scispace - formally typeset
Search or ask a question

Showing papers on "Personal computer published in 2007"


Journal ArticleDOI
TL;DR: The use of the open-source software, CellProfiler, to automatically identify and measure a variety of biological objects in images is described, enabling biologists to comprehensively and quantitatively address many questions that previously would have required custom programming.
Abstract: Careful visual examination of biological samples is quite powerful, but many visual analysis tasks done in the laboratory are repetitive, tedious, and subjective. Here we describe the use of the open-source software, CellProfiler, to automatically identify and measure a variety of biological objects in images. The applications demonstrated here include yeast colony counting and classifying, cell microarray annotation, yeast patch assays, mouse tumor quantification, wound healing assays, and tissue topology measurement. The software automatically identifies objects in digital images, counts them, and records a full spectrum of measurements for each object, including location within the image, size, shape, color intensity, degree of correlation between colors, texture (smoothness), and number of neighbors. Small numbers of images can be processed automatically on a personal computer and hundreds of thousands can be analyzed using a computing cluster. This free, easy-to-use software enables biologists to comprehensively and quantitatively address many questions that previously would have required custom programming, thereby facilitating discovery in a variety of biological fields of study.

849 citations


Patent
12 Oct 2007
TL;DR: In this paper, a method and apparatus for mapping address information (e.g., locations denoted by name or address, street addresses, landmarks, etc.) off of disparate sources and onto new or existing maps, are disclosed.
Abstract: A method and apparatus for mapping address information (e.g. locations denoted by name or address, street addresses, landmarks, etc.) off of disparate sources and onto new or existing maps, are disclosed. A mapping component (e.g. a standalone application, a web-browser plug-in, an ActiveX control, a DLL, a COM object, a web object, a part of a an application displaying and/or generating maps, etc.) running on an electronic device (e.g. personal computer, workstation, thin client, PDA, cellular phone, GPS device, etc.) may receive input of address information and relay the received input to a mapping application (e.g. an online mapping service such as Google Maps®, Yahoo! Maps®, Windows Live Search Maps®, MapQuest®, etc.; or a mapping application running locally on a PDA, cell phone, etc.) for plotting on a common map, displayed by a map-display application (e.g. a browser, a web user agent, etc.). A mapping component may have a permanent visibility to the user (e.g. by being a top-most application in a windowed environment, by being present in a portion of the user's desktop that is commonly unobstructed by other applications such as the system tray, by being a widget, by being a control on a browser toolbar, etc.) A mapping component may be a module of a display application. A mapping component may receive user input directly, for example by typing; and/or via the clipboard, for example via a drag-and-drop or copy/paste operation or a pre-determined key combination; and/or via the use of context menus; and/or by any other means supported by the electronic device. A mapping component may aggregate multiple received address information prior to relaying the aggregated address information to a mapping application and/or a map-display application. A mapping component may parse, or otherwise process the location data prior to relaying the location data to a mapping application and/or a map-display application. The user may select an existing map for receiving the input; or, the optimal map for displaying the address information may be selected automatically; or, a mapping service may associate the user with stored maps and select the optimal map for receiving the address information.

728 citations


Journal ArticleDOI
TL;DR: The results indicate that customer value perceptions in banking actions differ between internet and mobile channels and suggest that efficiency, convenience and safety are salient in determining the differences inCustomer value perceptions betweeninternet and mobile banking.
Abstract: Purpose – The aim of the paper is to explore and compare customer value perceptions in internet and mobile banking. The purpose especially is to compare customer perceived value and value creation between internet and mobile bill paying service.Design/methodology/approach – A qualitative in‐depth interviewing design was applied in order to ascertain the factors that create value perceptions in fund transfer service via personal computer and mobile phone. Means‐end approach and laddering interviewing technique was used in order to reveal how different value creating factors are hierarchically structured and related to each other.Findings – The results indicate that customer value perceptions in banking actions differ between internet and mobile channels. The findings suggest that efficiency, convenience and safety are salient in determining the differences in customer value perceptions between internet and mobile banking.Research limitations/implications – The findings of the qualitative study, being more ...

