Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Us Fda Releases Final Rule On Medical Device Data Systems:What Does This Mean For Device Manufacturers, Martin Mchugh, Fergal Mccaffery, Valentine Casey Jun 2011

Us Fda Releases Final Rule On Medical Device Data Systems:What Does This Mean For Device Manufacturers, Martin Mchugh, Fergal Mccaffery, Valentine Casey

Articles

On 16 April 2011, the US Food and Drug Administration’s (FDA’s) final rule on medical device data systems (MDDSs) came into force. This rule attempts to remove the uncertainty surrounding the safety classification of certain information technology systems used in healthcare. Devices that now meet the criteria of being an MDDS are classified as Class I (general controls). However, this final ruling explicitly precludes specific software applications that meet the definition of an MDDS, such as electronic health record applications and computerised physician order entry applications, as being beyond the scope of an MDDS. Similarly, ambiguity still remains surrounding mobile …


Why Is An Einstein Ring Blue?, Jonathan Blackledge Jan 2011

Why Is An Einstein Ring Blue?, Jonathan Blackledge

Articles

Albert Einstein predicted the existence of `Einstein rings' as a consequence of his general theory of relativity. The phenomenon is a direct result of the idea that if a mass warps space-time then light (and other electromagnetic waves) will be `lensed' by the strong gravitational field produced by a large cosmological body such as a galaxy. Since 1998, when the first complete Einstein ring was observed, many more complete or partially complete Einstein rings have been observed in the radio and infrared spectra, for example, and by the Hubble Space Telescope in the optical spectrum. However, in the latter case, …


Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge Jan 2011

Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge

Articles

Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together …


Automatic Annotation Of Referring Expression In Situated Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee Jan 2011

Automatic Annotation Of Referring Expression In Situated Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee

Articles

To apply machine learning techniques to the production and interpretation of natural language, we need large amounts of annotated language data. Manual annotation, however, is an expensive and time consuming process since it involves human annotators looking at the data and explicitly adding information that is implicitly contained in the data, based on their judgment. This work presents an approach to automatically annotating referring expressions in situated dialogues by exploiting the interpretation of language by the participants in the dia- logue. We associate instructions concerning objects in the environment with automatically detected events involving these objects and predict the referents …


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …