Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Sample 1_Augmented Reality Reference in APA format Penza, V., Ortiz, J., Mattos, L. S., Forgione, A., & Momi, E. D XXXXXXXXXXDense soft tissue 3D reconstruction refined with super-pixel segmentation...

1 answer below »
Sample 1_Augmented Reality
    Reference in APA format
    Penza, V., Ortiz, J., Mattos, L. S., Forgione, A., & Momi, E. D XXXXXXXXXXDense soft tissue 3D reconstruction refined with super-pixel segmentation for robotic abdominal surgery. International Journal of Computer Assisted Radiology and Surgery, Volum 3, Issue 2, XXXXXXXXXX.
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    DOI XXXXXXXXXX/s XXXXXXXXXX
    Journal Level: Q2
    Augmented reality, 3D surface reconstruction, Visualization, Depth estimation, Super pixel Segmentation
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Purpose) of this Solution & What is the Problem that need to be solved
    What are the components of it?
     Techniques:
· Stereoscopic imaging
· 3D reconstruction
· Non-parametric modified census transformation
· Simple Linear Iterative Clustering (SLIC)
· (super pixel segmentation)
Tools:
CT Scan
OpenCV
Stereoscopic Cameras (288x360)
Applied Area:
Liver Surgery
    Problem: the author identified the problem in the complexity of minimally invasive surgery where surgeons are limited to movements and visualization of dense soft tissues accurately.
Purpose (Goal): to propose a system that will enhance intra-operative visualization by exploiting 3D information about the surgical site using SLIC refinement.
    Pre-Operation:
· CT Scan
· Extraction of organ models
· Creation of virtual environment
· Real-virtual camera cali
ation
During Surgery:
· Real-virtual patient registration
· Dense 3D reconstruction
    The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process
        
    Process Steps - Pre Operation
    Advantage
    Disadvantage (Limitation)
    1
    CT Scan
    
    
    2
    Extraction of 3D surface models
    
    
    3
    Real-virtual camera cali
ation
    Cali
ated using OpenCV Li
ary
It is able to remove artifacts from the images; thus enhancing quality.
    
    
    Process Steps - During Surgery
    Advantage
    Disadvantage (Limitation)
    1
    Semi-automatic registration of virtual environment on the real patient (not stated if uses machine learning). They use “virtual assistance system”
This semi-automatic registration is done using real-virtual camera plane and the view of the abdomen where it is possible to run the visualization.
    Produces the view of the model for visualization
    
    2
    Soft tissue 3D surface reconstruction
Composed of 2 different approaches in which the author called it “Method 1” and “Method 2”
    
    
    3
    Equalization
Histogram Equalization
Used as (equalizedHist) in OpenCV Li
ary.
Reconstruction Method 1 (Consists of 3 steps)
1. Matching Computation Cost
Absolute intensity Difference (AD)
Matching is done to determine the similarity of the intensity of the pixels of the left and right images to detect and eliminate e
ors.
2. Aggregation Cost Computation
Sum of Absolute Difference (SAD)
A function to combine these pixels into a more meaningful data set using sum of absolute difference.
3. Disparity Computation
Winner takes all strategy computation (WTA)
The disparity computation is responsible for validating the matched pixels on the surface by using winner takes all from the values.
Method 1 is a surface reconstruction technique which uses equalizations to improve the details within the surface area.
    Histogram Equalization – improves the contrast and enhances the details that are over or under exposed.
AD – To calculate the similarity between two pixels.
SAD – the sum of Absolute difference from the computed value in matching cost
WTA – used to find the minimum aggregation cost value at each pixel. Helps validate the co
ect pixels.
    Problems in disparity refinement can arise if the motion and tissue deformation is not identified.
    4
    Reconstruction Method 2 (3 main steps without equalization)
1. Matching cost computation
Non parametric census transform
Matching is done to determine the similarity of pixels of the images in a moving window for comparison.
2. Aggregation cost computation
Sum of Hamming Distance (SHD)
A function to combine these pixels into a more meaningful data set using sum of Hamming Distance.
3. Disparity Computation
The disparity computation is responsible for validating the matched pixels on the surface by using winner takes all from the values.
Method 2 is also a surface reconstruction which does not use equalization like method 1, but it uses NCT to track the moving pixels within the surface area.
    NCT – converts each pixel inside a moving window into a string of bits that represents neighbour pixels for comparison with central pixel and mean pixels within.
SHD – compares the bit of strings that represents the pixels and identifies the position to decrease the computational time of the algorithm.
    Problems in disparity refinement can arise if the motion and tissue deformation is not identified.
    5
    
