Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Predicting Panel Ratings For Semantic Characteristics Of Lung Nodules, Dmitriy Zinovev, Jonathan Feigenbaum, Daniela Raicu, Jacob Furst
Predicting Panel Ratings For Semantic Characteristics Of Lung Nodules, Dmitriy Zinovev, Jonathan Feigenbaum, Daniela Raicu, Jacob Furst
Technical Reports
In reading CT scans with potentially malignant lung nodules, radiologists make use of high level information (semantic characteristics) in their analysis. CAD systems can assist radiologists by offering a “second opinion” - predicting these semantic characteristics for lung nodules. In our previous work, we developed such a CAD system, training and testing it on the publicly available Lung Image Database Consortium (LIDC) dataset, which includes semantic annotations by up to four human radiologists for every nodule. However, due to the lack of ground truth and the uncertainty in the dataset, each nodule was viewed as four distinct instances when training …
Facial Expression Recognition System, Ewa Piatkowska
Facial Expression Recognition System, Ewa Piatkowska
Technical Reports
This thesis describes the problem of facial expression recognition in the field of computer vision. Firstly, the psychological background of a problem is presented. Then, the idea of facial expression recognition system (FERS) is outlined and the requirements of such system are specified. The FER system consists of 3 stages: face detection, feature extraction and expression recognition. Methods proposed in literature are reviewed for each stage of a system. Finally, the design and implementation of my system are explained. The face detection algorithm used in the system is based on work by Viola and Jones [13]. The expressions are described …
The Future Of Digital Rights Management In Digital Video, Matthew Elcock
The Future Of Digital Rights Management In Digital Video, Matthew Elcock
Technical Reports
The rise in the popularity of internet-based digital video has created a major revolution in the way consumers acquire content. Users no longer need to watch a television show live or obtain a physical disc in order to view a movie. However, this transition comes with a price: Digital Rights Management (DRM). Every digital video file requires a user to be locked into a particular combination of software, hardware, and business plan in order to be authorized for viewing purchased content. DRM was just as prevalent during the introduction of digital audio, but DRM was abolished from the format within …
Independent Set On Graphs With Maximum Degree 3, Iyad A. Kanj, Fenghui Zhang
Independent Set On Graphs With Maximum Degree 3, Iyad A. Kanj, Fenghui Zhang
Technical Reports
Let G be an undirected graph with maximum degree at most 3 such that G does not contain either of the two graphs shown in Figure 1 as a subgraph. We prove that the independence number of G is at least n(G)/3 + nt(G)/63, where n(G) is the number of vertices in G and nt(G) is the number of nontriangle vertices in G. We show an application of the aforementioned combinatorial result to the area of parameterized complexity. We present a linear-time kernelization algorithm for the independent set problem on graphs with maximum degree at most 3 that computes a …
Use Of Machine Learning Classification Techniques To Detect Atypical Behavior In Medical Applications, Terrence Ziemniak
Use Of Machine Learning Classification Techniques To Detect Atypical Behavior In Medical Applications, Terrence Ziemniak
Technical Reports
Health care informatics is growing at an incredible pace. Originally health care organizations, like all other industries, used pen and paper to track medical information. Ten years ago the more mature health care organizations had simply practice management applications. Today these organizations have full blown electronic health records systems. Tomorrow these organizations will be sharing information across the globe.
Physicians (and the sponsoring organizations) are obligated to protect this data. Health care has followed the trend of many other industries in implementing technologies and processes to address certain risks. Encryption is enabled to ensure confidentiality. Business continuity techniques are applied …
Computational Thinking Across The Curriculum: A Conceptual Framework, Amber Settle, Ljubomir Perkovic
Computational Thinking Across The Curriculum: A Conceptual Framework, Amber Settle, Ljubomir Perkovic
Technical Reports
We describe a framework for implementing computational thinking in a broad variety of general education courses. The framework is designed to be used by faculty without formal training in information technology in order to understand and integrate computational thinking into their own general education courses. The framework includes examples of computational thinking in a variety of general education courses, as well as sample in-class activities, assignments, and other assessments for the courses. The examples in the different courses are related and differentiated using categories taken from Peter Denning’s Great Principles of Computing, so that similar types of computational thinking appearing …