Academic literature on the topic 'Teeth Identification Computer programs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Teeth Identification Computer programs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Teeth Identification Computer programs"

1

Santo, Augusto H., Celso E. Pinheiro, and Eliana M. Rodrigues. "Comparative evaluation of underlying causes of death processed by the Automated Classification of Medical Entities and the Underlying Cause of Death Selection Systems." Revista de Saúde Pública 32, no. 1 (February 1998): 1–6. http://dx.doi.org/10.1590/s0034-89101998000100001.

Full text
Abstract:
INTRODUCTION: The correct identification of the underlying cause of death and its precise assignment to a code from the International Classification of Diseases are important issues to achieve accurate and universally comparable mortality statistics These factors, among other ones, led to the development of computer software programs in order to automatically identify the underlying cause of death. OBJECTIVE: This work was conceived to compare the underlying causes of death processed respectively by the Automated Classification of Medical Entities (ACME) and the "Sistema de Seleção de Causa Básica de Morte" (SCB) programs. MATERIAL AND METHOD: The comparative evaluation of the underlying causes of death processed respectively by ACME and SCB systems was performed using the input data file for the ACME system that included deaths which occurred in the State of S. Paulo from June to December 1993, totalling 129,104 records of the corresponding death certificates. The differences between underlying causes selected by ACME and SCB systems verified in the month of June, when considered as SCB errors, were used to correct and improve SCB processing logic and its decision tables. RESULTS: The processing of the underlying causes of death by the ACME and SCB systems resulted in 3,278 differences, that were analysed and ascribed to lack of answer to dialogue boxes during processing, to deaths due to human immunodeficiency virus [HIV] disease for which there was no specific provision in any of the systems, to coding and/or keying errors and to actual problems. The detailed analysis of these latter disclosed that the majority of the underlying causes of death processed by the SCB system were correct and that different interpretations were given to the mortality coding rules by each system, that some particular problems could not be explained with the available documentation and that a smaller proportion of problems were identified as SCB errors. CONCLUSION: These results, disclosing a very low and insignificant number of actual problems, guarantees the use of the version of the SCB system for the Ninth Revision of the International Classification of Diseases and assures the continuity of the work which is being undertaken for the Tenth Revision version.
APA, Harvard, Vancouver, ISO, and other styles
2

Bodzás, Sándor. "Computer aided designing and modelling of spur gear pairs having normal and modified straight teeth." International Review of Applied Sciences and Engineering 10, no. 2 (December 2019): 157–63. http://dx.doi.org/10.1556/1848.2019.0019.

Full text
Abstract:
The aim of this publication is to show the process of computer aided designing of the spur gear pairs having normal and modified straight teeth. For designing, the determination of the geometrical parameters is needed. Computer programs have been developed with which gear pairs having normal and modified teeth, with any arbitrary parameters can be analysed, designed and modelled. With these programs gear pairs having concrete geometry have been designed and CAD models have also been drawn to have further meshing, geometrical and TCA (Tooth Contact Analysis).
APA, Harvard, Vancouver, ISO, and other styles
3

Fetvaci, Cuneyt, and C. Erdem Imrak. "Computer Modeling and Simulation of Spur Involute Gears by Generating Method." Key Engineering Materials 450 (November 2010): 103–6. http://dx.doi.org/10.4028/www.scientific.net/kem.450.103.

Full text
Abstract:
This study analyzes the forming principle of spur gears with asymmetric teeth profile by rack-type and pinion-type cutters. Mathematical models of generating and generated surfaces manufactured by generating-type cutters are given. Asymmetric gear tooth is also considered. A computer program is developed to display computer graphs of the spur gears with asymmetric involute teeth. The simulated motion path of the generating cutter is illustrated. The developed computer programs are very helpful in the design of involute gears.
APA, Harvard, Vancouver, ISO, and other styles
4

Upadhyaya, Gautam, Samuel P. Midkiff, and Vijay S. Pai. "Automatic atomic region identification in shared memory SPMD programs." ACM SIGPLAN Notices 45, no. 10 (October 17, 2010): 652–70. http://dx.doi.org/10.1145/1932682.1869513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

ITO, Kunio. "Personal computer programs to assist identification of electron diffraction network pattern." Journal of Japan Institute of Light Metals 40, no. 12 (1990): 930–35. http://dx.doi.org/10.2464/jilm.40.930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

JAIN, SANJAY. "AN INFINITE CLASS OF FUNCTIONS IDENTIFIABLE USING MINIMAL PROGRAMS IN ALL KOLMOGOROV NUMBERINGS." International Journal of Foundations of Computer Science 06, no. 01 (March 1995): 89–94. http://dx.doi.org/10.1142/s012905419500007x.

