SlideShare a Scribd company logo
1 of 26
Download to read offline
A Computer Vision Application for In Vitro Diagnostics Devices 
Andrea Carignano, Giacomo Donzelli
SAFETY IN IVD DEVICES
“The concept of Safety considers the notion of Basic Safety as the freedom from unacceptable risk directly caused by physical hazards when the equipment is used under normal and single fault conditions as well as the notion of Essential Performances” 
(IEC 60513:1994—Fundamental aspects of safety standards for medical electrical equipment). 
“Essential Performances” are “…..accuracy, precision and stability for their intended use, based on appropriate scientific and technical methods. In particular……… sensitivity, specificity, trueness, repeatability, reproducibility…” 
(GHTF/SG1/N41R9:2005-Essential Principles of Safety and Performance of Medical Devices) 
“Medical devices should be designed and manufactured in such a way that……they will not compromise the clinical condition or the safety of Patients, or the safety and health of Users or, where applicable, other persons (i.e. Environment)” 
(GHTF/SG1/N41R9:2005- Essential Principles of Safety and Performance of Medical Devices) 
Safety Principles in Medical Devices
Safety in Medical Devices is : 
Basic Safety for Users and Environment and Essential Performances provided to Patients over time 
Safety in Medical Devices, General Definition 
Essential Performances 
Basic Safety
Based upon Risk Management (ISO 14971) Safety in IVD is : 
Basic Safety and Analytical Results (i.e. Essential Performances) provided within the required time (urgencies, turnaround time /drugs treatment, etc.) 
Safety in In Vitro Diagnostics (IVD) Devices 
Essential Performances (i.e. Results in time) 
Basic Safety for Users and Patients’ Samples (i.e. Serum, Whole Blood, Paediatric Specimens, etc.)
ADDRESSING SAFETY IN DESIGN
Make or Buy vs. Architectural Options 
Integrated Distributed 
Buy 
Ownership of design usually facilitates Product certification 
Product Certification may become a challenge when Safety is addressed by integrated design and without disclosure for uncertified OTS components 
Make 
Additionally, distributed architectures usually ease the certification roadmap and allow for reuse, design margins and flexibility
Dedicated Plastic disposables are detected and recognized on board the instrument to prevent reagents from mismatching (false results) and to assure system productivity (before the required time to result expires) 
Safety Through Computer Vision, an Integrated Solution 
Integrated device embedding safety critical functions and including: 
›Camera board 
»CMOS camera 
»Lighting system 
›Interface Board hosting drivers, embedded OS, firmware and algorithms 
»Micro Controller (Freescale MCIMX27VOP4) 
»Memory Asset (Flash, Ram, E2Rom) 
»Non-standard interface with the Master board (custom protocol)
Safety Through Computer Vision, a Distributed Design Option 
Master Board (TI DM3730) 
A commercial OTS USB camera used only for basic functionalities (capturing images) and 
a master board embedding every safety critical function, and based upon a certified 
RTOS and firmware 
›Portability, Expandability, Scalability are additional and positive side effects 
USB
HW/FW 
ARCHITECTURE
Encapsulating Safety Critical Functionalities 
›Once a use case is activated, the ARM main routine (VAS) calls the computer vision library (image processing/algorithms) on the DSP Main Routine 
›Well Defined Boundaries/Interfaces (BSP/DSP Link) , “Split & Conquer” approach 
›Encapsulating safety critical routines (computation engine) 
Ethernet 
CAN 
USB BSP 
DSP Link 
ARM/RT 
Green Hills INTEGRITY RTOS 
DSP/SYSBIOS 
ARM 
Main Routine (VAS) 
DSP Main Routine 
Image Processing Libraries 
Use Cases Algorithm 
Certified 
RTOS 
Multithread 
Services 
OS Single Thread Services 
Safety Critical Routines 
TI DM3730 DUAL CORE 
HW/camera
Verification Strategy, from Imaging to Use Cases algorithms 
Reuse/ 
Effort 
For Verification &Validation 
(ISO 13485) 
HW camera ARM/Certified OS DSP Link DSP/OS UC Algorithms 
DSP Link 
Products with Basic Use 
Certified Products (procured) 
Certified Products (reused) 
Products to Certify
AN IVD CASE STUDY (MOLECULAR BIOLOGY)
An IVD distributed Computer Vision System able to…. 
“To Count the amount 
of plastic tips in the 
box and assure system 
productivity ” 
“To Detect the presence/absence of 
liquid in the wells and prevent from 
sample pollution, splashing, overflow 
and sample wasting” 
Use Case 1 Use Case 2
PROJECT’S CONSTRAINTS
Design and Tools Chain 
›The computer vision algorithms are: 
»Developed as Matlab source code 
»Converted from floating point to fixed point (Matlab Fixed Point Designer) 
»Translated into C language (Matlab Coder) 
»Compiled 
»Loaded onto the TI DSP 
»Tested on board a fixture emulating the real application
Project’s Tasks 
Localize the available tips 
Measure liquid volume 
Use computer vision algorithms that process images acquired by a low cost 2D camera and bar code reader 
Use Case 2 
Use Case 1
ALGORITHMS ADDRESSING USE CASES
General Workflow 
›Calibration (reference image) 
»The region of interest is 
localized using image edges 
»Knowledge of 3D models allows 
for perspective correction 
»Equalization, Morphological 
operations and contrast 
enhancement are applied to 
rectify images 
Edge detection for skew angle estimation 
Cover holes localization for skew angle estimation 
Region of interest 
Interpolation points to rectify image regions inside the slots 
Features arrays (small square images) 
4229 
2697 
1197 
276 
76 
0 
4229 
2697 
1197 
276 
76 
0 
Use Case 1 Use Case 2 
»Operation (generic image) 
»Same processing as calibration image 
»The rectified operative image is compared to reference and a 
correlation analysis is carried out 
»Use case-specific criteria are applied
Use Case 1 
Perspective undistorsion 
Illumination correction 
Features arrays (small square images) 
Operation image 
Features arrays (small square images) 
Rectified 
Generic 
features for 
either tips 
or holes 
Same processing 
Rectified 
Reference 
features for 
tips 
Tips present
Use Case 1 
Perspective undistorsion 
Illumination correction 
Features arrays (small square images) 
Operation image 
Features arrays (Correlation coefficients small square images) 
0 
0.1 
0.2 
0.3 
0.4 
0.5 
0.6 
0.7 
0.8 
0.9 
1 
Correlation coefficients 
between features (all tips 
vs. either tips or holes) 
Tips present 
Tips 
identified
Use Case 2 
Average calibration image 
Cover holes localization for skew angle estimation 
Interpolation points to rectify image regions inside the slots 
4229 
2697 
1197 
276 
76 
0 
Operation image 
Same processing 
Rectified 
operative 
image 
Rectified 
reference 
image
Use Case 2 
Average calibration image 
Cover holes localization for skew angle estimation 
Interpolation points to rectify image regions inside the slots 
Operation image 
4229 
276 
76 
0 
Reference 
(empty) 
Operative 
(filled) 
Volume (ul) 
4229 
2697 
1197 
276 
76 
0 Estimated volume 
Visual Artifacts between operative and reference 
images can stem from both liquid and glares
Results 
Test on 41 images 
›82 total wells 
›11 different volumes 
Use Case 2 
Use Case 1 
Real volume (μl) 
0 
100 
200 
300 
400 
500 
600 
700 
0 
50 
100 
150 
200 
250 
400 
500 
1400 
1600 
1800 
2000 
2200 
2400 
2600 
2800 
3000 
3200 
3400 
1500 
2000 
3000 
Measured volume (μl) 
672 
Holes 
Tips 
Actual 
Holes 
Tips 
Prediction 
624 
0 
0 
Test on 37 images 
›672 Holes 
›624 Tips
CONCLUSIONS
Computer Vision and IVD Critical Safety Systems 
›We addressed safety in IVD system by using Computer Vision technologies and meeting safety requirements 
›A distributed architectural option allowed for product certification, leveraged reuse and optimized verification effort. 
›A “Split and Conquer” approach will ease product evolution, upgrades and roadmap for further certifications and ISO13485 compliance 
›Computer vision algorithms , in the presented application, offered also some key technical and business benefits: 
»Automatic control over the final device giving correct operations 
»A single control system and configuration for different tasks 
»Use of commercial low cost camera and illumination system 
»Robust solution in presence of uneven illumination and glares

