7 resultados para Selective Collection Program SCP

em CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital thermal imaging has been employed in medicine for over 50 years. However, its use has been focused on vascular, musculoskeletal and neurological conditions, while other potential applications,such as obstetrics, have been much less explored. This paper presents a study conducted during 2011 at the Hospital of Braga on a group of healthy pregnant women in the last third of gestation. The analysis focused on characterizing typical pregnant women steady temperature profiles in specific defined regions of interest (ROI), and determining if the thermal symmetry values for late pregnant healthy women are in line with the values for non-pregnant healthy women. A temperature distribution pattern was found in the defined ROI. The obtained thermal symmetry value had a maximum of 0.370.2 1C, and there was no evidence for the influence of age (p40.05) in the observed group. The influence of the BMI requires further investigation since one ROI (P2 right) presented a p0.059, close to the threshold of statistical evidence in the influence of BMI. The study group presented symmetry values in line with non-pregnant reference values, but the profiles in temperature distribution are different. Assumptions can therefore now be used with higher confidence when assessing abnormalities in specific pathologic states during pregnancy using the defined ROI. This work represents a first contribution towards establishing guidelines for future research in this specific field of study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the 12-lead electrocardiogram has become an essential medical and research tool, many current and envisaged applications would benefit from simpler devices, using 3-lead ECG configuration. This is particularly true for Ambient Assisted Living (in a broad perspective). However, the chest anatomy of female patients, namely during pregnancy, can hamper the adequate placement of a 3-lead ECG device and, very often, electrodes are placed below the chest rather than at the precise thoracic landmarks. Thus, the aim of this study was to compare the effect of electrode positioning on the ECG signal of pregnant women and provide guidelines for device development. The effect of breast tissue on the ECG signal was investigated by relating breast size with the signal-to-noise ratio, root mean square and R-wave amplitude. Results show that the 3-lead ECG should be placed on the breast rather than under the breast and indicate positive correlation between breast size and signal-to-noise ratio.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless medical systems are comprised of four stages, namely the medical device, the data transport, the data collection and the data evaluation stages. Whereas the performance of the first stage is highly regulated, the others are not. This paper concentrates on the data transport stage and argues that it is necessary to establish standardized tests to be used by medical device manufacturers to provide comparable results concerning the communication performance of the wireless networks used to transport medical data. Besides, it suggests test parameters and procedures to be used to produce comparable communication performance results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful in the areas of reverse engineering, program understanding, testing and software maintenance. Most slicing methods, usually oriented towards the imperative or object paradigms, are based on some sort of graph structure representing program dependencies. Slicing techniques amount, therefore, to (sophisticated) graph transversal algorithms. This paper proposes a completely different approach to the slicing problem for functional programs. Instead of extracting program information to build an underlying dependencies structure, we resort to standard program calculation strategies, based on the so-called Bird-Meertens formalism. The slicing criterion is specified either as a projection or a hiding function which, once composed with the original program, leads to the identification of the intended slice. Going through a number of examples, the paper suggests this approach may be an interesting, even if not completely general, alternative to slicing functional programs

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of specific slicing techniques for functional programs and their use for the identification of possible coherent components from monolithic code. An associated tool is also introduced. This piece of research is part of a broader project on program understanding and re-engineering of legacy code supported by formal methods

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current software development often relies on non-trivial coordination logic for combining autonomous services, eventually running on different platforms. As a rule, however, such a coordination layer is strongly woven within the application at source code level. Therefore, its precise identification becomes a major methodological (and technical) problem and a challenge to any program understanding or refactoring process. The approach introduced in this paper resorts to slicing techniques to extract coordination data from source code. Such data are captured in a specific dependency graph structure from which a coordination model can be recovered either in the form of an Orc specification or as a collection of code fragments corresponding to the identification of typical coordination patterns in the system. Tool support is also discussed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract: in Portugal, and in much of the legal systems of Europe, legal persons are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: false information; damage on other programs or computer data; computer-software sabotage; illegitimate access; unlawful interception and illegitimate reproduction of protected program. However, in Portugal, have many exceptions. Exceptions to the question of criminal liability of legal persons. Some legal persons can not be blamed for cybercrime. The legislature did not leave! These legal persons are v.g. the following (public entities): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em ingls.