Full text
Abstract:
Identification of programs for computable functions from their graphs by algorithmic devices is a well studied problem in learning theory. Freivalds and Chen consider identification of ‘minimal’ and ‘nearly minimal’ programs for functions from their graphs. Freivalds showed that there exists a Gödel numbering in which only finite classes of functions can be identified using minimal programs. To address such problems, Freivalds later considered minimal identification in Kolmogorov Numberings. Kolmogorov numberings are in some sense optimal numberings and have some nice properties. Freivalds showed that for every Kolmogorov numbering there exists an infinite class of functions which can be identified using minimal programs. Note that these infinite classes of functions may depend on the Kolmogorov numbering. It was left open as to whether there exists an infinite class of functions, C, such that C can be identified using minimal programs in every Kolmogorov numbering. We show the existence of such a class.
APA, Harvard, Vancouver, ISO, and other styles
7

John, James Rufus, Breena Daniel, Dakshaini Paneerselvam, and Ganesh Rajendran. "Prevalence of Dental Caries, Oral Hygiene Knowledge, Status, and Practices among Visually Impaired Individuals in Chennai, Tamil Nadu." International Journal of Dentistry 2017 (2017): 1–6. http://dx.doi.org/10.1155/2017/9419648.

Full text
Abstract:
Aim. To assess the prevalence of dental caries, oral hygiene knowledge, status, and practices among visually impaired individuals in Chennai, Tamil Nadu.Materials and Methods. A cross-sectional study was conducted among 404 visually impaired individuals in Chennai city, Tamil Nadu. Four schools were randomly selected for conducting the study. The oral hygiene status, prevalence of caries, and knowledge and attitude towards oral care among visually impaired individuals were collected and analysed.Results. In the present study, whilst 42% of individuals had fair oral hygiene status, 33% had good hygiene followed by 25% having poor oral hygiene. The overall mean number of DMFT was estimated to be4.5±2.7. The mean number of decayed teeth was3.1±2.2, mean number of missing teeth was0.8±1.4, and mean number of filled teeth was0.5±1.3.Conclusion. Whilst oral hygiene status was found to be relatively fair, there was a high rate of dental caries among the sample population. This shows that there is lack of knowledge regarding oral health maintenance. Therefore, early identification of caries coupled with effective oral health promotion programs providing practical knowledge to visually impaired students would prove beneficial.
APA, Harvard, Vancouver, ISO, and other styles
8

Litvin, F. L., C. L. Hsiao, J. C. Wang, and X. Zhou. "Computerized Simulation of Generation of Internal Involute Gears and Their Assembly." Journal of Mechanical Design 116, no. 3 (September 1, 1994): 683–89. http://dx.doi.org/10.1115/1.2919436.

Full text
Abstract:
The contents of the paper cover the determination of conditions: (i) of nonundercutting by axial and axial-radial generation of internal gears by shapers, and (ii) avoidance of interference by axial and axial-radial assembly. The authors have developed computer programs for simulation of undercutting and interference, design charts and a table that allow to determine the limiting number of teeth of the cutter and pinion considering the tooth number of internal gear as known. The details of developed algorithms are given in the Appendices. The paper is illustrated with computer graphics and numerical examples.
APA, Harvard, Vancouver, ISO, and other styles
9

Ichioka, Hiroaki, Risa Bandou, Nozomi Idota, Kaori Shintani-Ishida, and Hiroshi Ikegaya. "Current Issues in Dental Identification in Severely Burned Bodies from a Studio Arson Attack in Japan." Applied Sciences 13, no. 1 (December 29, 2022): 461. http://dx.doi.org/10.3390/app13010461.

Full text
Abstract:
A studio arson attack in Japan caused 36 deaths. Dentists obtained dental findings from 33 unidentified bodies immediately after the attack and autopsy. The dental findings before autopsy were obtained on the day of the incident and the next day. Dental findings after autopsy were obtained at 1 week from the day after the incident. We examined issues associated with collecting these dental findings. Other findings recorded were CT images, autopsy findings, and various blood and pathological examinations. Among the 33 unidentified bodies, for 30 bodies, the number of teeth from which the dental findings were obtained was significantly higher after autopsy than before autopsy. The dental findings of the remaining three bodies were not obtained before or after the autopsy. Five percent of anterior teeth and 28.7% of molars had differing pre-autopsy and post-autopsy findings. This discrepancy can be attributed to various factors. One of the major influencing factors was the carbonization of the facial surface muscles and skin along with limited mouth opening due to thermocoagulation. For the scientific identification of an individual based on dental findings, it is mandatory to examine the teeth in all quadrants. The collection of dental findings solely from anterior teeth may not be adequate to establish identity. The present article describes the challenges faced by the dentists while identifying charred bodies in an arson attack.
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Alan D. "Exploring national identification programs among web‐enabled professionals." Industrial Management & Data Systems 108, no. 4 (April 25, 2008): 455–77. http://dx.doi.org/10.1108/02635570810868335.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Teeth Identification Computer programs"

1

Kaminskyj, Ian. "Automatic recognition of musical instruments using isolated monophonic sounds." Monash University, Dept. of Electrical and Computer Systems Engineering, 2004. http://arrow.monash.edu.au/hdl/1959.1/5212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fonti, Mary L. "A Predictive Modeling System: Early identification of students at-risk enrolled in online learning programs." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/367.