More Related Content

What's hot

An Alternative Approach to DO-178B
An Alternative Approach to DO-178BAn Alternative Approach to DO-178B
An Alternative Approach to DO-178BAdaCore
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
 
Stinson post si and verification
Stinson post si and verificationStinson post si and verification
Stinson post si and verificationObsidian Software
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Luis Atencio
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
 
The Cortex-A15 Verification Story
The Cortex-A15 Verification StoryThe Cortex-A15 Verification Story
The Cortex-A15 Verification StoryDVClub
 
Challenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor SystemsChallenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor SystemsWojciech Koszek
 
Demystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels CampDemystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels CampAndré Baptista
 
Soft Error Study of ARM SoC at 28 Nanometers
Soft Error Study of ARM SoC at 28 NanometersSoft Error Study of ARM SoC at 28 Nanometers
Soft Error Study of ARM SoC at 28 NanometersWojciech Koszek
 
How to create SystemVerilog verification environment?
How to create SystemVerilog verification environment?How to create SystemVerilog verification environment?
How to create SystemVerilog verification environment?Sameh El-Ashry
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Jaap van Ekris
 
Safety Verification and Software aspects of Automotive SoC
Safety Verification and Software aspects of Automotive SoCSafety Verification and Software aspects of Automotive SoC
Safety Verification and Software aspects of Automotive SoCPankaj Singh
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)Digital Bond
 
verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020Sameh El-Ashry
 
2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systemsJaap van Ekris
 
Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...
Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...
Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...Sameh El-Ashry
 

What's hot (20)

An Alternative Approach to DO-178B
An Alternative Approach to DO-178BAn Alternative Approach to DO-178B
An Alternative Approach to DO-178B
 
2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems2017 03-10 - vu amsterdam - testing safety critical systems
2017 03-10 - vu amsterdam - testing safety critical systems
 
Stinson post si and verification
Stinson post si and verificationStinson post si and verification
Stinson post si and verification
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
 
The Cortex-A15 Verification Story
The Cortex-A15 Verification StoryThe Cortex-A15 Verification Story
The Cortex-A15 Verification Story
 
Challenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor SystemsChallenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor Systems
 
Demystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels CampDemystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels Camp
 
Sharam salamian
Sharam salamianSharam salamian
Sharam salamian
 
Soft Error Study of ARM SoC at 28 Nanometers
Soft Error Study of ARM SoC at 28 NanometersSoft Error Study of ARM SoC at 28 Nanometers
Soft Error Study of ARM SoC at 28 Nanometers
 
How to create SystemVerilog verification environment?
How to create SystemVerilog verification environment?How to create SystemVerilog verification environment?
How to create SystemVerilog verification environment?
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
 
Safety Verification and Software aspects of Automotive SoC
Safety Verification and Software aspects of Automotive SoCSafety Verification and Software aspects of Automotive SoC
Safety Verification and Software aspects of Automotive SoC
 
6 MONTH INTERNSHIP AT
6 MONTH INTERNSHIP AT6 MONTH INTERNSHIP AT
6 MONTH INTERNSHIP AT
 
Sw testing
Sw testingSw testing
Sw testing
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
 
verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020verification_planning_systemverilog_uvm_2020
verification_planning_systemverilog_uvm_2020
 
2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems2015 05-07 - vu amsterdam - testing safety critical systems
2015 05-07 - vu amsterdam - testing safety critical systems
 
Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...
Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...
Efficient Methodology of Sampling UVM RAL During Simulation for SoC Functiona...
 

