Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

Predicting Panel Ratings For Semantic Characteristics Of Lung Nodules, Dmitriy Zinovev, Jonathan Feigenbaum, Daniela Raicu, Jacob Furst Oct 2010

Predicting Panel Ratings For Semantic Characteristics Of Lung Nodules, Dmitriy Zinovev, Jonathan Feigenbaum, Daniela Raicu, Jacob Furst

Technical Reports

In reading CT scans with potentially malignant lung nodules, radiologists make use of high level information (semantic characteristics) in their analysis. CAD systems can assist radiologists by offering a “second opinion” - predicting these semantic characteristics for lung nodules. In our previous work, we developed such a CAD system, training and testing it on the publicly available Lung Image Database Consortium (LIDC) dataset, which includes semantic annotations by up to four human radiologists for every nodule. However, due to the lack of ground truth and the uncertainty in the dataset, each nodule was viewed as four distinct instances when training …


Facial Expression Recognition System, Ewa Piatkowska Aug 2010

Facial Expression Recognition System, Ewa Piatkowska

Technical Reports

This thesis describes the problem of facial expression recognition in the field of computer vision. Firstly, the psychological background of a problem is presented. Then, the idea of facial expression recognition system (FERS) is outlined and the requirements of such system are specified. The FER system consists of 3 stages: face detection, feature extraction and expression recognition. Methods proposed in literature are reviewed for each stage of a system. Finally, the design and implementation of my system are explained. The face detection algorithm used in the system is based on work by Viola and Jones [13]. The expressions are described …


The Future Of Digital Rights Management In Digital Video, Matthew Elcock Jun 2010

The Future Of Digital Rights Management In Digital Video, Matthew Elcock

Technical Reports

The rise in the popularity of internet-based digital video has created a major revolution in the way consumers acquire content. Users no longer need to watch a television show live or obtain a physical disc in order to view a movie. However, this transition comes with a price: Digital Rights Management (DRM). Every digital video file requires a user to be locked into a particular combination of software, hardware, and business plan in order to be authorized for viewing purchased content. DRM was just as prevalent during the introduction of digital audio, but DRM was abolished from the format within …


Independent Set On Graphs With Maximum Degree 3, Iyad A. Kanj, Fenghui Zhang Jun 2010

Independent Set On Graphs With Maximum Degree 3, Iyad A. Kanj, Fenghui Zhang

Technical Reports

Let G be an undirected graph with maximum degree at most 3 such that G does not contain either of the two graphs shown in Figure 1 as a subgraph. We prove that the independence number of G is at least n(G)/3 + nt(G)/63, where n(G) is the number of vertices in G and nt(G) is the number of nontriangle vertices in G. We show an application of the aforementioned combinatorial result to the area of parameterized complexity. We present a linear-time kernelization algorithm for the independent set problem on graphs with maximum degree at most 3 that computes a …


Use Of Machine Learning Classification Techniques To Detect Atypical Behavior In Medical Applications, Terrence Ziemniak Jun 2010

Use Of Machine Learning Classification Techniques To Detect Atypical Behavior In Medical Applications, Terrence Ziemniak

Technical Reports

Health care informatics is growing at an incredible pace. Originally health care organizations, like all other industries, used pen and paper to track medical information. Ten years ago the more mature health care organizations had simply practice management applications. Today these organizations have full blown electronic health records systems. Tomorrow these organizations will be sharing information across the globe.

Physicians (and the sponsoring organizations) are obligated to protect this data. Health care has followed the trend of many other industries in implementing technologies and processes to address certain risks. Encryption is enabled to ensure confidentiality. Business continuity techniques are applied …


Computational Thinking Across The Curriculum: A Conceptual Framework, Amber Settle, Ljubomir Perkovic Jan 2010

Computational Thinking Across The Curriculum: A Conceptual Framework, Amber Settle, Ljubomir Perkovic

Technical Reports

We describe a framework for implementing computational thinking in a broad variety of general education courses. The framework is designed to be used by faculty without formal training in information technology in order to understand and integrate computational thinking into their own general education courses. The framework includes examples of computational thinking in a variety of general education courses, as well as sample in-class activities, assignments, and other assessments for the courses. The examples in the different courses are related and differentiated using categories taken from Peter Denning’s Great Principles of Computing, so that similar types of computational thinking appearing …