394 citations


Journal Article
TL;DR: In this paper, a theoretical model that augments the theory of reasoned action (TRA) with two new constructs, trust and enjoyment, was proposed to gain new insights into the determinants of behavioral intention to play online games.
Abstract: As online games grow in importance as an electronic commerce application, researchers and practitioners increasingly believe that understanding online game player behavior is critical to the success of online game vendors. In an attempt to gain new insights into the determinants of behavioral intention to play online games, we propose a theoretical model that augments the theory of reasoned action (TRA) with two new constructs, trust and enjoyment. Within the model framework, we investigate the impact of trust and enjoyment on behavioral intention as well as on behavioral attitude. Our proposed model is tested by using questionnaire responses of 253 online game players. As hypothesized, attitude, enjoyment, and subjective norms predict intention, and enjoyment significantly affects attitude. The results also show that trust affects intention only indirectly through attitude. The paper contributes by highlighting the roles of trust and enjoyment in the online gaming context. Keywords: enjoyment, online games, TRA, trust 1. Introduction In the past decade, the business of online games has grown rapidly due to advances in personal computing and the remarkable penetration of the high-speed Internet. DFC Intelligence (2006) estimates that the total revenue of the online game industry will grow from $3.4 billion in 2005 to over $13 billion in 2011. The market research firm also estimates that the number of global online game players will increase from 124 million in 2005 to 376 million by 2009. The rapid growth of online gaming businesses calls for an investigation to discover what key factors motivate players to play games online. Little empirical study, however, has been conducted on the determinants of player behavior. Online games are played through the Internet (Hilton 2006). Unlike traditional PC or console games where one or two players play a game on a personal computer, online games allow many players around the world to play together on a game server via the Internet. With a monthly subscription fee of about $15, players can now play online almost all popular PC titles such as Battlefield, Counter-Strike, World of Warcraft, and Call of Duty. Meanwhile, a new breed of online game titles such as Star Wars Galaxies, EverQuest, and Dark Age of Camelot, known as massively multiplayer online games (MMOGs), are available through the Internet only. MMOGs allow hundreds of thousands of players to simultaneously interact in a virtual game world. Online gaming websites, such as Yahoo! Games, MSN Zone, and Pogo, attract tens of millions of registered players and have 150,000 to 200,000 simultaneous users at any given time (DFC Intelligence 2004). Players' intention to play online games is of considerable interest because creators, sponsors, and operators of online games can benefit greatly from improved understandings of the driving factors behind players' intention. Understanding player intention is also an important first step for industry vendors in their quest to motivate players to visit online game websites more often and to develop customer loyalty. Moreover, other segments of the online entertainment industry, such as IPTV (Internet Protocol Television) and Podcast, may also benefit from improved understandings of player intention in online gaming settings. The purpose of this study is to develop and empirically test a theoretical model of the determinants of intention to play online games. The proposed theoretical model integrates trust and enjoyment into the theory of reasoned action (TRA). TRA suggests that behavioral intention is a function of an individual's attitude toward the behavior and the individual's subjective norms. To adapt TRA to the online gaming context, we extend it with two important constructs: trust and enjoyment. Prior research suggests that trust is the foundation of e-commerce (Fukuyama 1995; Keen 1999; Morgan and Hunt 1994; Williamson 1985), and we argue the same holds for online gaming because, like other e-commerce applications, it involves providing services to consumers via Internet. …