Viewers also liked

How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...AdaCore
 
HIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-CHIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-CAdaCore
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureAdaCore
 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityAdaCore
 
Mixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsMixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsAdaCore
 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseAdaCore
 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...AdaCore
 
The Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareThe Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareAdaCore
 
Ada 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAda 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAdaCore
 
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...AdaCore
 
MISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the futureMISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the futureAdaCore
 
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...AdaCore
 
Bounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentBounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentAdaCore
 
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkHIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkAdaCore
 
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...AdaCore
 
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...AdaCore
 
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsMulti-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsAdaCore
 

Viewers also liked (17)

How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...
 
HIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-CHIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-C
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
 
Mixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsMixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core Platforms
 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
 
The Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareThe Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling Software
 
Ada 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAda 202x A broad overview of relevant news
Ada 202x A broad overview of relevant news
 
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
 
MISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the futureMISRA C – Recent developments and a road map to the future
MISRA C – Recent developments and a road map to the future
 
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
 
Bounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentBounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise Environment
 
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkHIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
 
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
 
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
HIS 2015: Alastair F. Donaldson - Fighting for Software Correctness in a Mass...
 
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsMulti-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical Systems
 

Similar to A Computer Vision Application for In Vitro Diagnostics Devices

Contech analyser for_robust_design_v1.6_en
Contech analyser for_robust_design_v1.6_enContech analyser for_robust_design_v1.6_en
Contech analyser for_robust_design_v1.6_enClaudia Herrmann
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONanil badiger
 
Face detection on_embedded_systems
Face detection on_embedded_systemsFace detection on_embedded_systems
Face detection on_embedded_systemsr_sadoun
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 
Leveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge DevicesLeveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge DevicesICS
 
[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...
[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...
[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...DataScienceConferenc1
 
blue eye technology
blue eye technologyblue eye technology
blue eye technologyRaga Deepthi
 
Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...
Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...
Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...Giplink Digital
 
Machine Vision: The Key Considerations for Successful Visual Inspection
Machine Vision: The Key Considerations for Successful Visual InspectionMachine Vision: The Key Considerations for Successful Visual Inspection
Machine Vision: The Key Considerations for Successful Visual InspectionOptima Control Solutions
 
Applitools - Cross Browser
Applitools - Cross BrowserApplitools - Cross Browser
Applitools - Cross BrowserApplitools
 
Catalogo general general electric geit 10012 en-rev6_final
Catalogo general general electric geit 10012 en-rev6_finalCatalogo general general electric geit 10012 en-rev6_final
Catalogo general general electric geit 10012 en-rev6_finalPablo Bavarisco
 
Production Machining Article January 2009
Production Machining Article January 2009Production Machining Article January 2009
Production Machining Article January 2009Javier O. Vera
 
Barco medical display systems
Barco medical display systems   Barco medical display systems
Barco medical display systems Santiago Scarsi
 
Digital Detectors for Industrial Applications-Nityanand Gopalika
Digital Detectors for Industrial Applications-Nityanand GopalikaDigital Detectors for Industrial Applications-Nityanand Gopalika
Digital Detectors for Industrial Applications-Nityanand GopalikaNityanand Gopalika
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfICS
 

Similar to A Computer Vision Application for In Vitro Diagnostics Devices (20)

Dualis Contour Brochure
Dualis Contour BrochureDualis Contour Brochure
Dualis Contour Brochure
 
