Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Other Computer Engineering

A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben May 2013

A Knowledge-Based Clinical Toxicology Consultant For Diagnosing Multiple Exposures, Joel D. Schipper, Douglas D. Dankel Ii, A. Antonio Arroyo, Jay L. Schauben

Publications

Objective: This paper presents continued research toward the development of a knowledge-based system for the diagnosis of human toxic exposures. In particular, this research focuses on the challenging task of diagnosing exposures to multiple toxins. Although only 10% of toxic exposures in the United States involve multiple toxins, multiple exposures account for more than half of all toxin-related fatalities. Using simple medical mathematics, we seek to produce a practical decision support system capable of supplying useful information to aid in the diagnosis of complex cases involving multiple unknown substances.

Methods: The system is automatically trained using data mining …


Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler Jan 2013

Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs."--from the introduction.