Full text
Abstract:
Predictive statistical modeling shows promise in accurately predicting academic performance for students enrolled in online programs. This approach has proven effective in accurately identifying students who are at-risk enabling instructors to provide instructional intervention. While the potential benefits of statistical modeling is significant, implementations have proven to be complex, costly, and difficult to maintain. To address these issues, the purpose of this study is to develop a fully integrated, automated predictive modeling system (PMS) that is flexible, easy to use, and portable to identify students who are potentially at-risk for not succeeding in a course they are currently enrolled in. Dynamic and static variables from a student system (edX) will be analyzed to predict academic performance of an individual student or entire class. The PMS model framework will include development of an open-source Web application, application programming interface (API), and SQL reporting services (SSRS). The model is based on knowledge discovery database (KDD) approach utilizing inductive logic programming language (ILP) to analyze student data. This alternative approach for predicting academic performance has several unique advantages over current predictive modeling techniques in use and is a promising new direction in educational research.
APA, Harvard, Vancouver, ISO, and other styles
3

Castellano, Pierre John. "Speaker recognition modelling with artificial neural networks." Thesis, Queensland University of Technology, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klinka, Karel, Pal Varga, and Christine Chourmouzis. "Select CD : computer support system for making tree species and reproduction cutting decisions in the coastal forest of BC." Forest Sciences Department, University of British Columbia, 1999. http://hdl.handle.net/2429/672.

Full text
Abstract:
"SELECT CD is a site-specific, decision-support tool for selecting ecologically viable tree species, reproduction cuttings, and regeneration methods in the coastal forest (CDF, CWH, and MH zones). SELECT CD integrates information from several existing guides with new information from literature and recent research into a single, user-friendly resource. SELECT CD also includes a rich library of visuals and an illustrated glossary of technical terms."
APA, Harvard, Vancouver, ISO, and other styles
5

Carabetta, James R. "The identification of differentiating success factors for students in computer science and computer information systems programs of study." 1991. https://scholarworks.umass.edu/dissertations/AAI9120858.

Full text
Abstract:
Although both are computer-based, computer science and computer information systems programs of study are markedly different. Therefore, it is not unreasonable to speculate that success factor differences may exist between them, and to seek an objective means of making such a determination based on a student's traits. The purpose of this study was therefore two-fold--to determine whether differences do in fact exist between successful computer science majors and successful computer information systems majors, and if such was affirmed, to determine a classification rule for such assignment. Based on an aggregate of demographic, pre-college academic, and learning style factors, the groups were found to differ significantly on the following variables (listed in decreasing likelihood of significance, for those with p $<$.05): sex, abstract conceptualization and concrete-abstract continuum measures, SAT - Mathematics, interest ranking for science, active experimentation measure, interest ranking for foreign language, and concrete experience measure. Computer science majors were found to consist of significantly more males than females, and to have significantly higher abstract conceptualization, concrete-abstract continuum, SAT - mathematics, and interest ranking for science measures than computer information systems majors, while computer information systems majors were found to have significantly higher active experimentation, interest ranking for foreign language and concrete experience measures. A classification rule, based on a subset of these factors, was derived and found to classify correctly at a 76.6% rate. These results have potential as a research-based component of an advising function for students interested in pursuing a computer science or computer information systems program of study.
APA, Harvard, Vancouver, ISO, and other styles
6

Jordaan, Adriaan Louis. "Bio-Swap: a biometrics-based solution to combat SIM swap fraud." Thesis, 2011. http://hdl.handle.net/10210/3707.

Full text
Abstract:
M.Sc. (Computer Science)
The past couple of years have seen an explosion in the number of online fraud schemes – Total annual losses exceed tens of millions of Rands. Many people and organizations from all over the world have fallen victim to it. Nobody is safe; everybody is vulnerable. As we increasingly make use of the Internet and mobile technology to do our work and to perform chores such as online banking or shopping, we become even more vulnerable. Fraudsters make use of ever-more sophisticated techniques and clever schemes to target the unsuspecting end-users of mobile and Internet technology, and to trick them into surrendering their personal information so that electronic transactions can be carried out in their name. Examples include cheque and credit card fraud, phishing, identity theft and spyware, to name but a few. Services such as Internet- and cell phone banking especially, provide a haven of possibilities to make easy money because the technology is relatively new, and it is being used by evermore people who believe that it is fast, safe and secure and will therefore make their lives easier. One of the latest scams at the time of this writing is “SIM swap fraud”: Fraudsters target specific victims, perform SIM swaps on their cell phone numbers, and then proceed to empty the victims’ bank accounts. This is all done in a matter of minutes, so the victims only realize what has happened when it is too late to do anything about it. Needless to say, a solution must be found that will prevent unauthorized SIM swaps and strengthen online banking security. This dissertation does exactly that. It examines the digital world known as cyberspace, identifies how SIM swap fraudsters manage to defraud their targets, and presents a biometrics-based security system to combat SIM swap fraud.
APA, Harvard, Vancouver, ISO, and other styles
7

Ford, Jonathan W. "Google in China : examining hegemonic identification strategies in organizational rhetoric." Thesis, 2013. http://hdl.handle.net/1805/3621.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
The author employs Hoffman and Ford’s method for analyzing organizational rhetoric to examine the discourse of Google, Inc. Employing a hybrid method, built on rhetorical criticism which incorporates elements of organizational communication theory, the analysis examines identity rhetoric present in Google’s discourse regarding its operations in China. Using this approach, the author leverages the method to critically examine hegemonic aspects of the discourse in order to examine how Google constructs its Western consumer based audience regarding online privacy and free speech.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Junyuan. "A study of methods for fine-grained object classification of arthropod specimens." Thesis, 2013. http://hdl.handle.net/1957/38009.

