The proceedings contain 16 papers. The topics discussed include: deep ensemble architecture for knee osteoarthritis severity prediction and report generation;sweep coverage with faults;microarray data analysis for dia...
ISBN:
(纸本)9798350335705
The proceedings contain 16 papers. The topics discussed include: deep ensemble architecture for knee osteoarthritis severity prediction and report generation;sweep coverage with faults;microarray data analysis for diagnosis of cancer diseases by machine learning algorithm;blockchain-based secure storage and management of electronic health record using a smart card;high throughput circuit design of flash type analog to digital converter;rad-former: structuring radiology reports using transformers;realistic benchmark datasets for team formation problem in social networks;an efficient speaker identification approach for biometric access control system;emotion recognition from masked faces using inception-v3;secrecy outage analysis of energy harvesting enabled two user cooperative NOMA;and high throughput circuit designs of digital to analog converter.
The proceedings contain 14 papers. The topics discussed include: enhanced featurization of queries with mixed combinations of predicates for ml-based cardinality estimation;streaming weighted sampling over join querie...
ISBN:
(纸本)9783893180936
The proceedings contain 14 papers. The topics discussed include: enhanced featurization of queries with mixed combinations of predicates for ml-based cardinality estimation;streaming weighted sampling over join queries;patched multi-key partitioning for robust query performance;integration of skyline queries into spark SQL;unsupervised space partitioning for nearest neighbor search;recommending unanimously preferred items to groups;subset approach to efficient skyline computation;interactive set discovery;stitcher: learned workload synthesis from historical performance footprints;an experimental analysis of quantile sketches over data streams;and implementing and evaluating E2LSH on storage.
In this era of pervasive connection and data collecting, it is more important than ever that people have access to and control over their own health data. This presentation offers a comprehensive overview of the most ...
详细信息
ISBN:
(纸本)9798350306927
In this era of pervasive connection and data collecting, it is more important than ever that people have access to and control over their own health data. This presentation offers a comprehensive overview of the most recent techniques and algorithms for the expedited processing of health-related data. Individuals may now gather and track an unprecedented amount of data about their health and fitness thanks to wearable devices, smartphone applications, and Internet of Things (IoT) sensors. The potential benefits of better health outcomes, accelerated research, and patient empowerment may be enormous if this data could be managed correctly. This article digs into the innovative programs and algorithms that are changing the face of current healthcare data management. First, we examine the scalability, security, and interoperability of current datastorage and retrieval techniques in detail. Some examples of information that might be collected, saved, and accessed with the use of such devices include physiological measurements, data on lifestyle choices, and medical records. This abstract also investigates potential future applications of innovative data processing and analysis techniques for gathering data on the health of the general public. Innovative methods for health data management, such as blockchain and federated learning, are discussed in depth in the abstract. By facilitating the safe and transparent exchange of data between academics, healthcare providers, and patients, technology developments like these foster collaboration and accelerate medical research. The study emphasizes the significance of users having control over and ownership of their data in health data management. Customizable dashboards, mobile applications, and user interfaces that are made as simple as possible allow people to actively engage with their own health data and make informed decisions. The vast potential of the health data landscape may be tapped with the help of state-of-the-art
OPC (optical Proximity Correction) technology has been evolving to assist on the continues improvement of pattern resolution. One approach for further extending lithography resolution is ILT (Inverse Lithography Techn...
详细信息
ISBN:
(纸本)9781510682887;9781510682894
OPC (optical Proximity Correction) technology has been evolving to assist on the continues improvement of pattern resolution. One approach for further extending lithography resolution is ILT (Inverse Lithography technology). This technology, based on applying an inverse model to the target design, creates curves from the design layouts. The adoption of ILT is now enabled by the improvement of runtime obtained by enhancements in algorithms and computing power as well as the new generation of mask writers (multibeam) which enables writing complex features in an acceptable time. The last blocking points were the data volume required to store, and the challenge of handling complex structures. If the standard datastorage is used, curvilinear shapes are stored as polygons, which produces larger file sizes. The file size issue has been identified and addressed by the industry in recent years. File formats proposing compact ways to represent curves usually propose Implicit Bezier and B-Spline as main curve representations. The recent development of High-NA lithography requires anisotropic scaling of the patterns for writing on mask (4x, 8x). This adds another challenge to the data preparation flow to maintain the benefits of the proposed curve representations. This work assesses the impact of adoption of curvilinear representations, with the spotlight on the needs for High-NA mask data preparation.
The modern solutions for fetching content from PDF documents or images includes fetching document’s multiple features like processing using Natural Language Processing (NLP), border-less table contents, processing it...
详细信息
The global datasphere is experiencing significant expansion, largely driven by the relentless advancement of artificial intelligence technology. Cold data, in particular, is garnering increasing attention and is now c...
详细信息
ISBN:
(纸本)9798350381566;9798350381559
The global datasphere is experiencing significant expansion, largely driven by the relentless advancement of artificial intelligence technology. Cold data, in particular, is garnering increasing attention and is now considered a vital asset, constituting a substantial portion of data capacity. optical discs stand out as a highly promising solution for cold data archiving due to their robust data security, longevity, durability, and non-volatile nature. Additionally, their total cost of operation (TCO) further enhances their appeal. To increase the recording density, signal processing techniques must evolve along with the degradation of signal quality. In this paper, we conduct a comprehensive study of partial response maximum likelihood (PRML) detection based on simulation and real signal testing and compare an adaptive equalized detection scheme with a neural network equalized detection method for BD-ROM and BDXL systems. Results show the effectiveness of PRML method for both BD-ROM and BDXL. The neural network equalized detection method can also improve the detection performance of BD-ROM and BDXL at lower signal-to-noise ratio (SNR) levels.
In this paper, we propose a super-resolution holographic datastorage system based on deep learning. A low-pass filter was introduced into the Fourier plane to remove the high frequency. This produces a blurred intens...
详细信息
The proceedings contain 15 papers. The special focus in this conference is on Digital Forensics. The topics include: Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps;identifying and An...
ISBN:
(纸本)9783031710247
The proceedings contain 15 papers. The special focus in this conference is on Digital Forensics. The topics include: Forensic Analysis of Third-Party Cloud Software Development Kits for Android Apps;identifying and Analyzing Vault Apps;using Microposture Features and optical Flows for Deepfake Detection;assessing Backdoor Risk in Deepfake Detection;user Behavior Forensics on Encrypted Traffic in the Industrial Internet of Things;digital Forensic Acquisition Using Private Internet of Things Cloud Application Programming Interfaces;fingerprinting Malware Families Under Uncertainty;improving Android Malware Detection in Imbalanced data Scenarios;text File Recovery Using an N-Gram Model;generating Usable and Assessable datasets Containing Anti-Forensic Traces at the Filesystem Level;leveraging Client-Side User Account data in Digital Forensic Investigations;honeypot-Based data Collection for Dark Web Investigations Using the Tor Network;modeling Analyst Intentions Using a Markov Chain for Investigative Action Recommendations.
Tulu, largely spoken in coastal Karnataka, has a distinct alphabet that used to be written on palm leaves. This study addresses the scarcity of efficient OCR solutions. Employing machine learning algorithms that inclu...
详细信息
暂无评论