Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Collaborative Research: North East Cyberinfrastructure Consortium, Michael Eckardt Nov 2012

Collaborative Research: North East Cyberinfrastructure Consortium, Michael Eckardt

University of Maine Office of Research Administration: Grant Reports

EPS-0918284, University of Vermont & State Agricultural College, J. L. Van Houten, linked to EPS-0918033 (University of New Hampshire), EPS-0918078 (University of Delaware), EPS-0918018 (University of Maine), EPS-0918061 (University of Rhode Island)
Collaborative Research: North East Cyberinfrastructure Consortium

This award is funded under the American Recovery and Reinvestment Act of 2009 (Public Law 111-5).

The North East Cyberinfrastructure Consortium (NECC) unites Maine (ME), New Hampshire (NH), Vermont (VT), Rhode Island (RI), and Delaware (DE) to support cyber-enabled research that requires analyses of large datasets. The project is organized around sharing resources, expertise and facilities in order to make cyber-enabled collaborative …


Shifts In The Architecture Of The Nationwide Health Information Network, L. Lenert, D. Sundwall, Michael E. Lenert Jan 2012

Shifts In The Architecture Of The Nationwide Health Information Network, L. Lenert, D. Sundwall, Michael E. Lenert

Media Studies

In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internetlike architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood …


Fracture Detection In Traumatic Pelvic Ct Images, Jie Wu, Pavani Davuluri, Kevin R. Ward, Charles Cockrell, Rosalyn H. Hargraves, Kayvan Najarian Jan 2012

Fracture Detection In Traumatic Pelvic Ct Images, Jie Wu, Pavani Davuluri, Kevin R. Ward, Charles Cockrell, Rosalyn H. Hargraves, Kayvan Najarian

Computer Science Publications

Fracture detection in pelvic bones is vital for patient diagnostic decisions and treatment planning in traumatic pelvic injuries. Manual detection of bone fracture from computed tomography (CT) images is very challenging due to low resolution of the images and the complex pelvic structures. Automated fracture detection from segmented bones can significantly help physicians analyze pelvic CT images and detect the severity of injuries in a very short period. This paper presents an automated hierarchical algorithm for bone fracture detection in pelvic CT scans using adaptive windowing, boundary tracing, and wavelet transform while incorporating anatomical information. Fracture detection is performed on …


An Automated Optimal Engagement And Attention Detection System Using Electrocardiogram, Ashwin Belle, Rosalyn H. Hargraves, Kayvan Najarian Jan 2012

An Automated Optimal Engagement And Attention Detection System Using Electrocardiogram, Ashwin Belle, Rosalyn H. Hargraves, Kayvan Najarian

Computer Science Publications

This research proposes to develop a monitoring system which uses Electrocardiograph (ECG) as a fundamental physiological signal, to analyze and predict the presence or lack of cognitive attention in individuals during a task execution. The primary focus of this study is to identify the correlation between fluctuating level of attention and its implications on the cardiac rhythm recorded in the ECG. Furthermore, Electroencephalograph (EEG) signals are also analyzed and classified for use as a benchmark for comparison with ECG analysis. Several advanced signal processing techniques have been implemented and investigated to derive multiple clandestine and informative features from both these …