By Topic

Developments in E-systems Engineering (DESE), 2010

Date 6-8 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (10404 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (347 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - viii
    Save to Project icon | Request Permissions | PDF file iconPDF (184 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2010 , Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2010 , Page(s): xi - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (50 KB)  
    Freely Available from IEEE
  • Telemedicine and Smart Phones as Medical Peripheral Devices (Computational Approaches)

    Publication Year: 2010 , Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (407 KB) |  | HTML iconHTML  

    From the 90's., telemedicine emerged as a novel method for clinicians. It has been proved that telemedicine is a useful tool for diagnostics and therapy. Telemedicine has greatly contributed to the improvement of healthcare in various aspects such as attending to people in geographically isolated areas, transportation and out-of-hospital care, emergency medicine. The ability to implement cutting e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Technology Governance, Risk and Compliance in Health Care - A Management Approach

    Publication Year: 2010 , Page(s): 7 - 11
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (290 KB) |  | HTML iconHTML  

    Governance, Risk Management and Compliance (GRC) is an executive level concern in many enterprises today. It is an approach that addresses not only the establishment of business rules but more importantly how those rules are integrated into sensible organizational structures, embedded into the day-to-day business processes of the organization, communicated including ongoing training and monitored ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Method for Segmentation of Coronary Arteries in Coronary CT Imaging

    Publication Year: 2010 , Page(s): 12 - 16
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (651 KB) |  | HTML iconHTML  

    Many applications in the field of medical image processing require precise estimation of diagnostic parameters of the anatomical structures to be examined. In this paper, we present a novel two-step three dimensional region statistics based active contours algorithm for automatic segmentation of the entire coronary arterial trees in 3D coronary CT images. In the first phase, we define the optimal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Remote Mobile Technology in a Clinical Environment

    Publication Year: 2010 , Page(s): 17 - 22
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (949 KB) |  | HTML iconHTML  

    The authors outline the experience of implementing a remote mobile working environment for clinicians dealing with disabled patients in the community. In particular the paper provides details of an evaluation of the technology in use, focusing on clinician experience with the technology, the expectations of the organisation and how this affects the perceived, overall performance and quality of car... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vessel Extraction in Fluorescein Angiograms of the Human Retina Using a Supervised Classifier

    Publication Year: 2010 , Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    Fluorescein angiograms of the human retina are widely used in the diagnosis and treatment of several diseases such as diabetic retinopathy and age relate macular degeneration. They analyze the micro circulation of the retina and choroid. Hence, accurate extraction of the vascular tree network is of crucial importance. Previous approaches to retinal vessel extraction assume either bright vessels on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where's the Evidence for Evidence-based Knowledge in Ehealth Systems?

    Publication Year: 2010 , Page(s): 29 - 34
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (227 KB) |  | HTML iconHTML  

    Consumers are increasingly turning to the Internet to gather information in making a wide variety of decisions - from the reliability of different brands of automobiles, to product costs. Similarly, many individuals are making use of online sources of information through the Internet and their employers to make health-related decisions - including options in health plans and personal assistance. B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Healthcare Data Access Control Using XACML for Handheld Devices

    Publication Year: 2010 , Page(s): 35 - 38
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (124 KB) |  | HTML iconHTML  

    In the modern health services era, data is accessed by the doctors and nurses using small handheld devices like mobile, Personal Digital Assistants and other electronic handheld devices. Individual's health related information is normally stored in a central health repository. This data can be accessed by authorized doctors. Data is prone to be exposed to a number of mobile attacks while being acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Agent Approach for Self-Diagnosis of a Hydrocephalus Shunting System

    Publication Year: 2010 , Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1509 KB) |  | HTML iconHTML  

    The human brain is immersed in cerebrospinal fluid, which protects it from mechanical stresses and helps support its weight through buoyancy. A constant overproduction, blockage or reabsorption difficulty can result in a build-up of fluid in the skull (Hydrocephalus), which can lead to brain damage or even death. Existing treatments rely on passive implantable shunts that drain the excess fluid ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes

    Publication Year: 2010 , Page(s): 47 - 52
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application domains. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Trust-aware routing is an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paradigms, Frameworks and Prototypes Towards the Realization of the Internet of Things

    Publication Year: 2010 , Page(s): 53 - 58
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    The problem of integrating the ad hoc networks and especially the Wireless Sensor Networks (WSN) with the Internet has attracted significant research and implementation efforts so far. Admittedly, not all of them have been widely adopted and established as prevalent standards or solutions in this technical area. In this paper we survey the proposed interconnection models and the relevant architect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfiguration in Wireless Sensor NeTworks

    Publication Year: 2010 , Page(s): 59 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    Wireless Sensor Networks are becoming more and more popular and offer a wide set of solutions invading our life. As the research community is working towards integrating them in the so-called “Internet of Things”, the capability to reconfigure them provides an unprecedented flexibility allowing for the flexible use of all available resources of different types. However, the desired r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Oriented Tasking System for WSN

    Publication Year: 2010 , Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (363 KB) |  | HTML iconHTML  

    The increasing ubiquity of network-connected devices in our everyday environments (e.g., at home, at work, in the city) is driving an evolution in interaction patterns, from traditional human-computer to machine-to-machine scenarios. In parallel, in the years to come we will witness the growth of consumer electronics based on wireless technologies such as RFID (Radio-Frequency Identification) and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web Services-oriented Architecture for Integrating Small Programmable Objects in the Web of Things

    Publication Year: 2010 , Page(s): 70 - 75
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5571 KB) |  | HTML iconHTML  

    In this work, we present a concrete framework, based on web services-oriented architecture, for integrating small programmable objects in the web of things. Functionality and data gathered by the Small Programmable Objects (SPO) are exposed using Web Services. Based on this, by exploiting XML encoding, SPO can be comprehensible by any web application. The architecture proposed is focused in provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Self-Configurable Architecture for Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 76 - 81
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance and security surveillance. Wireless sensor networks are composed of large number of sensor nodes, which are limited in resources i.e. memory, energy and computation power. Wireless sensor networks (WSNs) facilitate monitoring and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Associate Model of Methods Used for Restoration / Conservation Resources

    Publication Year: 2010 , Page(s): 85 - 88
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1117 KB) |  | HTML iconHTML  

    Restoration and conservation interventions are progressively more and more dependent upon benefits of newly developed techniques. Works carried out within the scopes of several restoration projects had evaluated such techniques based on, for examples 3D laser scanning, multispectral imaging or pigments identification by LIFS of LIBS etc and reported in open literatures in recent time. In order to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Theoretical Approach Based on the Correlation of Unified Data for Different Analyzing Techniques Used in the Modern Investigation of Artworks

    Publication Year: 2010 , Page(s): 89 - 92
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    In this paper we present an approach based on mathematical and computing aspects of a method for the correlation of images representing investigation results over the same area of an object. The aim of this algorithm is to associate the results with a three-dimensional digital model of the investigated surface in an accurate manner. Thus a digital replica can be obtained with unified and complemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Framework to Support Development of Serious Games for Game-based Learning

    Publication Year: 2010 , Page(s): 95 - 100
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (443 KB) |  | HTML iconHTML  

    Computer games, predominantly a form of interactive entertainment, have been repurposed for game-based learning in recent years. Many studies have presented the educational value that computer games possess with evidence that supports the positive experiences of game-based learning. Game-based learning could be an invaluable learning approach for the 21st century, but is currently hinde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.