Contech analyser for_robust_design_v1.6_en
Contech analyser for_robust_design_v1.6_enContech analyser for_robust_design_v1.6_en
Contech analyser for_robust_design_v1.6_en
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISION
 
Face detection on_embedded_systems
Face detection on_embedded_systemsFace detection on_embedded_systems
Face detection on_embedded_systems
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
Leveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge DevicesLeveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge Devices
 
[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...
[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...
[DSC Croatia 22] Towards Classification Trustworthiness in Safety-Critical Au...
 
blue eye technology
blue eye technologyblue eye technology
blue eye technology
 
Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...
Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...
Outsourcing the Design & Manufacturing of Projection Engines for 3D Metrology...
 
Machine Vision: The Key Considerations for Successful Visual Inspection
Machine Vision: The Key Considerations for Successful Visual InspectionMachine Vision: The Key Considerations for Successful Visual Inspection
Machine Vision: The Key Considerations for Successful Visual Inspection
 
Applitools - Cross Browser
Applitools - Cross BrowserApplitools - Cross Browser
Applitools - Cross Browser
 
Catalogo general general electric geit 10012 en-rev6_final
Catalogo general general electric geit 10012 en-rev6_finalCatalogo general general electric geit 10012 en-rev6_final
Catalogo general general electric geit 10012 en-rev6_final
 
imagefiltervhdl.pptx
imagefiltervhdl.pptximagefiltervhdl.pptx
imagefiltervhdl.pptx
 
Work Portfolio
Work PortfolioWork Portfolio
Work Portfolio
 
Production Machining Article January 2009
Production Machining Article January 2009Production Machining Article January 2009
Production Machining Article January 2009
 
CS8100SC 3D
CS8100SC 3DCS8100SC 3D
CS8100SC 3D
 
Deep learning in manufacturing predicting and preventing manufacturing defect...
Deep learning in manufacturing predicting and preventing manufacturing defect...Deep learning in manufacturing predicting and preventing manufacturing defect...
Deep learning in manufacturing predicting and preventing manufacturing defect...
 
Barco medical display systems
Barco medical display systems   Barco medical display systems
Barco medical display systems
 
Digital Detectors for Industrial Applications-Nityanand Gopalika
Digital Detectors for Industrial Applications-Nityanand GopalikaDigital Detectors for Industrial Applications-Nityanand Gopalika
Digital Detectors for Industrial Applications-Nityanand Gopalika
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdf
 

More from AdaCore

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsAdaCore
 
Have we a Human Ecosystem?
Have we a Human Ecosystem?Have we a Human Ecosystem?
Have we a Human Ecosystem?AdaCore
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesAdaCore
 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic libraryAdaCore
 
Developing Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsDeveloping Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsAdaCore
 
Taming event-driven software via formal verification
Taming event-driven software via formal verificationTaming event-driven software via formal verification
Taming event-driven software via formal verificationAdaCore
 
Pushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofPushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofAdaCore
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsAdaCore
 
Product Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationProduct Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationAdaCore
 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareAdaCore
 
Spark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentSpark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentAdaCore
 
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...AdaCore
 
The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!AdaCore
 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaCore
 
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...AdaCore
 
Software Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologySoftware Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologyAdaCore
 
MISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextMISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextAdaCore
 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareAdaCore
 

More from AdaCore (18)

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
 
Have we a Human Ecosystem?
Have we a Human Ecosystem?Have we a Human Ecosystem?
Have we a Human Ecosystem?
 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic library
 
Developing Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsDeveloping Future High Integrity Processing Solutions
Developing Future High Integrity Processing Solutions
 
Taming event-driven software via formal verification
Taming event-driven software via formal verificationTaming event-driven software via formal verification
Taming event-driven software via formal verification
 
Pushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofPushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program Proof
 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
 
Product Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationProduct Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configuration
 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded Software
 
Spark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentSpark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware Development
 
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
 
The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!The Future of Aerospace – More Software Please!
The Future of Aerospace – More Software Please!
 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR Architecture
 
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the “Wheel of...
 