The SLIC refinement is a Superpixels segmentation process where it fills the holes disparity map and produces better reconstructed images.
This method is applied after the initial disparity map is constructed then will be refined through this algorithm to fill the holes and create a more dense disparity map.
    SLIC provides better matched pixels because the disparity map will have less holes; thus, will provide better output for visualization in the AR.
    There is a trade-off between accuracy and computation time. SLIC adds about 0.1s in computation time but will increase the accuracy of matched pixels providing a dense disparity map.
    Major Impact Factors in this Work
    
    Dependent Variable
    Independent Variable
    Accuracy of e
or mapping
    Using 2 heart phantoms(Method 2 with SLIC refinement which is most accurate), it was able to achieve an accuracy in disparity e
or mapping of :
Heart 1 – 1.75mm
Heart 2 – 1.79mm
    Processing time (computational time)
    1.29s / frame and 1.30s / frame (using image resolution of 288x360)
SLIC refinement adds about 0.1s for both heart phantoms.
    Depth Perception (pixels matching)
    Using 2 heart phantoms(Method 2 with SLIC refinement), it was able to match pixels with the percentage of :
Heart 1 – 72.6% matched pixels
Heart 2 – 66.5% matched pixels
    
    Input and Output
    Feature of This Solution
    Contribution & The Value of This Work
    
    Input - Pre Operation
    Output - Pre Operation
    CT Scan Data
    Preoperative 3D model

    Input - During Surgery
    Output - During Surgery
    3D model
    AR view
    
This proposed enhanced system was able to provide accurate results which was able to address, instrument interaction with tissue,
eathing, heartbeat using depth estimation methods (real-time 3D reconstruction with Superpixels refinements).
The most notable feature in this system is the ability to create a 3D reconstruction of the preoperative model while in the intraoperative considering other factors such movements, and deformations. This enables better visualizations for the surgeon as they are aware of real-time happenings within the surgery as there are always uncertainty that can happen which are not planned.
    
The main contribution of this method is to be able to provide a “virtual assistive system” in which it is able to do 3D reconstructions which overcomes the limitations of the state of the arts limitation. Reconstructing the soft tissues in real-time will provide better visualization for the surgeons as they will see deformations happening and will update based from the previous frame and not the original CT data. Though the main contribution of the paper is within the segmentations refinement method which is SLIC refinements where it fills the holes of the disparity map by matching the pixels to form a better disparity map that will be inserted in the virtual environment.
    1. what in the method could have been better?
    2. what in the author analyses were missed?
    3. was there a technique that could have been used, or a question that could have been asked, that the researchers did not use or ask?
    
Based on the proposed method, the segmentation phase that does the disparity map refinement added on the computational time. There have been modifications within the SLIC algorithm that increases computational speed and accuracy with pixel matching; thus would improve the overall refinement and the accuracy of the system.
    Surgical tools may be a hindrance to this proposed solution since large occlusions may cause the 3D reconstruction not to identify the soft tissue or deformation accurately since it relies on the previous data and not the preoperative data.
     Occlusion handling could be addressed in a form of additional technique or integrate a system that would address the tools such as geometric aware systems where in would register the tools in the preoperative phase.
    4. were the conclusion justified and How?
    Analyse This Work By Critical Thinking
    The Tools That Assessed this Work
    The conclusions were justified since the main goal of the proposed system is to enhance visualization of the state of the art by proposing 3D reconstruction methods to defeat the static nature of preoperative CT scans. The used a novel SLIC refinement algorithm to enhance the accuracy of the images in terms of disparity maps that will be used in the virtual environment. They were also able to provide suggestions to improve their system, such stating that they would use a GPU based workstation.
    The proposed system was able to overcome common problems of AR systems in which it relies heavily on pre-operative data. This solution uses dense 3D reconstruction so that it is able to handle soft tissue deformations happening in real-time. They also use SLIC refinement to improve the accuracy which increased the matched pixels of the disparity map outputs by up to 70% compared to the non-refined disparity maps(images).
However, there are still limitations to this system. It focuses mainly on reconstructing the soft tissue deformations but given if there are large occlusions(tools) within the area of the reconstructions, it will not be able to accurately reconstruct the tissue which is changing. This can be solved by using geometrically aware systems which seen in other proposed methods within AR.
     The experiment was ca
ied out using phantoms hearts where there are 2 methods involved that uses 3D reconstructions. Method 1 with SLIC refinement was able to provide 3.11mm and 72.6% matched pixels within 1.21s.
Method 2 with SLIC refinement was able to achieve even better results with 1.75mm and 72.6% matched pixels within 1.29s.
Sample 2_Networking
    Reference in APA format
    Wu, J., Cheng, B., Wang, M., & Chen, J XXXXXXXXXXPriority-Aware FEC Coding for High-Definition Mobile Video Delivery Using TCP. IEEE Transactions On Mobile Computing, 16(4), XXXXXXXXXX.
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    http:
ieeexplore.ieee.org.ezproxy.csu.edu.a u/stamp/stamp.jsp?amumber=7498667 
    Q2
    · High definition mobile video 
· TCP
· Stringent delay constraint
· Forward e
or co
ection
· Priority-awareness
· Wireless networks
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Purpose) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Techniques:
Priority Aware and TCP Oriented coding (PATON)
    Problem: delivering HD video using TCP over wireless network seems challenging because of high transmission rate and stringent delay constraint of HD video, bandwidth limited and e
or prone wireless network, and the retransmission scheme of TCP that causes delay.
Goal: to
Answered Same Day Aug 22, 2020 Swinburne University of Technology