Full text
Abstract:
Object categorization is one of the fundamental topics in computer vision research. Most current work in object categorization aims to discriminate among generic object classes with gross differences. However, many applications require much finer distinctions. This thesis focuses on the design, evaluation and analysis of learning algorithms for fine- grained object classification. The contributions of the thesis are three-fold. First, we introduce two databases of high-resolution images of arthropod specimens we collected to promote the development of highly accurate fine-grained recognition methods. Second, we give a literature review on the development of Bag-of-words (BOW) approaches to image classification and present the stacked evidence tree approach we developed for the fine-grained classification task. We draw connections and analyze differences between those two genres of approaches, which leads to a better understanding about the design of image classification approaches. Third, benchmark results on our two datasets are pre- sented. We further analyze the influence of two important variables on the performance of fine-grained classification. The experiments corroborate our hypotheses that a) high resolution images and b) more aggressive information extraction, such as finer descriptor encoding with large dictionaries or classifiers based on raw descriptors, is required to achieve good fine-grained categorization accuracy.
Graduation date: 2013
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Teeth Identification Computer programs"

1

Ljung, Lennart. System identification toolbox for use with MATLAB: User's guide. Natick, Mass: Math Works, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ljung, Lennart. System identification toolbox for use with MATLAB: User's guide. Natick, Mass: Math Works, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ljung, Lennart. System identification toolbox for use with MATLAB: User's guide. Natick, Mass: MathWorks, Inc., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

David, Hutchison. Advances in Artificial Intelligence: 22nd Canadian Conference on Artificial Intelligence, Canadian AI 2009 Kelowna, Canada, May 25-27, 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Riebau, Allen R. Regional risk identification analysis applicable to resource development of H₂S-contaminated natural gas fields in southwest Wyoming. Springfield, VA: Denver, CO], 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Litvin, F. L. Generation and tooth contact analysis of spiral bevel gears with predesigned parabolic functions of transmission errors. [Washington, D.C.]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Christian, Müller, ed. Speaker classification. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hans, Uszkoreit, and SpringerLink (Online service), eds. Human Language Technology. Challenges of the Information Society: Third Language and Technology Conference, LTC 2007, Poznan, Poland, October 5-7, 2007, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Litvin, F. L. Local synthesis and tooth contact analysis of face-milled spiral bevel gears. [Washington, D.C.]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

service), SpringerLink (Online, ed. Human Language Technology. Challenges for Computer Science and Linguistics: 4th Language and Technology Conference, LTC 2009, Poznan, Poland, November 6-8, 2009, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Teeth Identification Computer programs"

1

Espinoza, Félix Agustín Castro, Gustavo Núñez Esquer, and Joel Suárez Cansino. "Automatic Design Patterns Identification of C++ Programs." In Lecture Notes in Computer Science, 816–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36087-5_94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frejlichowski, Dariusz, and Robert Wanat. "Extraction of Teeth Shapes from Orthopantomograms for Forensic Human Identification." In Computer Analysis of Images and Patterns, 65–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23678-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gröbert, Felix, Carsten Willems, and Thorsten Holz. "Automated Identification of Cryptographic Primitives in Binary Programs." In Lecture Notes in Computer Science, 41–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23644-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sackin, M. J. "11 Computer Programs for Classification and Identification." In Methods in Microbiology, 459–94. Elsevier, 1988. http://dx.doi.org/10.1016/s0580-9517(08)70417-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kong, J. H., L. M. Ang, and K. P. Seng. "Low Complexity Minimal Instruction Set Computer Design using Anubis Cipher for Wireless Identification and Sensing Platform." In Security and Trends in Wireless Identification and Sensing Platform Tags, 144–71. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-1990-6.ch006.

Full text
Abstract:
This chapter presents a low complexity processor design for efficient and compact hardware implementation for WISP system security using the involution cipher Anubis algorithm. WISP has scarce resources in terms of hardware and memory, and it is reported that it has 32K of program and 8K of data storage, thus providing sufficient memory for design implementation. The chapter describes Minimal Instruction Set Computer (MISC) processor designs with a flexible architecture and simple hardware components for WISPs. The MISC is able to make use of a small area of the FPGA and provides security programs and features for WISPs. In this chapter, an example application, which is Anubis involution cipher algorithm, is used and proposed to be implemented onto MISC. The proposed MISC hardware architecture for Anubis can be designed and verified using the Handel-C hardware description language and implemented on a Xilinx Spartan-3 FPGA.
APA, Harvard, Vancouver, ISO, and other styles
6

Tuzova, Lyudmila N., Dmitry V. Tuzoff, Sergey I. Nikolenko, and Alexey S. Krasnov. "Teeth and Landmarks Detection and Classification Based on Deep Neural Networks." In Computational Techniques for Dental Image Analysis, 129–50. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6243-6.ch006.