Software Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologySoftware Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar Technology
 
MISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextMISRA C in an ISO 26262 context
MISRA C in an ISO 26262 context
 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle software
 

Recently uploaded

Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 

A Computer Vision Application for In Vitro Diagnostics Devices

  • 1. A Computer Vision Application for In Vitro Diagnostics Devices Andrea Carignano, Giacomo Donzelli
  • 2. SAFETY IN IVD DEVICES
  • 3. “The concept of Safety considers the notion of Basic Safety as the freedom from unacceptable risk directly caused by physical hazards when the equipment is used under normal and single fault conditions as well as the notion of Essential Performances” (IEC 60513:1994—Fundamental aspects of safety standards for medical electrical equipment). “Essential Performances” are “…..accuracy, precision and stability for their intended use, based on appropriate scientific and technical methods. In particular……… sensitivity, specificity, trueness, repeatability, reproducibility…” (GHTF/SG1/N41R9:2005-Essential Principles of Safety and Performance of Medical Devices) “Medical devices should be designed and manufactured in such a way that……they will not compromise the clinical condition or the safety of Patients, or the safety and health of Users or, where applicable, other persons (i.e. Environment)” (GHTF/SG1/N41R9:2005- Essential Principles of Safety and Performance of Medical Devices) Safety Principles in Medical Devices
  • 4. Safety in Medical Devices is : Basic Safety for Users and Environment and Essential Performances provided to Patients over time Safety in Medical Devices, General Definition Essential Performances Basic Safety
  • 5. Based upon Risk Management (ISO 14971) Safety in IVD is : Basic Safety and Analytical Results (i.e. Essential Performances) provided within the required time (urgencies, turnaround time /drugs treatment, etc.) Safety in In Vitro Diagnostics (IVD) Devices Essential Performances (i.e. Results in time) Basic Safety for Users and Patients’ Samples (i.e. Serum, Whole Blood, Paediatric Specimens, etc.)
  • 7. Make or Buy vs. Architectural Options Integrated Distributed Buy Ownership of design usually facilitates Product certification Product Certification may become a challenge when Safety is addressed by integrated design and without disclosure for uncertified OTS components Make Additionally, distributed architectures usually ease the certification roadmap and allow for reuse, design margins and flexibility
  • 8. Dedicated Plastic disposables are detected and recognized on board the instrument to prevent reagents from mismatching (false results) and to assure system productivity (before the required time to result expires) Safety Through Computer Vision, an Integrated Solution Integrated device embedding safety critical functions and including: ›Camera board »CMOS camera »Lighting system ›Interface Board hosting drivers, embedded OS, firmware and algorithms »Micro Controller (Freescale MCIMX27VOP4) »Memory Asset (Flash, Ram, E2Rom) »Non-standard interface with the Master board (custom protocol)
  • 9. Safety Through Computer Vision, a Distributed Design Option Master Board (TI DM3730) A commercial OTS USB camera used only for basic functionalities (capturing images) and a master board embedding every safety critical function, and based upon a certified RTOS and firmware ›Portability, Expandability, Scalability are additional and positive side effects USB
  • 11. Encapsulating Safety Critical Functionalities ›Once a use case is activated, the ARM main routine (VAS) calls the computer vision library (image processing/algorithms) on the DSP Main Routine ›Well Defined Boundaries/Interfaces (BSP/DSP Link) , “Split & Conquer” approach ›Encapsulating safety critical routines (computation engine) Ethernet CAN USB BSP DSP Link ARM/RT Green Hills INTEGRITY RTOS DSP/SYSBIOS ARM Main Routine (VAS) DSP Main Routine Image Processing Libraries Use Cases Algorithm Certified RTOS Multithread Services OS Single Thread Services Safety Critical Routines TI DM3730 DUAL CORE HW/camera
