In this study, we simulated the trajectory of virus-laden droplets from the lung of an infected person to that of the exposed person using computational fluid dynamics. As numerical models, the model of the infected p...
详细信息
Breast cancer has been among the most prevalent cancers in the last five years. According to WHO in 2020, more than 2.35 million people were diagnosed with Breast Cancer and more than 690 thousand deaths globally. Bot...
详细信息
Network research requires testing tools to evaluate new protocols and algorithms. Since implementing and verifying these protocols and algorithms on real network devices is time-consuming and costly, widely-used tools...
详细信息
Histopathological scans identify prostate cancer, which medical professionals say is common in men. Pathologists’ modest differences in prostate cancer grading using the Gleason system persist. This work replicates a...
详细信息
The proceedings contain 9 papers. The special focus in this conference is on Clinical Image-Based Procedures. The topics include: Machine Learning Based Approach for Motion Detection and Estimation in R...
ISBN:
(纸本)9783031231780
The proceedings contain 9 papers. The special focus in this conference is on Clinical Image-Based Procedures. The topics include: Machine Learning Based Approach for Motion Detection and Estimation in Routinely Acquired Low Resolution Near Infrared Fluorescence Optical Imaging;automatic Landmark Identification on IntraOralScans;STAU-Net: A Spatial Structure Attention Network for 3D Coronary Artery Segmentation;convolutional Redistribution Network for Multi-view Medical Image Diagnosis;feature Patch Based Attention Model for Dental Caries Classification;Conditional Domain Adaptation Based on Initial Distribution Discrepancy for EEG Emotion Recognition;preface.
High-performance computing is not only a race towards the fastest supercomputers but also the science of using such massive machines productively to acquire valuable results – outlining the importance of performance ...
详细信息
In the present study a comparison of frequently used computer vision (CV)-based methods for structural health monitoring of truss structures is shown. The attention is paid to template matching methods that can be cla...
详细信息
ISBN:
(纸本)9783031072581;9783031072574
In the present study a comparison of frequently used computer vision (CV)-based methods for structural health monitoring of truss structures is shown. The attention is paid to template matching methods that can be classified into one of two groups: area-based and feature-based methods. Synthetic but realistic video is used in this study. Results of the comparison are reliable due to the fact that the exact displacements are known from the finite element model of the investigated structure. From the variety of tested CV methods, the Kanade-Lucas-Tomasi algorithm with FREAK-based repetitive correction outperforms the remaining tested methods in terms of the computation time with a negligibly greater estimation error.
A distributed denial-of-service (DDoS) attack is a deliberate attempt to stop a target system, service, or network from operating normally by flooding it with an avalanche of unauthorized traffic or requests. In a DDo...
详细信息
Digital transformation is a fundamental change process for improving organizations, industries or society and redefining key values for its stakeholders. Digital transformation represents the transition process that h...
详细信息
ISBN:
(纸本)9783031422928;9783031422935
Digital transformation is a fundamental change process for improving organizations, industries or society and redefining key values for its stakeholders. Digital transformation represents the transition process that has to be dealt with to innovate organizational processes, to improve their interaction with customers and to offer innovative services that are based on the intensive use of digital technologies. Digital transformation affects the life of end users who can access services in completely new ways, made possible by innovative technologies. Digital transformation is therefore a process of organizational, economic, social and creative change enabled by the adoption and development of digital technologies. Human-Centered Software Engineering (HCSE) as a research domain is thus more relevant than when it comes to the sole introduction of novel technologies in a socio-technical system. The interplay between human-computer interaction and software engineering needs to be rethought for a rapid response to the evolution of technologies, while also considering aspects such as greater agility in service development, sustainability, ethical considerations, cybersecurity, user mindset and awareness, to name a few. Beyond the traditional themes of IFIPWG13.2 workshops, this edition promotes sharing of knowledge and experiences that address how to deal with the challenges of the digital transformation and its influence on human-centered socio-technical system design and development practices.
暂无评论