Solution

Amit answered on Aug 25 2020
145 Votes
cloud computing with AES encryption for Health secto
(
18
cloud
computing with AES encryption for Health secto
)
Table of contents
1) Journal 1
2) Journal 2
3) Journal3
4) Journal 4
5) Journal 5
6) Journal 6
7) Journal 7
8) Journal 8
9) Journal 9
10) Journal 10
    Version 1.0 _ Week 1 (10 Journal Papers from CSU Li
ary)
    1.
    Reference in APA format that will be in 'Reference List'
    Doukas, C., & Maglogiannis, I. (2012, July). Bringing IoT and cloud computing towards pervasive healthcare. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on (pp. 922-926). IEEE.
    Citation that will be in the content
    Doukas & Maglogiannis, 2012
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https:
ieeexplore.ieee.org/abstract/document/6296978
    Q1
    IMIS , Cloud computing, Medical services, Clouds, Biomedical monitoring, Mobile communication, Real time systems
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
Bringing IoT and cloud computing towards pervasive healthcare
Tools: AES
Applied Area:
Internet of Things (IoT), Cloud Computing, Patient Monitoring, Wearable Sensors
    Problem: the problem of data privacy and data security. Now data is centralised due to cloud computing technology.
Goal: The key facility of cloud computing provide the security to data. Three main points are covered by data security’s goal: Integrity, availability and confidentially.
    IMIS , IoT, cloud computing, pervasive healthcare applications, body sensor networks, Internet of Things, sensor data online processing, mobile sensor management, wearable healthcare sensor management
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Cloud computing architecture divided into two sections: back end and front end. Client application and computer comprises in front end. Server and data storage at back end. Network computer communicates each other through middleware and protocols.
    Reduced cost
    Security issues
    2
    Patient complete healthcare report stored on cloud computing through IoT. Some private data stored in image form. For extra care image converted into pixels and encrypted into pixels.
    Improved performance
    Technical issues
    3
    Encryption is done through technique advance encryption standard (AES). Cryptography is important method to secure data on cloud
    Increased processing time
    
    4
    Symmetric and asymmetric algorithm is providing by cryptography to secure data.
    Provide privacy
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Hy
id cloud
    Central serve
    
    Protocols
    
    Data encryption
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Patient data
    Secured data on wireless devices
    Feature of this work is mainly provided security and privacy to the data which is related to patients’ health and stored that data on cloud.
    There is a chance of data hacking in this research cu
ent solution. This is limitation of it.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
     Cloud service models include platform as a service, software as a service and infrastructure as a service. There is no need of direct communication for health records’ transfers.
    Technique:AES
    The importance of this research to encrypting important data and centralized data in heath sector.
    Diagram/Flowchart
    