Full text
Abstract:
In the recent decade, deep neural networks have enjoyed rapid development in various domains, including medicine. Convolutional neural networks (CNNs), deep neural network structures commonly used for image interpretation, brought the breakthrough in computer vision and became state-of-the-art techniques for various image recognition tasks, such as image classification, object detection, and semantic segmentation. In this chapter, the authors provide an overview of deep learning algorithms and review available literature for dental image analysis with methods based on CNNs. The present study is focused on the problems of landmarks and teeth detection and classification, as these tasks comprise an essential part of dental image interpretation both in clinical dentistry and in human identification systems based on the dental biometrical information.
APA, Harvard, Vancouver, ISO, and other styles
7

Dittrick, Yvonne, and Olle Lindeberg. "Designing for Changing Work and Business Practices." In Adaptive Evolutionary Information Systems, 152–71. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-59140-034-9.ch007.

Full text
Abstract:
Changes in the use context of computer programs require flexibility and adaptability of the software itself. But, how do you design for change in rapidly changing environments? Based on a case study, the chapter argues that it is not enough to only relate to the use context. Taking also technical and developmental contexts and how they relate to the use context into consideration, allows for light-weight solutions for adaptable special purpose software. The conceptualisation of design as “artful integration” of different contexts provides a starting point for a systematic identification of relevant contexts and evaluation of design alternatives in relation to these contexts.
APA, Harvard, Vancouver, ISO, and other styles
8

Porwal, Prasanna, Samiksha Pachade, Manesh Kokare, Girish Deshmukh, and Vivek Sahasrabuddhe. "Automatic Retinal Image Analysis for the Detection of Diabetic Retinopathy." In Biomedical Signal and Image Processing in Patient Care, 146–61. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2829-6.ch008.

Full text
Abstract:
Diabetic Retinopathy, a condition in the person affected by diabetes, is most common cause of blindness in the world. Recent research has given a better understanding of requirement in clinical eye care practice to identify better and cheaper ways of identification, management, diagnosis and treatment of retinal disease. The importance of diabetic retinopathy screening programs and difficulty in achieving reliable early diagnosis of diabetic retinopathy at a reasonable cost needs attention to develop computer-aided diagnosis tool. Computer aided disease diagnosis in retinal image analysis could ease mass screening of population with diabetes mellitus and help clinicians in utilizing their time more efficiently. The recent technological advances in computing power, communication systems, and machine learning techniques provide opportunities to the biomedical engineers and computer scientists to meet the requirements of clinical practice. With proper self-care, management, and medical professional support, individuals with diabetes can live a healthy and long life.
APA, Harvard, Vancouver, ISO, and other styles
9

Koza, John R. "Human-Competitive Machine Intelligence by Means of Genetic Algorithms." In Perspectives on Adaptation in Natural and Artificial Systems. Oxford University Press, 2005. http://dx.doi.org/10.1093/oso/9780195162929.003.0007.

Full text
Abstract:
The subtitle of John Holland's pioneering 1975 book Adaptation in Natural and Artificial Systems correctly anticipated that the genetic algorithm described in that book would have "applications to.. .artificial intelligence." When the entities in the evolving population are computer programs, Holland's genetic algorithm can be used to perform the task of searching the space of computer programs for a program that solves, or approximately solves, a problem. This variation of the genetic algorithm (called genetic programming) enables the genetic algorithm to address the long-standing challenge of getting a computer to solve a problem without explicitly programming it. Specifically, this challenge calls for an automatic system whose input is a high-level statement of a problem's requirements and whose output is a satisfactory solution to the given problem. Paraphrasing Arthur Samuel [33], this challenge concerns "How can computers be made to do what needs to be done, without being told exactly how to do it?" This challenge is the common goal of such fields of research as artificial intelligence and machine learning. Arthur Samuel [32] offered one measure for success in this pursuit, namely "The aim [is].. .to get machines to exhibit behavior, which if done by humans, would be assumed to involve the use of intelligence." Since a problem can generally be recast as a search for a computer program, genetic programming can potentially solve a wide range of problems, including problems of control, classification, system identification, and design. Section 2 describes genetic programming. Section 3 states what we mean when we say that an automatically created solution to a problem is competitive with the product of human creativity. Section 4 discusses the illustrative problem of automatically synthesizing both the topology and sizing for an analog electrical circuit. Section 5 discusses the problem of automatically determining the placement and routing (while simultaneously synthesizing the topology and sizing) of an electrical circuit. Section 6 discusses the problem of automatically synthesizing both the topology and tuning for a controller. Section 7 discusses the importance of illogic in achieving creativity and inventiveness.
APA, Harvard, Vancouver, ISO, and other styles
10

Blum, Bruce I. "The Philosophy of Science." In Beyond Programming. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195091601.003.0007.

Full text
Abstract:
This chapter presents an overview of the philosophy of science. why study this philosophy? Here is my justification. we know that the software process is a transformation from the identification of a need in-the- world into a set of computer programs that operate in-the-computer. The process begins with an idea, a concept, something that may defy a complete description, and it ends with the delivery of a formal model that executes in the computer. As we have seen, there is a fundamental tension in this transformation, a tension between what we want and how we make it work, between the requirements in-the-world and their realization in-the-computer, between the subjective and the objective, the conceptual and the formal. This book seeks to resolve that tension. Science faces a similar problem, and so I start by examining its solutions. Science begins with something very complex and poorly represented—the real world—and its goal is to describe aspects of that reality with theories and models. we know that science is successful. It is reasonable to look, therefore, into its strengths and limitations for insight into resolving the software process’ central tension. To gain this insight, I turn to the philosophy of science because it constitutes a kind of meta-science. It examines the nature of science from a theoretical perspective; it helps us appreciate what is knowable and what can be represented formally. I note at the outset, this is not my area of expertise. Moreover, the philosophers of science have not reached a consensus. Philosophical inquiry is, by its very nature, controversial and argumentative, and the theme of this chapter is the underlying controversies regarding the nature of science and scientific knowledge. If we are to find “scientific foundations,” then we must first understand what science is (and is not)—the topic of what follows. I warn the reader that this chapter conforms to truth in labeling; as its title indicates, it literally is about the philosophy of science. There are a few explanatory comments that tie the material to the immediate needs of a software engineer, but this really is a chapter about philosophy.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Teeth Identification Computer programs"

