The expressive power of deep neural networks appears to have brought great hope to image processing, natural language processing, speech processing, as well as other related subfields of AI. Although the usefulness of...
详细信息
The expressive power of deep neural networks appears to have brought great hope to vision, natural language processing, speech processing, as well as other related AI sub-fields. Although the usefulness of neural netw...
详细信息
Background: Total Hip Arthroplasty (THA) is a well-established and common orthopedic surgery. Due to the complexity involved in THA, orthopedic surgeons require rigorous training. However, the current gold standard, t...
详细信息
Background: Total Hip Arthroplasty (THA) is a well-established and common orthopedic surgery. Due to the complexity involved in THA, orthopedic surgeons require rigorous training. However, the current gold standard, the tutor-guided and -evaluated apprenticeship model is time-consuming, costly, and poses risks to patients. There is a pressing need for additional training resources to enhance the efficiency and safety of the training process. In this work, we present a novel Augmented Reality (AR)-based simulator designed for THA that helps enable a new self-paced training and learning paradigm without the need for instructors. Methods: The simulator reduces the need for instructors by integrating an AR guidance module and an automated performance evaluation module. Three types of AR guidance were developed: Overlay, Virtual Twin, and Sectional Views. A feasibility study was conducted with five resident surgeons and two senior surgeons to compare these guidance methods quantitatively and qualitatively. The automated performance evaluation module was assessed against manual performance evaluation using Bland-Altman analysis with limits of agreement (LoA) and Mann–Whitney U tests. Results: The quantitative feasibility results indicate the efficacy of the developed AR guidance, characterized by mean transitional and rotational deviation errors below 3 mm and 3 degrees. Based on the qualitative results, we provide recommendations for efficient AR guidance designs. The Bland-Altman analysis results (0.22±1.32mm with LoA −2.37 to 2.81 mm for distance deviation, 0.94±2.41 degrees with LoA −3.78 to 5.66 degrees for yaw deviation, −0.34±1.30 degrees with LoA −2.90 to 2.22 degrees for pitch deviation) and p-values of Mann–Whitney U tests (0.64 for distance deviation, 0.12 for yaw deviation, 0.11 for pitch deviation) indicate no statistically significant differences between the automated and manual performance evaluation at a significance level of 0.05. Conclusion: This work sh
Generally, in the traditional 3D feature descriptors, real valued vectors are commonly used. However, their high computational complexity and space requirements during the matching process are major issues. We have pr...
详细信息
The evolution of diverse Intenet-of-things (IoT) applications towards Industry 5.0 has recently increased challenges in physical-layer security. In particular, short-packet communication (SPC) and non-orthogonal multi...
The evolution of diverse Intenet-of-things (IoT) applications towards Industry 5.0 has recently increased challenges in physical-layer security. In particular, short-packet communication (SPC) and non-orthogonal multiple access (NOMA) are being thoroughly integrated into IoT networks to achieve ultra-reliable low-latency communication (URLLC) applications and users' massive connectivity. Nevertheless, this creates a critical security flaw when untrusted-near users (NUs), using the same resource block as far users (FUs), can readily intercept FU's information with conventional NOMA. To mitigate such security threats, we propose a modified power allocation integrated beamforming (MPAIB) scheme to carry out the pairing procedure for SPC-enabled NOMA systems with multiple untrusted NUs. This scheme can simultaneously achieve joint objectives of preventing entrusted FU's leakage information and enhancing system coverage quality. For further performance improvement, we also design a dynamic power allocation strategy to maximize FU's average secrecy rate. Accordingly, we derive closed-form approximations for the average secrecy rate and throughput, and it is demonstrated that the throughput is a quasi-concavity function with respect to packet length. Numerical results show that our theoretical analyses are in good agreement with the simulation ones. Moreover, it also shows that the system's performance degrades significantly with the increase of multiple NUs and the probability of information leakage.