    2.
    Reference in APA format that will be in 'Reference List'
    Zhang, K., Zhou, X., Chen, Y., Wang, X., & Ruan, Y. (2011, October). Sedic: privacy-aware data intensive computing on hy
id clouds. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 515-526). ACM.
    Citation that will be in the content
    Zhang, 2011
    URL of the Reference
    Level of Journal (Q1, Q2, …An)
    Keywords in this Reference
    https:
dl.acm.org/citation.cfm?id=2046767
    Q3
    Medical records
Cloud storage
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution &What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name: Eahancement the security of medical records by making use of integrity check.
Tools: AES
Applied Area:
Medical records
Data sharing for medical records
    Problem: The use of hy
id cloud for sharing the medical records can cause data privacy issues. The implementation of cryptography with cloud can solve this issue.
Goal: The security of medical data stored on hy
id cloud is main goal. For archiving this goal encryption is being implemented.
    Medical records
Integrity checks
Security requirements on hy
id cloud for medical records
Statistical analysis
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    The policy, privacy statics and privacy cryptography are the main process steps for implementing Cloud computing architecture and encryption protocols on health care records.
    Reduced operational cost
    Security issues to health care databases stored on hy
id cloud.
    2
    Complete records of healthcare report are merged and integrity checks are ca
ied out.
    Overall performance is increased
    Technical issues
    3
    The hy
id search of plan text in cipher text is completed.
    Increased data accessing time.
    
    4
    A protocol based system for improved security on medical data is implemented.
    Provide improved security
    
    5
    An effective extensive experiment is ca
ied out.
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    Hy
id cloud
    Health care data.
    
    integrity checks
    
    Data encryption
    
    Protocol based system implementation
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Health care data for merging on hy
id cloud.
    Protocol based secured data as output.
    The implementation of protocol based system on hy
id cloud for medical databases provides additional security to hy
id cloud which increases the overall security of medical data.
    The implementation cost is increased due to implementation of protocol based system, is its limitation.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The hy
id Cloud service models include protocol based system and merged health care data on hy
id cloud. The patient records can be accessed by providing the decryption key only.
    Technique: AES
    The importance of this research to implement protocol based system to increase security of health care data stored on hy
id cloud.
    Diagram/Flowchart
    
    3.
    Reference in APA format that will be in 'Reference List'
    Chen, Y. Y., Lu, J. C., & Jan, J. K. (2012). A secure EHR system based on hy
id clouds. Journal of medical systems, 36(5), 3375-3384.
    Citation that will be in the content
    Chen, 2012
    URL of the Reference
    Level of Journal (Q1, Q2, …Qn)
    Keywords in this Reference
    https:
link.springer.com/article/10.1007/s10916-012-9830-6
    Q1
    interoperable EHR
cloud implementation
    The Name of the Cu
ent Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
    The Goal (Objective) of this Solution & What is the Problem that need to be solved
    What are the components of it?
    Technique/Algorithm name:
EHR system for CHISTAR for archiving semantic interoperability
Tools:
EHR system
CHISTAR
Applied Area:
Health secto
    Problem: the main problem is data minimum use of interoperability standards in implementation of hy
id cloud. The improved of interoperability standards will increase the security of cloud.
Goal: the main goal is increase of use of proper interoperability standards on cloud storing medical data.
    
EHR system
Cloud serve
CHISTAR
Public health records
    The Process (Mechanism) of this Work; The process steps of the Technique/system
    
    
    Process Steps
    Advantage (Purpose of this step)
    Disadvantage (Limitation/Challenge)
    1
    Implement EHR (electronic health record) system to all the users and stakeholders of cloud.
    Improved performance
    Security issue
    2
    Implement CHISTAR (cloud health information systems technology architecture) for improved security.
    Improved privacy
    Lengthy process
    3
    The interoperability standards are implemented for desired implementation of hy
id cloud holding medical records.
    
    Technical issues
    4
    
    
    
    5
    
    
    
    Validation Criteria (Measurement Criteria)
    
    Dependent Variable
    Independent Variable
    EHR system
    Access keys
    CHISTAR
    Interoperability standards
    
    Hy
id cloud
    
    
    
    
    
    
    
    Input and Output
    Critical Thinking: Feature of this work, and Why (Justify)
    Critical Thinking: Limitations of the research cu
ent solution, and Why (Justify)
        Input (Data)
    Output (View)
    Data in form of EHR
    Secured databases
    The implementation of HER system, CHISTAR and interoperability standards on cloud by AES technique in health sector.
    Data privacy.
    (Describe the research/cu
ent solution)
    Evaluation Criteria
    How this research/cu
ent solution is valuable for your project
    The data is stored with help of EHR system....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here