1

Simon, Vilmos V. "Computerized Finite Element Mesh Generation in Hypoid Gears." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/dac-3771.

Full text
Abstract:
Abstract A method has been developed for the automatic finite element discretization of the pinion and the gear of a Gleason type hypoid gear pair. The numbers and sizes of elements can by arbitrarily chosen in the main directions and in the different regions of the teeth in order to get a finer mesh where extreme values of stresses are expected or previously calculated. The method includes the identification of each element by its number, the definition of element topology, the calculation of the nodal coordinates, and the specification of the boundary conditions. The main part of the method is the calculation of the nodal coordinates, based on the real tooth geometry of the pinion and gear teeth. The determination of the tooth flank and the tooth fillet surface is based on the kinematics of the manufacture and on the applied machine tool settings. On the basis of the presented theory the corresponding computer program has been developed. By using this program the grid mesh in a pinion and in a gear of a hypoid gear pair is generated and presented.
APA, Harvard, Vancouver, ISO, and other styles
2

Adanur, Beyhan, and Burcu Bakir Gungor. "Comparison of Disease Specific Sub-Network Identification Programs." In 2018 3rd International Conference on Computer Science and Engineering (UBMK). IEEE, 2018. http://dx.doi.org/10.1109/ubmk.2018.8566663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Metwalli, Sayed M., and Ehab A. El Danaf. "CAD and Optimization of Spur and Helical Gear Sets." In ASME 1996 Design Engineering Technical Conferences and Computers in Engineering Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/96-detc/dac-1433.

Full text
Abstract:
Abstract The present work is an application of Computer Aided Design and optimization techniques to solve the problem of designing a pair of gears. The CAD programs have the initial freedom to change the design variables: the module, the number of teeth, the face width, and the material through a data base display, and a full detailed design stage that applies the AGMA bending and contact number checking criteria, and the bending fatigue strength and the surface endurance strength criteria. Other programs are also linked to optimize spur gears under the objective of minimizing the volume. The design vector is taken to be the module, the number of teeth, and the face width, with the interaction between bending and contact stress constraints. These programs were utilized to study the behavior of the optimum parameters for a full range of cases. Charts of the optimum results are plotted. For optimizing helical gears, the design vector is taken as the module, the number of teeth, the face width, and the helix angle. A comparison is made between values of the objective function and optimum parameters for spur and helical gears for a wide range of cases. A comparison is also made of the results with other previous works of optimization and proved that the approach presented here gives better optimum results for the same loading case.
APA, Harvard, Vancouver, ISO, and other styles
4

Macek-Kaminska, Krystyna, and Marcin Kaminski. "Application of the Modern Programming Techniques in Creation of the Programs for Simulation and Identification of the Electromechanical Systems." In EUROCON 2007 - The International Conference on "Computer as a Tool". IEEE, 2007. http://dx.doi.org/10.1109/eurcon.2007.4400622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chan, W. K., Jeffrey C. F. Ho, and T. H. Tse. "Piping Classification to Metamorphic Testing: An Empirical Study towards Better Effectiveness for the Identification of Failures in Mesh Simplification Programs." In 31st Annual International Computer Software and Applications Conference - Vol. 1- (COMPSAC 2007). IEEE, 2007. http://dx.doi.org/10.1109/compsac.2007.167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Litvin, F. L., C. L. Hsiao, J. C. Wang, and X. Zhou. "Computerized Simulation of Generation of Internal Involute Gears and Their Assembly." In ASME 1992 Design Technical Conferences. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/detc1992-0324.

Full text
Abstract:
Abstract The contents of the paper cover the determination of conditions : (i) of nonundercutting by axial and axial-radial generation of internal gears by shapers, and (ii) avoidance of interference by axial and axial-radial assembly. The authors have developed computer programs for simulation of undercutting and interference, design charts and a table that allow to determine the limiting number of teeth of the cutter and pinion considering the tooth number of internal gear as known. The details of developed algorithms are given in Appendices. The paper is illustrated with computer graphics and numerical examples.
APA, Harvard, Vancouver, ISO, and other styles
7

Grotjahn, Martin, and Bodo Heimann. "Identification of Multi-Body Dynamics by External Force/Torque Measurements." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/vib-21359.