  • 12. Verification Strategy, from Imaging to Use Cases algorithms Reuse/ Effort For Verification &Validation (ISO 13485) HW camera ARM/Certified OS DSP Link DSP/OS UC Algorithms DSP Link Products with Basic Use Certified Products (procured) Certified Products (reused) Products to Certify
  • 13. AN IVD CASE STUDY (MOLECULAR BIOLOGY)
  • 14. An IVD distributed Computer Vision System able to…. “To Count the amount of plastic tips in the box and assure system productivity ” “To Detect the presence/absence of liquid in the wells and prevent from sample pollution, splashing, overflow and sample wasting” Use Case 1 Use Case 2
  • 16. Design and Tools Chain ›The computer vision algorithms are: »Developed as Matlab source code »Converted from floating point to fixed point (Matlab Fixed Point Designer) »Translated into C language (Matlab Coder) »Compiled »Loaded onto the TI DSP »Tested on board a fixture emulating the real application
  • 17. Project’s Tasks Localize the available tips Measure liquid volume Use computer vision algorithms that process images acquired by a low cost 2D camera and bar code reader Use Case 2 Use Case 1
  • 19. General Workflow ›Calibration (reference image) »The region of interest is localized using image edges »Knowledge of 3D models allows for perspective correction »Equalization, Morphological operations and contrast enhancement are applied to rectify images Edge detection for skew angle estimation Cover holes localization for skew angle estimation Region of interest Interpolation points to rectify image regions inside the slots Features arrays (small square images) 4229 2697 1197 276 76 0 4229 2697 1197 276 76 0 Use Case 1 Use Case 2 »Operation (generic image) »Same processing as calibration image »The rectified operative image is compared to reference and a correlation analysis is carried out »Use case-specific criteria are applied
  • 20. Use Case 1 Perspective undistorsion Illumination correction Features arrays (small square images) Operation image Features arrays (small square images) Rectified Generic features for either tips or holes Same processing Rectified Reference features for tips Tips present
  • 21. Use Case 1 Perspective undistorsion Illumination correction Features arrays (small square images) Operation image Features arrays (Correlation coefficients small square images) 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Correlation coefficients between features (all tips vs. either tips or holes) Tips present Tips identified
  • 22. Use Case 2 Average calibration image Cover holes localization for skew angle estimation Interpolation points to rectify image regions inside the slots 4229 2697 1197 276 76 0 Operation image Same processing Rectified operative image Rectified reference image
  • 23. Use Case 2 Average calibration image Cover holes localization for skew angle estimation Interpolation points to rectify image regions inside the slots Operation image 4229 276 76 0 Reference (empty) Operative (filled) Volume (ul) 4229 2697 1197 276 76 0 Estimated volume Visual Artifacts between operative and reference images can stem from both liquid and glares
  • 24. Results Test on 41 images ›82 total wells ›11 different volumes Use Case 2 Use Case 1 Real volume (μl) 0 100 200 300 400 500 600 700 0 50 100 150 200 250 400 500 1400 1600 1800 2000 2200 2400 2600 2800 3000 3200 3400 1500 2000 3000 Measured volume (μl) 672 Holes Tips Actual Holes Tips Prediction 624 0 0 Test on 37 images ›672 Holes ›624 Tips
  • 26. Computer Vision and IVD Critical Safety Systems ›We addressed safety in IVD system by using Computer Vision technologies and meeting safety requirements ›A distributed architectural option allowed for product certification, leveraged reuse and optimized verification effort. ›A “Split and Conquer” approach will ease product evolution, upgrades and roadmap for further certifications and ISO13485 compliance ›Computer vision algorithms , in the presented application, offered also some key technical and business benefits: »Automatic control over the final device giving correct operations »A single control system and configuration for different tasks »Use of commercial low cost camera and illumination system »Robust solution in presence of uneven illumination and glares