296 citations


Journal ArticleDOI
TL;DR: An innovative procedure is presented that allows the method of moments (MoM) analysis of large and complex antenna and scattering problems at a reduced memory and CPU cost, bounded within the resources provided by a standard (32 bit) personal computer.
Abstract: An innovative procedure is presented that allows the method of moments (MoM) analysis of large and complex antenna and scattering problems at a reduced memory and CPU cost, bounded within the resources provided by a standard (32 bit) personal computer. The method is based on the separation of the overall geometry into smaller portions, called blocks, and on the degrees of freedom of the field. The blocks need not be electrically unconnected. On each block, basis functions are generated with support on the entire block, that are subsequently used as basis functions for the analysis of the complete structure. Only a small number of these functions is required to obtain an accurate solution; therefore, the overall number of unknowns is drastically reduced with consequent impact on storage and solution time. These entire-domain basis functions are called synthetic functions; they are generated from the solution of the electromagnetic problem for the block in isolation, under excitation by suitably defined sources. The synthetic functions are obtained from the responses to all sources via a procedure based on the singular-value decomposition. Because of the strong reduction of the global number of unknowns, one can store the MoM matrix and afford a direct solution. The method is kernel-free, and can be implemented on existing MoM codes.

267 citations


Journal ArticleDOI
TL;DR: It is demonstrated that FR3D finds all occurrences, both local and composite and with nucleotide substitutions, of sarcin/ricin and kink-turn motifs in the 23S and 5S ribosomal RNA 3D structures of the H. marismortui 50S ribOSomal subunit and assigns the lowest discrepancy scores to bona fide examples of these motifs.
Abstract: New methods are described for finding recurrent three-dimensional (3D) motifs in RNA atomic-resolution structures. Recurrent RNA 3D motifs are sets of RNA nucleotides with similar spatial arrangements. They can be local or composite. Local motifs comprise nucleotides that occur in the same hairpin or internal loop. Composite motifs comprise nucleotides belonging to three or more different RNA strand segments or molecules. We use a base-centered approach to construct efficient, yet exhaustive search procedures using geometric, symbolic, or mixed representations of RNA structure that we implement in a suite of MATLAB programs, “Find RNA 3D” (FR3D). The first modules of FR3D preprocess structure files to classify base-pair and -stacking interactions. Each base is represented geometrically by the position of its glycosidic nitrogen in 3D space and by the rotation matrix that describes its orientation with respect to a common frame. Base-pairing and base-stacking interactions are calculated from the base geometries and are represented symbolically according to the Leontis/Westhof basepairing classification, extended to include base-stacking. These data are stored and used to organize motif searches. For geometric searches, the user supplies the 3D structure of a query motif which FR3D uses to find and score geometrically similar candidate motifs, without regard to the sequential position of their nucleotides in the RNA chain or the identity of their bases. To score and rank candidate motifs, FR3D calculates a geometric discrepancy by rigidly rotating candidates to align optimally with the query motif and then comparing the relative orientations of the corresponding bases in the query and candidate motifs. Given the growing size of the RNA structure database, it is impossible to explicitly compute the discrepancy for all conceivable candidate motifs, even for motifs with less than ten nucleotides. The screening algorithm that we describe finds all candidate motifs whose geometric discrepancy with respect to the query motif falls below a user-specified cutoff discrepancy. This technique can be applied to RMSD searches. Candidate motifs identified geometrically may be further screened symbolically to identify those that contain particular basepair types or base-stacking arrangements or that conform to sequence continuity or nucleotide identity constraints. Purely symbolic searches for motifs containing user-defined sequence, continuity and interaction constraints have also been implemented. We demonstrate that FR3D finds all occurrences, both local and composite and with nucleotide substitutions, of sarcin/ricin and kink-turn motifs in the 23S and 5S ribosomal RNA 3D structures of the H. marismortui 50S ribosomal subunit and assigns the lowest discrepancy scores to bona fide examples of these motifs. The search algorithms have been optimized for speed to allow users to search the non-redundant RNA 3D structure database on a personal computer in a matter of minutes.