Full text
Abstract:
Abstract Analytical simplification and regrouping rules are presented which lead to a formulation of the base force/torque equations of tree-structured multi-body system which is linear with respect to a dynamic parameter vector of minimal dimension. The rules depend only on the kinematic parameters. They can be easily implemented in standard computer algebra programs. Furthermore, a new approach is presented for identification of the system’s dynamics by external force/torque measurements. It does not require optimized trajectories for parameter excitation. The method is applied to the identification of a 6-d.o.f. standard industrial robot by base force/torque measurements. A comparison to results of a conventional identification approach shows the efficiency of the presented identification method.
APA, Harvard, Vancouver, ISO, and other styles
8

Belanger, F., D. Millan, and X. Cyril. "Submarine Autopilot Performance Optimization with System Identification." In International Ship Control Systems Symposium. IMarEST, 2018. http://dx.doi.org/10.24868/issn.2631-8741.2018.014.

Full text
Abstract:
Computer simulation models play a vital role in the assessment of a ship’s autopilot design. A well-tuned autopilot will contribute to reducing rudder activity, thereby minimizing wear on the actuation plant and also generally reducing fuel consumption. The equations that describe the ship motion dynamics contain a large number of hydrodynamic coefficients that must be calculated as accurately as possible to justify the use of a simulation model and its relevance to predicting the ship manoeuvring characteristics. Proper prediction of the ship performance is an essential pre-requisite in the process of tuning the autopilot. The hydrodynamic coefficients can be calculated by using theoretical methods or by carrying out experiments on the actual ship or on a scaled model of the ship. System Identification (SI) is an experiment-based approach and in this paper the authors present an algorithm that can estimate the coefficients with great accuracy. These coefficients can classically be obtained in a towing tank using a captive model, and with a planar motion mechanism and a rotating arm. Generally, these systems are costly and entail expensive trials programs, and SI methods have been developed in an effort to obviate some of those problems and limitations. They typically process ship manoeuvring data obtained from a free-running scaled model or full-scale trials. While similar to a surface ship, the motion dynamics of a submarine introduce additional challenges for SI methods. This is because the submarine manoeuvres in “three dimensions”, which adds complexity and more hydrodynamic coefficients to the equations. The standard submarine simulation model, also referred to as the Gertler and Hagen equations, incorporates over 120 coefficients. To calculated these coefficients, the SI algorithm uses a Square-Root Unscented Kalman filter (SR-UKF). One of its appealing features is that it calculates all the coefficients by processing data from a single submarine manoeuvre that has a repeating sinusoidal pattern in both depth and course. The manoeuvre can be performed in a towing tank by a free-running scaled model of the submarine, or it can be performed at sea on the full-scale submarine as part of the sea trials schedule.
APA, Harvard, Vancouver, ISO, and other styles
9

Mathioudakis, K., A. Stamatis, A. Tsalavoutas, and N. Aretakis. "Instructing the Principles of Gas Turbine Performance Monitoring and Diagnostics by Means of Interactive Computer Models." In ASME Turbo Expo 2000: Power for Land, Sea, and Air. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/2000-gt-0584.

Full text
Abstract:
The paper discusses how the principles employed for monitoring the performance of gas turbines in industrial duty can be explained by using suitable Gas Turbine performance models. A particular performance model that can be used for educational purposes is presented. The model allows the presentation of basic rules of gas turbine engine behavior and helps understanding different aspects of its operation. It is equipped with a graphics interface, so it can present engine operating point data in a number of different ways: operating line, operating points of the components, variation of particular quantities with operating conditions etc. Its novel feature, compared to existing simulation programs, is that it can be used for studying cases of faulty engine operation. Faults can be implanted into different engine components and their impact on engine performance studied. The notion of fault signatures on measured quantities is clearly demonstrated. On the other hand, the model has a diagnostic capability, allowing the introduction of measurement data from faulty engines and providing a diagnosis, namely a picture of how the performance of engine components has deviated from nominal condition, and how this information gives the possibility for fault identification.
APA, Harvard, Vancouver, ISO, and other styles
10

Kawada, Ken-ichi, Ikken Sato, Yoshiharu Tobita, Werner Pfrang, Laurence Buffe, and Emmanuelle Dufour. "Development of PIRT (Phenomena Identification and Ranking Table) for SAS-SFR (SAS4A) Validation." In 2014 22nd International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/icone22-30679.