The paper discusses the topic of determining the current-voltage characteristics of two-terminal passive components. A virtual measurement instrument created in the LabVIEW environment using the NI USB-6211 data acqui...
详细信息
For the purpose of improving positioning accuracy of mobile station in the complex environment, a real-time non-line-of-sight (NLOS) identification and elimination method is proposed based on the characteristics of NL...
详细信息
This paper presents an innovative, yet secure, eHealth framework that leverages Explainable Artificial Intelligence (XAI) and blockchain technology to enhance transparency and security in the IoT-edge-cloud continuum....
详细信息
ISBN:
(数字)9798350362244
ISBN:
(纸本)9798350362251
This paper presents an innovative, yet secure, eHealth framework that leverages Explainable Artificial Intelligence (XAI) and blockchain technology to enhance transparency and security in the IoT-edge-cloud continuum. The framework incorporates SHapley Additive exPlanations (SHAP) to provide real-time, model-agnostic explanations for AI predictions, enabling personalized health monitoring and informed decisionmaking in healthcare. To strengthen data security, a consortium blockchain is employed, and AI is utilized to identify block data sensitivity at the edge within blockchain-integrated IoT architectures using Random Forest (RF) algorithm. This approach achieves high accuracy in validating block sensitivity, enabling efficient selection of authentication mechanisms in the proof of authentication (PoAh) consensus within the consortium blockchain. This ensures heightened protection for sensitive data and contributes to improved overall blockchain performance. The proposed framework is evaluated in an edge computing environment and demonstrates significant potential for advancing security and authentication in eHealth, representing a substantial advancement in healthcare technology.
Digital twin (DT), referring to a promising technique to digitally and accurately represent actual physical entities, has attracted explosive interests from both academia and industry. One typical advantage of DT is t...
详细信息
Digital twin (DT), referring to a promising technique to digitally and accurately represent actual physical entities, has attracted explosive interests from both academia and industry. One typical advantage of DT is that it can be used to not only virtually replicate a system’s detailed operations but also analyze the current condition, predict the future behavior, and refine the control optimization. Although DT has been widely implemented in various fields, such as smart manufacturing and transportation, its conventional paradigm is limited to embody non-living entities, e.g., robots and vehicles. When adopted in human-centric systems, a novel concept, called human digital twin (HDT) has thus been proposed. Particularly, HDT allows in silico representation of individual human body with the ability to dynamically reflect molecular status, physiological status, emotional and psychological status, as well as lifestyle evolutions. These prompt the expected application of HDT in personalized healthcare (PH), which can facilitate the remote monitoring, diagnosis, prescription, surgery and rehabilitation, and hence significantly alleviate the heavy burden on the traditional healthcare system. However, despite the large potential, HDT faces substantial research challenges in different aspects, and becomes an increasingly popular topic recently. In this survey, with a specific focus on the networking architecture and key technologies for HDT in PH applications, we first discuss the differences between HDT and the conventional DTs, followed by the universal framework and essential functions of HDT. We then analyze its design requirements and challenges in PH applications. After that, we provide an overview of the networking architecture of HDT, including data acquisition layer, data communication layer, computation layer, data management layer and data analysis and decision making layer. Besides reviewing the key technologies for implementing such networking architecture in
The field of space communications is the realm of communication technologies where diffraction and atmospheric effects, both of which contribute to loss and noise, become overriding. The pertinent questions here are h...
详细信息
The field of space communications is the realm of communication technologies where diffraction and atmospheric effects, both of which contribute to loss and noise, become overriding. The pertinent questions here are how and at which rate information (secret keys) can be securely transferred (shared) among users under such supposedly severe circumstances. In the present work we study continuous-variable quantum key distribution in a measurement-device-independent configuration over free-space optical links. We assess the turbulence regime and provide a composable finite-size key rate analysis of the protocol for such links. We study both short-range, horizontal communication links as well as slant paths to, e.g., high-altitude platform station systems.
暂无评论