266 citations


Journal ArticleDOI
TL;DR: If obese individuals were to replace time spent sitting at the computer with walking computer time by 2–3 h/day, and if other components of energy balance were constant, a weight loss of 20–30 kg/year could occur.
Abstract: Objective: For many people, most of the working day is spent sitting in front of a computer screen. Approaches for obesity treatment and prevention are being sought to increase workplace physical activity because low levels of physical activity are associated with obesity. Our hypothesis was that a vertical workstation that allows an obese individual to work while walking would be associated with significant and substantial increases in energy expenditure over seated work. Methods: The vertical workstation is a workstation that allows an office worker to use a standard personal computer while walking on a treadmill at a self-selected velocity. 15 sedentary individuals with obesity (14 women, one man; 43 (7.5) years, 86 (9.6) kg; body mass index 32 (2.6) kg/m 2 ) underwent measurements of energy expenditure at rest, seated working in an office chair, standing and while walking at a self-selected speed using the vertical workstation. Body composition was measured using dual x ray absorptiometry. Results: The mean (SD) energy expenditure while seated at work in an office chair was 72 (10) kcal/h, whereas the energy expenditure while walking and working at a self-selected velocity of 1.1 (0.4) mph was 191 (29) kcal/h. The mean (SD) increase in energy expenditure for walking-and-working over sitting was 119 (25) kcal/h. Conclusions: If sitting computer-time were replaced by walking-and-working, energy expenditure could increase by 100 kcal/h. Thus, if obese individuals were to replace time spent sitting at the computer with walking computer time by 2-3 h/day, and if other components of energy balance were constant, a weight loss of 20-30 kg/year could occur.

235 citations


Patent
02 Apr 2007
TL;DR: In this article, a femtocell can comprise a USB Transceiver Station that is connected to a personal computer through a universal serial bus port, which provides both power and a multi-megabit per second connection between the personal computer and the USB transceiver station.
Abstract: Telephone calls between a mobile station (MS) and the mobile network or PSTN are routed through the Internet via VoIP using a femtocell, as opposed to the traditional macrocellular network. The femtocell can comprise a USB Transceiver Station that is connected to a personal computer through a universal serial bus port, which provides both power and a multi-megabit per second connection between the personal computer and the USB transceiver station. The USB transceiver station can comprise a microcontroller to manage signaling between the RF front end/baseband processor and the personal computer, as well as a precise timing mechanism to assist the synchronization of femtocell timing with the surrounding macrocellular network, if it is present. The USB transceiver station can have a compact form factor that that facilitates a high degree of portability by the subscriber, such as being readily attachable to their keychain.

231 citations


Patent
03 Mar 2007
TL;DR: In this exciting time of increasingly powerful computer tools only few imaginable things are left to be invented as mentioned in this paper, which is the only gap left in computer abilities: which is comprehensive general purpose three-dimensional vision to enable computers to see the world they have changed so much.
Abstract: In this exciting time of increasingly powerful computer tools only few imaginable things are left to be invented. Recently issued PC multimedia operating system Vista supports speech and hand writing recognition, visual and data streaming and networking, as well as traditional computer powers. Present invention is meant to fulfill the only gap left in computer abilities: which is comprehensive general purpose three-dimensional vision to enable computers to see the world they have changed so much. The main feature of this invention is an advanced and powerful image preprocessing method and apparatus supporting thereof.

221 citations


Journal ArticleDOI
TL;DR: This study compared text messages and IMs produced by American college students with respect to transmission length, emoticons and lexical shortenings, and sentential punctuation to investigate the emergence of American texting.
Abstract: While instant messaging (IM) via computers is well entrenched in the United States, text messaging on mobile phones is a more recent technology in America. To investigate the emergence of American texting, this study compared text messages and IMs produced by American college students with respect to transmission length, emoticons and lexical shortenings, and sentential punctuation. We examine our findings in light of other statistical studies of texting and IM, and with respect to personal computer use in the United States that predates text messaging.

220 citations


Patent
15 Jun 2007
TL;DR: In this paper, a method to create new music by listening to a plurality of music, learning from the plurality, and performing concatenative synthesis based on the listening and the learning to create the new music is described.
Abstract: Automated creation of new music by listening is disclosed. A method to create new music may comprise listening to a plurality of music, learning from the plurality of music, and performing concatenative synthesis based on the listening and the learning to create the new music. The method may be performed on a computing device having an audio interface, such as a personal computer.

Posted Content
TL;DR: It is found that diversifying entrants have an initial survival advantage over entrepreneurial startups, but, for later entrants, the reverse is found: startups that enter later in the industry have a survival advantageover the later entering diversification entrants.
Abstract: Studying the US personal computer industry from its inception in 1974 through 1994, we address the following questions. What product technology strategies increase the survival chances of entrants into new, technologically dynamic industries? Does the effectiveness of these strategies differ by pre-entry experience? Does the effectiveness of these strategies differ by when firms enter a new industry? Consistent with the published literature, we find that diversifying entrants have an initial survival advantage over entrepreneurial startups. But, we find the reverse for later entrants: startups that enter later in the industry have a survival advantage over the later entering diversifying entrants. We explain this finding in terms of the firms' product technology strategies (i.e., offering products based on the technology standard and products incorporating the latest technology), pre-entry experience, and entry timing. Our findings highlight that it is crucial to study what firms do after they enter a new industry in order to more completely understand their ultimate performance.

Patent
23 May 2007
TL;DR: In this paper, a powerline communications device is defined as an interface consisting of a power line communications interface and at least one other communications interface configured to communicate over a computing network.
Abstract: A powerline communications device comprises a powerline communications interface and at least one other communications interface configured to communicate over a computing network. The powerline communications interface is further configured to receive electrical power. The computing network may comprise mediums including powerlines, telephone lines, and/or coaxial cables. In some embodiments, the powerline communications interface may communicate with a network apparatus, such as a personal computer, via an Ethernet interface. The powerline interface, the telephone line interface, and/or the coaxial cable interface may all be associated with the same media access control (MAC) address. The powerline communications device may receive a message via a first medium and repeat the message via a second medium based on a quality of service (QoS) metric. In some embodiments, the powerline communications device may communicate using multiple frequency bands.

Journal ArticleDOI
TL;DR: By providing appropriate resources and fostering a supportive environment, leaders could reduce Internet anxiety and thus influence the use of technology in the workplace in ways that benefit organizations.

Journal ArticleDOI
TL;DR: In this paper, the authors studied the U.S. personal computer industry from its inception in 1974 through 1994 and found that diversifying entrants have an initial survival advantage over entrepreneurial startups.
Abstract: Studying the U.S. personal computer industry from its inception in 1974 through 1994, we address the following questions. What product technology strategies increase the survival chances of entrants into new, technologically dynamic industries? Does the effectiveness of these strategies differ by pre-entry experience? Does the effectiveness of these strategies differ by when firms enter a new industry? Consistent with the published literature, we find that diversifying entrants have an initial survival advantage over entrepreneurial startups. But, we find the reverse for later entrants: startups that enter later in the industry have a survival advantage over the later entering diversifying entrants. We explain this finding in terms of the firms' product technology strategies (i.e., offering products based on the technology standard and products incorporating the latest technology), pre-entry experience, and entry timing. Our findings highlight that it is crucial to study what firms do after they enter a new industry to more completely understand their ultimate performance.

Journal ArticleDOI
TL;DR: In this paper, a 3D finite element method (FEM) was used to conduct surface contact stress (SCS) and root bending stress (RBS) calculations of a pair of parallel-shaft spur gears with machining errors (ME), assembly errors (AE) and tooth modifications (TM).

Journal ArticleDOI
TL;DR: It is argued that despite the ‘newness’ of media as they successively arrive in the home, there are considerable consistencies over time in the responses of families, it being the slow-to-change relations between parents and children that shape patterns of domestic regulation and use.

