Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Us Fda Releases Final Rule On Medical Device Data Systems:What Does This Mean For Device Manufacturers, Martin Mchugh, Fergal Mccaffery, Valentine Casey
Us Fda Releases Final Rule On Medical Device Data Systems:What Does This Mean For Device Manufacturers, Martin Mchugh, Fergal Mccaffery, Valentine Casey
Articles
On 16 April 2011, the US Food and Drug Administration’s (FDA’s) final rule on medical device data systems (MDDSs) came into force. This rule attempts to remove the uncertainty surrounding the safety classification of certain information technology systems used in healthcare. Devices that now meet the criteria of being an MDDS are classified as Class I (general controls). However, this final ruling explicitly precludes specific software applications that meet the definition of an MDDS, such as electronic health record applications and computerised physician order entry applications, as being beyond the scope of an MDDS. Similarly, ambiguity still remains surrounding mobile …
Why Is An Einstein Ring Blue?, Jonathan Blackledge
Why Is An Einstein Ring Blue?, Jonathan Blackledge
Articles
Albert Einstein predicted the existence of `Einstein rings' as a consequence of his general theory of relativity. The phenomenon is a direct result of the idea that if a mass warps space-time then light (and other electromagnetic waves) will be `lensed' by the strong gravitational field produced by a large cosmological body such as a galaxy. Since 1998, when the first complete Einstein ring was observed, many more complete or partially complete Einstein rings have been observed in the radio and infrared spectra, for example, and by the Hubble Space Telescope in the optical spectrum. However, in the latter case, …
Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge
Cryptography Using Steganography: New Algorithms And Applications, Jonathan Blackledge
Articles
Developing methods for ensuring the secure exchange of information is one of the oldest occupations in history. With the revolution in Information Technology, the need for securing information and the variety of methods that have been developed to do it has expanded rapidly. Much of the technology that forms the basis for many of the techniques used today was originally conceived for use in military communications and has since found a place in a wide range of industrial and commercial sectors. This has led to the development of certain industry standards that are compounded in specific data processing algorithms together …
Automatic Annotation Of Referring Expression In Situated Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee
Automatic Annotation Of Referring Expression In Situated Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee
Articles
To apply machine learning techniques to the production and interpretation of natural language, we need large amounts of annotated language data. Manual annotation, however, is an expensive and time consuming process since it involves human annotators looking at the data and explicitly adding information that is implicitly contained in the data, based on their judgment. This work presents an approach to automatically annotating referring expressions in situated dialogues by exploiting the interpretation of language by the participants in the dia- logue. We associate instructions concerning objects in the environment with automatically detected events involving these objects and predict the referents …
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
Articles
Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …