical analysers and host systems. For nearly 20 years this low key standard has been used as the basis for analyser host communications. A minor revision of the standard (ASTM1394-97) was published in 1998. This work gives a brief summary of the development of lab messages that led to the introduction and continued use of the standard. The authors also present a review and preliminary analysis of 30 implementations of ASTM E1394. The authors investigated 30 …


A Numerical Methodology To Fully Elucidate The Altered Wall Shear Stress In A Stented Coronary Artery, Jonathan Murphy, Fergal Boyle Nov 2010

A Numerical Methodology To Fully Elucidate The Altered Wall Shear Stress In A Stented Coronary Artery, Jonathan Murphy, Fergal Boyle

Articles

Arterial restenosis after coronary stenting is caused by excessive tissue growth which is stimulated by arterial injury and alterations to the hemodynamic wall shear stress (WSS). Recent numerical studies have predicted only minor differences in the altered WSS between different stent designs using a commonly employed threshold assessment technique. While it is possible that there are only minor differences, it is more likely that this assessment technique is incapable of fully elucidating the alterations to the WSS created by stent implantation. This paper proposes a methodology that involves a more complete investigation into the stentinduced alterations of WSS by incorporating …


A Similarity Matrix For Irish Traditional Dance Music, Padraic Lavin Nov 2010

A Similarity Matrix For Irish Traditional Dance Music, Padraic Lavin

Dissertations

It is estimated that there are between seven and ten thousand Irish traditional dance tunes in existence. As Irish musicians travelled the world they carried their repertoire in their memories and rarely recorded these pieces in writing. When the music was passed down from generation to generation by ear the names of these pieces of music and the melodies themselves were forgotten or changed over time. This has led to problems for musicians and archivists when identifying the names of traditional Irish tunes.

Almost all of this music is now available in ABC notation from online collections. An ABC file …


Mirthconnect Howto Document, Sebastien Pardon, Damon Berry Sep 2010

Mirthconnect Howto Document, Sebastien Pardon, Damon Berry

Reports

This document aims at describing the steps involved in installing and configuring Mirth Connect so as to produce an EN13606-compliant record extract from an HL7v2 message using the LinkedEHR- produced xquery.


A Cross-Layer Modification To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan Sep 2010

A Cross-Layer Modification To The Dsr Routing Protocol In Wireless Mesh Networks, Mustafa Ramadhan

Doctoral

A cross-layer modification to the DSR routing protocol that finds high throughput paths in WMNs has been introduced in this work. The Access Efficiency Factor (AEF) has been introduced in this modification as a local congestion avoidance metric for the DSR routing mechanism as an alternative to the hop count (Hc) metric. In this modification, the selected path is identified by finding a path with the highest minimum AEF (max_min_AEF) value. The basis of this study is to compare the performance of the Hc and max_min_AEF as routing metrics for the DSR protocol in WMNs using the OPNET modeler. Performance …


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …


Cloud Computing For Schools, Shane O'Doherty Jul 2010

Cloud Computing For Schools, Shane O'Doherty

Dissertations

This project evaluates previous Information and Communication Technology policy and practice relating to primary schools in Ireland with a view to suggesting a better way forward in light of advances in ICT, such as the availability of fast broadband services, including fibre broadband, browser-based applications and the advent of cloud computing. Cloud computing refers to the Internet as a source of both software programs and also data retention, in effect the Internet provides the software and data services via browsers to users who may remain entirely unaware of the technology at work, uncluttered by hardware or software licensing issues or …


Suitable Knowledge Management In Project Environment, Taya Polyaninova Jun 2010

Suitable Knowledge Management In Project Environment, Taya Polyaninova

Dissertations

Knowledge is becoming one of the main assets for organizations that want to improve their competitiveness in currently changing market. Knowledge comes from different sources within organizations, such as internal processes, projects, customers and stakeholder information. As markets and the way of doing things changes, many companies implement different projects to deal with those changes, which leads to accumulation of knowledge and information. Companies use Knowledge Management to create, identify and distribute knowledge and experiences arising from projects within organisation. However, as projects are done to create unique deliverables and they are never the same, there is a difficulty in …


A Web And Mobile System For Environmental Decision Support, James Carswell, Keith Gardiner, Michela Bertolotto, Andrea Rizzine May 2010

A Web And Mobile System For Environmental Decision Support, James Carswell, Keith Gardiner, Michela Bertolotto, Andrea Rizzine

Books/Book chapters

Current field data collection methods for many of today’s scientific and other observer/monitor type applications are still entrenched in the “clipboard age”, requiring manual data transcription to a database management system at some (often much) later date, and only allows for visualisation and analysis of recently captured field data “back in the lab”. This chapter is targeted at progressing today’s pen & paper methodology into the spatially enabled mobile computing age of realtime multi-media data input, integration, visualisation, and analysis simultaneously both in the field and the lab. The system described is customized to the specific needs of the Canadian …


Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff May 2010

Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff

Conference Papers

The paper aims to present the MEDeLEARN project, an ontology-driven virtual learning environment for Medical Information System training. The current training environment for healthcare professionals in the use of essential medical information systems in a large urban training hospital is based on conventional instructor-led training sessions. Problems arise due to the demanding nature of the hospital working environment, causing training to be cancelled or curtailed. This mode of training delivery is deemed to be inefficient and ineffective, with the danger of serious errors occurring as a consequence.

The project investigates whether a virtual learning environment can address the competency gap …


Thermal Robotic Arm Controlled Spraying Via Robotic Arm And Vision System, Dermot Breen Jan 2010

Thermal Robotic Arm Controlled Spraying Via Robotic Arm And Vision System, Dermot Breen

Doctoral

The Tribology Surface Engineering industry is a worldwide multi billion euro industry with significant health and safety risks. The thermal spraying sector of this industry employs the technique of applying molten surface coating material to a substrate via a thermal spray process which is implemented either by manual spraying or pre-programmed robotic systems. The development of autonomous robotic systems for thermal spraying surface coating would significantly improve production and profitability over pre-programmed systems and improve health and safety over manual spraying. The aim of this research was to investigate and develop through software simulation, physical modelling and testing the development …


An Investigation Of Semantic Links To Archetypes In An External Clinical Terminology Through The Construction Of Terminological "Shadows", Sheng Yu, Damon Berry, Jesús Bisbal Jan 2010

An Investigation Of Semantic Links To Archetypes In An External Clinical Terminology Through The Construction Of Terminological "Shadows", Sheng Yu, Damon Berry, Jesús Bisbal

Conference Papers

The two-level model based specifications for electronic health record communication EHRcom (ISO 13606) and openEHR both support the embedding of terminological references in Archetypes. This terminological binding can be created manually by a health terminology expert during Archetype design, and the binding is assessed during Archetype evaluation. There has also been some recent work on using lexical queries to generate term sets to represent concepts in Archetypes. This work created an information construct which we call a Terminological Shadow that links Archetype nodes to sets of candidate concepts from a terminology system. The coding scheme used for this work is …


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle Jan 2010

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn Jan 2010

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher. …


A Machine Learning Approach To Hierarchical Categorisation Of Auditory Objects, William Coleman, Sarah Jane Delany, Charlie Cullen, Ming Yan Dr. Jan 2010

A Machine Learning Approach To Hierarchical Categorisation Of Auditory Objects, William Coleman, Sarah Jane Delany, Charlie Cullen, Ming Yan Dr.

Articles

With the advent of new audio delivery technologies comes opportunities and challenges for content creators and providers. The proliferation of consumption modes (stereo headphones, home cinema systems, ‘hearables’), media formats (mp3, CD, video and audio streaming) and content types (gaming, music, drama & current affairs broadcasting) has given rise to a complicated landscape where content must often be adapted for multiple end-use scenarios. The concept of object-based audio envisages content delivery not via a fixed mix but as a series of auditory objects which can then be controlled either by consumers or by content creators & providers via accompanying metadata. …


Using Virtual Reality To Enhance Electrical Safety And Design In The Built Environment, Martin Barrett, Jonathan Blackledge, Eugene Coyle Jan 2010

Using Virtual Reality To Enhance Electrical Safety And Design In The Built Environment, Martin Barrett, Jonathan Blackledge, Eugene Coyle