Journal ArticleDOI
TL;DR: The new telemetry transmitter has, thus far, been used for in vivo load measurements in three patients with shoulder endoprostheses, and eight instrumented vertebral body replacements are ready for implantation and an instrumented tibial tray is being submitted to laboratory tests.
Abstract: Knowledge of the loads to which orthopedic implants are subjected is a fundamental prerequisite for their optimal biomechanical design, long-term success, and improved rehabilitation outcomes. In vivo load measurements are more accurate than those obtained using mathematical musculoskeletal models. An inductively powered integrated circuit inside the implant measures six load components as well as the temperature and supplied voltage. This low-power circuit includes a 9-channel multiplexer, a programmable memory, a pulse interval modulator, and a radio-frequency transmitter. Together with a few passive components, the integrated circuit is mounted on a ceramic substrate with thick-film hybrid technology. The sensor signals are multiplexed, modulated, and transmitted to an external device. The microcontroller of the external device regulates the alternating magnetic field produced by a power oscillator and synchronizes the pulse interval modulated data stream. A personal computer displays forces, moments, and temperatures in real time. The new telemetry transmitter has, thus far, been used for in vivo load measurements in three patients with shoulder endoprostheses. Eight instrumented vertebral body replacements are ready for implantation, and an instrumented tibial tray is being submitted to laboratory tests

Patent
22 Jun 2007
TL;DR: In this paper, the authors present methods, systems and graphical user interfaces that facilitate activation of mobile devices, such as communication devices or multi-function devices, via computers and demonstrate how to activate a mobile device with respect to a wireless service provider through use of a computer.
Abstract: Methods, systems and graphical user interfaces that facilitate activation of mobile devices, such as communication devices or multi-function devices, via computers are disclosed. According to one embodiment, activation of a mobile device with respect to a wireless service provider can be performed by users through use of a computer (e.g., personal computer) that communicate with a remotely located activation server. According to another embodiment, graphical user interfaces can be presented to users so as to enable end users to easily activate mobile devices.

Journal ArticleDOI
TL;DR: In this article, the effects of machining errors (ME), assembly errors (AE), and tooth modifications (TM) on loading capacity, load-sharing ratio (LSR), and transmission error (TE) of a pair of spur gears by using special-developed finite element method (FEM) software in a personal computer.

Proceedings ArticleDOI
23 May 2007
TL;DR: The preliminary results indicate that it is possible to recognize users based on their gait acceleration, and 1-nearest neighbor is used for individual identification.
Abstract: This paper addresses the problem of human recognition based on their gait acceleration signal characteristics produced by walking. A portable microprocessor-based data collection device was designed to measure the three-dimensional gait acceleration signals during human walking. The system consists of a tri-axial accelerometer, a MCU, 32 M bytes of RAM, and a data transfer module for data transfer. The device was fixed to the user's waist and three-dimensional acceleration signals were recorded at a sampling rate of 250 Hz. After completing the recording, data stored in the RAM were transferred to a personal computer for wavelet denoising, gait cycles dividing, and gait pattern extracting. Through the analysis in time domain and frequency domain, and using dynamic time warping to deal with the problems result from naturally occurring changes in walking speed, 1-nearest neighbor is used for individual identification. Experiments were performed on 21 subjects walking on their normal speed. The methods of gait analysis in time domain and frequency domain are applying, the equal error rate of 5.6% and 21.1% are achieved respectively. Our preliminary results indicate that it is possible to recognize users based on their gait acceleration.

Journal ArticleDOI
TL;DR: This work presents a new method based on the modified Radon transform that identifies the axis of instrument shafts as bright patterns in planar projections that is sufficient for real-time tracking at the 26 volumes per second rate of the ultrasound machine.

Posted Content
TL;DR: In this paper, the authors provide an analysis of the problems of constructing quality-adjusted price indexes within the framework of the theory of product differentiation and apply it to the study of personal computer prices in Italy during the 1995-2000 period.
Abstract: The paper provides an analysis of the problems of construction of quality-adjusted price indexes within the framework of the theory of product differentiation. In the general case of price-making behaviour on the part of firms, hedonic regressions are defined on the basis of reduced forms of the equation relating equilibrium prices to product characteristics. The paper considers the reduced form given by the marginal cost function and shows that the Laspeyres hedonic price index provides a lower bound to the quality-adjusted rate of price change while the Paasche hedonic price index provides an upper bound to the quality-adjusted rate of price change. The properties of hedonic price indexes are compared with those of matched model indexes. The theory is applied to the study of personal computer prices in Italy during the 1995-2000 period.

