Página 1 dos resultados de 4 itens digitais encontrados em 0.012 segundos

Common object request broker architecture (CORBA)-based security services for the Virtual Radiology Environment

Martinez, Ralph; Cole, Colin; Rozenblit, Jerzy; Cook, Jay F.; Chacko, Anna K.
Fonte: Springer-Verlag Publicador: Springer-Verlag
Tipo: Artigo de Revista Científica
Publicado em /05/2000 Português
Relevância na Pesquisa
38.271252%
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, “Trusted Network Interpretation.” These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VREProject. The goal of the security policy is to provide, for a C2-level of information protection while also satisfying the functional needs of the GPRMC’s user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE...

Automated detection of hematological abnormalities through classification of flow cytometric data patterns

Rossman, Mark Alexander
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
17.573413%
Flow Cytometry analyzers have become trusted companions due to their ability to perform fast and accurate analyses of human blood. The aim of these analyses is to determine the possible existence of abnormalities in the blood that have been correlated with serious disease states, such as infectious mononucleosis, leukemia, and various cancers. Though these analyzers provide important feedback, it is always desired to improve the accuracy of the results. This is evidenced by the occurrences of misclassifications reported by some users of these devices. It is advantageous to provide a pattern interpretation framework that is able to provide better classification ability than is currently available. Toward this end, the purpose of this dissertation was to establish a feature extraction and pattern classification framework capable of providing improved accuracy for detecting specific hematological abnormalities in flow cytometric blood data. ^ This involved extracting a unique and powerful set of shift-invariant statistical features from the multi-dimensional flow cytometry data and then using these features as inputs to a pattern classification engine composed of an artificial neural network (ANN). The contribution of this method consisted of developing a descriptor matrix that can be used to reliably assess if a donor’s blood pattern exhibits a clinically abnormal level of variant lymphocytes...

Automated Detection of Hematological Abnormalities through Classification of Flow Cytometric Data Patterns

Rossman, Mark A
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica Formato: application/pdf
Português
Relevância na Pesquisa
17.573413%
Flow Cytometry analyzers have become trusted companions due to their ability to perform fast and accurate analyses of human blood. The aim of these analyses is to determine the possible existence of abnormalities in the blood that have been correlated with serious disease states, such as infectious mononucleosis, leukemia, and various cancers. Though these analyzers provide important feedback, it is always desired to improve the accuracy of the results. This is evidenced by the occurrences of misclassifications reported by some users of these devices. It is advantageous to provide a pattern interpretation framework that is able to provide better classification ability than is currently available. Toward this end, the purpose of this dissertation was to establish a feature extraction and pattern classification framework capable of providing improved accuracy for detecting specific hematological abnormalities in flow cytometric blood data. This involved extracting a unique and powerful set of shift-invariant statistical features from the multi-dimensional flow cytometry data and then using these features as inputs to a pattern classification engine composed of an artificial neural network (ANN). The contribution of this method consisted of developing a descriptor matrix that can be used to reliably assess if a donor’s blood pattern exhibits a clinically abnormal level of variant lymphocytes...

Ensuring a C2 level of trust and interoperability in a networked Windows NT environment

Lucas, Julie A.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: viii, 143 p.
Português
Relevância na Pesquisa
48.89305%
Approved for public release; distribution is unlimited.; With the progression of computer systems to local and wide area networks, the scope of computer security has increased dramatically over the past two decades. Now, more than ever, the use of trusted systems is needed to ensure the secrecy, integrity, and availability of computer resources. However, attaining the levels of trust required has been difficult for a variety of reasons. This paper provides an in-depth look at the government's Trusted Computer System Evaluation Criteria (TCSEC) and its current applicability. An analysis of a military network running Windows NT version 3.51 as the network operating system is provided as a case study. The paper concludes with a discussion of the advantages and disadvantages of the TCSEC criterion. Although products have been certified as meeting the various class requirements, existing problems are preventing the attainment of trusted system from becoming a reality for many government organizations; http://archive.org/details/ensuringc2levelo00luca; Lieutenant, United States Navy