Articles

Electricity and the inherent risks associated with its use in the built environment have long since been a priority for the electrical services industry and also the general public who must live and work in this environment. By its nature virtual reality has the advantage of being safe for both the user and equipment. In addition, it offers the user an opportunity to be exposed to a range of scenarios and conditions that either occur infrequently or are hazardous to replicate. This paper presents a prototype desktop virtual reality model, to enhance electrical safety and design in the built environment. …


Social Networking Sites: Evaluating And Investigating Their Use In Academic Research, Fiona Redmond Jan 2010

Social Networking Sites: Evaluating And Investigating Their Use In Academic Research, Fiona Redmond

Dissertations

Researchers must collect and analyse new data that will enhance the body of knowledge. It is for this reason that data is of major importance to researchers. All aspects of a research project involve data, from navigating existing data, to understanding how data is used in the world and why it is important to learn to collect data and make predictions. Researchers need to consider the types of data that are possible and examine and weight each option so they can determine what sources of data will answer the research questions or hypotheses.

Researchers, who require a large amount of …


Navigating The Corridors Of Power : Using Rfid And Compass Sensors For Robot Localisation And Navigation, Yan Lee, Brian Mac Namee, John D. Kelleher Jan 2010

Navigating The Corridors Of Power : Using Rfid And Compass Sensors For Robot Localisation And Navigation, Yan Lee, Brian Mac Namee, John D. Kelleher

Conference papers

Localisation and navigation are still of the most important issues in mobile robotics. In certain indoor application scenarios Radio frequency identification (RFID) based absolute localisation has been found to be especially successful in supporting navigation. In this paper we examine the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We present a proof of concept system and show how it can be used to localized within and navigate through an environment.


Forty Years Of Movie Hacking: Considering The Potential Implications Of The Popular Media Representation Of Computer Hackers From 1968 To 2008, Damian Gordon Jan 2010

Forty Years Of Movie Hacking: Considering The Potential Implications Of The Popular Media Representation Of Computer Hackers From 1968 To 2008, Damian Gordon

Articles

Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis technique, guidelines are developed which distinguish those movies that actually have the potential to create a perception with the general public. The resultant dataset is …


Speech Intelligibility From Image Processing, Andrew Hines, Naomi Harte Jan 2010

Speech Intelligibility From Image Processing, Andrew Hines, Naomi Harte

Articles

Hearing loss research has traditionally been based on perceptual criteria, speech intelligibility and threshold levels. The development of computational models of the auditory-periphery has allowed experimentation via simulation to provide quantitative, repeatable results at a more granular level than would be practical with clinical research on human subjects.


Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi Jan 2010

Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi

Conference papers

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …


Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher Jan 2010

Helmsman, Set A Course : Using A Compass And Rfid Tags For Indoor Localisation And Navigation, Yan Li, Brian Mac Namee, John D. Kelleher

Conference papers

Localisation and navigation are still two of the most important issues in mobile robotics. In certain indoor application scenarios RFID (radio frequency identification)-based absolute localisation has been found to be especially successful in supporting navigation. In this paper we evaluate the feasibility of an RFID and compass based approach to robot localisation and navigation for indoor environments that are dominated by corridors. We describe our system and evaluate its performance in a small, but full-scale, test environment.


Evaluating Sensorineural Hearing Loss With An Auditory Nerve Model Using A Mean Structural Similarity Measure, Andrew Hines, Naomi Harte Jan 2010

Evaluating Sensorineural Hearing Loss With An Auditory Nerve Model Using A Mean Structural Similarity Measure, Andrew Hines, Naomi Harte

Conference papers

Hearing loss research has traditionally been based on perceptual criteria, speech intelligibility and threshold levels. The development of computational models of the auditory-periphery has allowed experimentation via simulation to provide quantitative, repeatable results at a more granular level than would be practical with clinical research on human subjects. This work seeks to create an objective measure to automate this inspection process and ranks hearing losses based on auditory-nerve discharge patterns. A systematic way of assessing phonemic degradation using the outputs of an auditory nerve model for a range of sensorineural hearing losses would aid in rapid prototyping development of speech-processing …