Patent
06 Jul 2007
TL;DR: In this article, a system and a method for managing network activation with a carrier and registration with a service provider is provided for managing the network activation and registration process, where the registration file is executed on the personal computer.
Abstract: A system and a method are provided for managing network activation with a carrier and registration with a service provider. In one example, the method determines a network activation status. If the network is not activated, a utility is used to perform the activation. Further, the status of registration with a provider is determined. If not registered, a request is sent to a server of the service provider for a registration file configured to gather user registration information. The registration file is then received from the server. The registration file is executed on the personal computer. Data gathered by the registration file is then returned to the service provider's server to complete the registration procedures.

Journal ArticleDOI
TL;DR: An experimental computer program for virtual operation of fractured pelvis and acetabulum based on real data of the fracture is presented and is an easily usable application which brings significant value and new opportunities in clinical practice (preoperative planning), teaching and research.
Abstract: An experimental computer program for virtual operation of fractured pelvis and acetabulum based on real data of the fracture is presented. The program consists of two closely integrated tools, the 3D viewing tools and the surgeon simulation tools. Using 3D viewing tools the virtual model of a fractured pelvis is built. This procedure is performed by computer engineers. Data from CT of a real injury in DICOM format are used. With segmentation process each fracture segment becomes a separate object and is assigned a different colour. The virtual object is then transferred to the personal computer of the surgeon. Bone fragments can be moved and rotated in all three planes and reduction is performed. After reduction, fixation can be undertaken. The appropriate ostheosynthetic material can be chosen. Contouring of the plate is performed automatically to the reduced pelvis. The screws can be inserted into the plate or across the fracture. The direction and length of the screws is controlled by turning the pelvis or by making bones more transparent. The modeling of the plate in all three axes can be recorded as the exact length of the screws. There is also a simulation tool for intraoperative C-arm imaging in all directions. All the steps of the procedure are recorded and printed out. Postoperative matching of real operation and virtual procedure is also possible. We operated on 10 cases using virtual preoperative planning and found it very useful. The international study is still in progress. One case is presented demonstrating all the possibilities of the virtual planning and surgery. The presented computer program is an easily usable application which brings significant value and new opportunities in clinical practice (preoperative planning), teaching and research.

Journal ArticleDOI
TL;DR: In this paper, an electrolyte jet machining system which can be used to process the complicated three-dimensional surface was constructed, which is composed of an XY stage, a rotating axis and a high-speed bipolar power supply, all of which are cooperatively controlled by a personal computer.
Abstract: In the electrolyte jet machining (EJM), the electrolytic current is supplied between the anodic workpiece and the cathodic nozzle via the electrolyte which is ejected from the minute nozzle. Only the workpiece material exposed to the jet is removed due to the anodic dissolution, because the electrolytic current is restricted to the limited area by the jet. In this study, an electrolyte jet machining system which can be used to process the complicated three-dimensional surface was constructed. This system is composed of an XY stage, a rotating axis and a high-speed bipolar power supply, all of which are cooperatively controlled by a personal computer. An algorithm was developed to obtain the scanning path and speed of the nozzle to process complicated shape by superimposing simple patterns. The optimized path and speed were thus obtained so that the summation of the squared difference between the superimposed and the required patterns at every checking point becomes minimal. In order to verify the effectiveness of the developed algorithm, simulation and experiment were carried out and the machining accuracy was analyzed. The good agreement between the simulated and produced shapes with the required one proves that the algorithm meets the purpose properly. Besides, the effect of machining conditions, especially the current density on surface roughness of produced patterns was examined. It was clarified that a high current density is not only necessary to reduce machining time but also to improve the surface roughness.