Full text
Abstract:
SAS-SFR (derived from SAS4A) is presently the most advanced computer code for simulation of the primary phase of the Core Disruptive Accident (CDA) of MOX-fueled Sodium-cooled Fast Reactors (SFR). In the past two decades, intensive model improvement works have been conducted for SAS-SFR utilizing the experimental data from the CABRI programs. The main target of the present work is to confirm validity of these improved models through a systematic and comprehensive set of test analyses to demonstrate that the improved models has a sufficient quality assurance level for applications to reactor conditions. In order to reach these objectives, an approach of PIRT (Phenomena Identification and Ranking Table) on a set of accident scenarios has been applied. Based on the fact that there have been a significant amount of validation studies for decades, development of the code validation matrix concentrated on key issues. Different accident scenarios have been chosen for the PIRT considering typical SFR accident transients that address a large range of phenomena. As the most important and typical Core Disruptive Accident scenarios leading to generalized core melting and to be addressed with SAS-SFR in the present study, ULOF (Unprotected Loss Of Flow), UTOP (Unprotected Transient OverPower) and ULOHS (Unprotected Loss Of Heat Sink) are selected. The PIRT process applied to a given accident scenario consists in an identification of the phenomena involved during the accident, the evaluation of the importance of the phenomena regarding to the evolution and consequences, and the evaluation of the status of knowledge based on the review of available experimental results. The identified phenomena involved in ULOF are explained as follows for the primary phase. Starting from initiating events, a loss of grid power leading to flow coast down without scram is assumed. The scenario up to coolant boiling is the main point within the first part of the ULOF phenomenological chart. Those elements related to reactivity feedback, such as heat up of coolant, fuel and various structures and their deformation due to the thermal transient are picked up. Depending on the time scale before boiling starts, primary, secondary and tertiary loop heat transfer including the DHR (Decay Heat Removal) system response is concerned since it defines the core inlet coolant temperature. Core inlet coolant temperature gives direct impact on the thermal condition of the core. It also affects reactivity through thermal expansion of the grid plate. In the second part of the ULOF phenomenological chart, elements such as coolant boiling, mechanical response of the fuel pin leading to cladding failure, FCI (Fuel-Coolant Interaction) and post-failure material relocation are picked up. This part of the chart is basically common to the ULOHS. Respective identified phenomena are to be simulated in the SAS-SFR code. To validate the function of the models in the code, ten high priority CABRI experiments are selected. Validation studies on these tests are underway. With the present study, important phenomena involved in ULOF, UTOP and ULOHS were identified and an evaluation matrix for the selected CABRI experiments was developed.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Teeth Identification Computer programs"

1

Striuk, Andrii M. Software engineering: first 50 years of formation and development. [б. в.], December 2018. http://dx.doi.org/10.31812/123456789/2880.

Full text
Abstract:
The article analyzes the main stages of software engineering (SE) development. Based on the analysis of materials from the first SE conferences (1968-1969), it was determined how the software crisis prompted scientists and practitioners to join forces to form an engineering approach to programming. Differences in professional training for SE are identified. The fundamental components of the training of future software engineers are highlighted. The evolution of approaches to the design, implementation, testing and documentation of software is considered. The system scientific, technological approaches and methods for the design and construction of computer programs are highlighted. Analysis of the historical stages of the development of SE showed that despite the universal recognition of the importance of using the mathematical apparatus of logic, automata theory and linguistics when developing software, it was created empirically without its use. The factor that led practitioners to turn to the mathematical foundations of an SE is the increasing complexity of software and the inability of empirical approaches to its development and management to cope with it. The training of software engineers highlighted the problem of the rapid obsolescence of the technological content of education, the solution of which lies in its fundamentalization through the identification of the basic foundations of the industry. It is determined that mastering the basics of computer science is the foundation of vocational training in SE.
APA, Harvard, Vancouver, ISO, and other styles
2

Levisohn, Sharon, Maricarmen Garcia, David Yogev, and Stanley Kleven. Targeted Molecular Typing of Pathogenic Avian Mycoplasmas. United States Department of Agriculture, January 2006. http://dx.doi.org/10.32747/2006.7695853.bard.

Full text
Abstract:
Intraspecies identification (DNA "fingerprinting") of pathogenic avian mycoplasmas is a powerful tool for epidemiological studies and monitoring strain identity. However the only widely method available for Mycoplasma gallisepticum (MG) and M. synoviae (MS)wasrandom amplified polymorphic DNA (RAPD). This project aimed to develop alternative and supplementary typing methods that will overcome the major constraints of RAPD, such as the need for isolation of the organism in pure culture and the lack of reproducibility intrinsic in the method. Our strategy focussed on recognition of molecular markers enabling identification of MG and MS vaccine strains and, by extension, pathogenic potential of field isolates. Our first aim was to develop PCR-based systems which will allow amplification of specific targeted genes directly from clinical material. For this purpose we evaluated the degree of intraspecies heterogeneity in genes encoding variable surface antigens uniquely found in MG all of which are putative pathogenicity factors. Phylogenic analysis of targeted sequences of selected genes (pvpA, gapA, mgc2, and lp) was employed to determine the relationship among MG strains.. This method, designated gene targeted sequencing (GTS), was successfully employed to identify strains and to establish epidemiologically-linked strain clusters. Diagnostic PCR tests were designed and validated for each of the target genes, allowing amplification of specific nucleotide sequences from clinical samples. An mgc2-PCR-RFLP test was designed for rapid differential diagnosis of MG vaccine strains in Israel. Addressing other project goals, we used transposon mutagenesis and in vivo and in vitro models for pathogenicity to correlated specific changes in target genes with biological properties that may impact the course of infection. An innovative method for specific detection and typing of MS strains was based on the hemagglutinin-encoding gene vlhA, uniquely found in this species. In parallel, we evaluated the application of amplified fragment length polymorphism (AFLP) in avian mycoplasmas. AFLP is a highly discriminatory method that scans the entire genome using infrequent restriction site PCR. As a first step the method was found to be highly correlated with other DNA typing methods for MG species and strain differentiation. The method is highly reproducible and relatively rapid, although it is necessary to isolate the strain to be tested. Both AFLP and GTS are readily to amenable to computer-assisted analysis of similarity and construction of a data-base resource. The availability of improved and diverse tools will help realize the full potential of molecular typing of avian mycoplasmas as an integral and essential part of mycoplasma control programs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography