Learn More
It is possible to improve neuronavigation during image-guided surgery by warping the high-quality preoperative brain images so that they correspond with the current intraoperative configuration of the brain. In this paper, the accuracy of registration results obtained using comprehensive biomechanical models is compared with the accuracy of rigid(More)
In this paper, we propose a hierarchical state-based model for representing an echocardiogram video. It captures the semantics of video segments from dynamic characteristics of objects present in each segment. Our objective is to provide an effective method for segmenting an echo video into view, state, and substate levels. This is motivated by the need for(More)
In this paper we evaluate the accuracy of warping of neuro-images using brain deformation predicted by means of a patient-specific biomechanical model against registration using a BSpline-based free form deformation algorithm. Unlike the BSpline algorithm, biomechanics-based registration does not require an intra-operative MR image which is very expensive(More)
This paper studies continuous authentication for touch interface based mobile devices. A Hidden Markov Model (HMM) based behavioral template training approach is presented, which does not require training data from other subjects other than the owner of the mobile. The stroke patterns of a user are modeled using a continuous left-right HMM. The approach(More)
Monitoring neonatal EEG signal is useful in identifying neonatal convulsions or seizures. For neonates, seizures can be electrographic, electro clinical, or both simultaneously. Electrographic seizure is identified via recorded EEG signal, while electro clinical seizures exhibit clinical manifestations. Sometimes neonates can exhibit silent seizures which(More)
This paper explores options to the built-in authentication mechanism of the Google Glass which is vulnerable to shoulder surfing attacks. Two simple PIN-based authentication techniques are presented, both of which provide protection against shoulder surfing. The techniques employ two interfaces for entering the PIN, namely, voice (Voice-based PIN) and(More)