Book
31 Dec 2007
TL;DR: This groundbreaking resource systemically covers such salient topics as network and application scalability, wireless network connectivity, adaptability and "context-aware" computing, information technology security and liability, and human-computer interaction.
Abstract: After the mainframe and personal computer eras, the third major era in computer science, ubiquitous computing, describes the state of technology in which networked computers would surround every user. Ubiquitous Computing Technology for Real Time Enterprises combines the fundamental methods, algorithms, and concepts of pervasive computing with current innovations and solutions to emerging challenges. This groundbreaking resource systemically covers such salient topics as network and application scalability, wireless network connectivity, adaptability and "context-aware" computing, information technology security and liability, and human-computer interaction.

Proceedings ArticleDOI
02 May 2007
TL;DR: The Army Research Laboratory (ARL) has designed and fabricated a forward-looking, impulse-based, ultra-wideband (UWB) imaging radar for detection of concealed targets.
Abstract: The Army Research Laboratory (ARL) has designed and fabricated a forward-looking, impulse-based, ultra-wideband (UWB) imaging radar for detection of concealed targets. This system employs a physical array of 16 receive antennas to provide the necessary aperture for sufficient cross-range resolution in the forward-looking geometry. Each antenna feeds a base-band receiver/digitizer that integrates the data from a number of radar pulses before passing it on to the personal computer (PC) based operator's console and display. The innovative ARL receiver design uses commercially available integrated circuits to provide a low-cost, lightweight digitizing scheme with an effective sampling rate of approximately 8 GHz. The design is extensible to allow for growth in the number of channels used and improvements in integrated circuit performance to eventually meet the expected unmanned ground vehicle combat pace. Down-range resolution is provided by the bandwidth of the transmitted pulse which occupies 300-3000 MHz. Range coverage is designed to be 25 meters with an adjustable start point forward of the vehicle. Modeling studies have shown that a pair of transmitters situated at the two ends of the receive array provides best performance in cross-range resolution. Radar data is continuously collected so that a horizontal two-dimensional synthetic aperture is formed for 3-D image formation. This allows focusing of the data to yield estimates of target height as well as position to tag potential obstacles as being negative (e.g. holes, ditches) or positive (e.g. tree stumps). The forward motion also improves the cross range resolution to targets as their aspect changes.

Patent
03 Jul 2007
TL;DR: In this article, a method and apparatus for the virtualization of appliances provides an embedded operating system (OS) which is included in the system boot ROM of a personal computer, where the user selects an appliance to use from the OS, whereupon the appliance is loaded and launched.
Abstract: A method and apparatus for the virtualization of appliances provides an embedded operating system (OS) which is included in the system boot ROM of a personal computer. When the system boots, the OS is launched and looks for all available virtual appliances from, for example, the following places: local USB, flash card, e.g. SD, xD, CF, CDROM/DVD, or other storage media; local hard disk storage; and the Internet, e.g. an appliance server. The user selects an appliance to use from the OS, whereupon the appliance is loaded and launched. If the selected appliance is not on a local storage, then it is downloaded, e.g. over the Internet from an appliance server. The downloaded appliance can be cached in local storage media such that, the next time it is needed, it need not be downloaded from the appliance server. The user can also elect to boot an operating system from the hard disk, if an operating system and hard disk are installed, or to power-off the system.

Patent
22 Jun 2007
TL;DR: In this paper, the authors present methods, systems and graphical user interfaces that facilitate activation of mobile devices, such as communication devices or multi-function devices, via computers and demonstrate how to activate a mobile device with respect to a wireless service provider through use of a computer.
Abstract: Methods, systems and graphical user interfaces that facilitate activation of mobile devices, such as communication devices or multi-function devices, via computers are disclosed. According to one embodiment, activation of a mobile device with respect to a wireless service provider can be performed by users through use of a computer (e.g., personal computer) that communicate with a remotely located activation server. According to another embodiment, graphical user interfaces can be presented to users so as to enable end users to easily activate mobile devices.