Image compression is a class of algorithms that reduces the storage space requirement for a digital image. Lossy image compression techniques achieve higher compression but the visual quality of the decompressed image...
详细信息
作者:
Moschella, LucaGLADIA research lab
Department of Computer Science Faculty of Information Engineering Informatics and Statistics Italy
As NNs (Neural Networks) permeate various scientific and industrial domains, understanding the universality and reusability of their representations becomes crucial. At their core, these networks create intermediate n...
详细信息
As NNs (Neural Networks) permeate various scientific and industrial domains, understanding the universality and reusability of their representations becomes crucial. At their core, these networks create intermediate neural representations, indicated as latent spaces, of the input data and subsequently leverage them to perform specific downstream tasks. This dissertation focuses on the universality and reusability of neural representations. Do the latent representations crafted by a NN remain exclusive to a particular trained instance, or can they generalize across models, adapting to factors such as randomness during training, model architecture, or even data domain? This adaptive quality introduces the notion of Latent Communication – a phenomenon that describes when representations can be unified or reused across neural spaces. A salient observation from our research is the emergence of similarities in latent representations, even when these originate from distinct or seemingly unrelated NNs. By exploiting a partial correspondence between the two data distributions that establishes a semantic link, we found that these representations can either be projected into a universal representation (Moschella*, Maiorca*, et al., 2023), coined as Relative Representation, or be directly translated from one space to another (Maiorca* et al., 2023). Intriguingly, this holds even when the transformation relating the spaces is unknown (Cannistraci, Moschella, Fumero, et al., 2024) and when the semantic bridge between them is minimal (Cannistraci, Moschella, Maiorca, et al., 2023). Latent Communication allows for a bridge between independently trained NN, irrespective of their training regimen, architecture, or the data modality they were trained on – as long as the data semantic content stays the same (e.g., images and their captions). This holds true for both generation, classification and retrieval downstream tasks;in supervised, weakly supervised, and unsupervised settings;and
Recent years have witnessed many advancements in the applications of 3D textured meshes. As the demand continues to rise, evaluating the perceptual quality of this new type of media content becomes crucial for quality...
详细信息
Software development is implemented in several key phases, one of which is software testing. Software testing consists of selecting techniques for the purpose of finding software defects and bugs in the process of wri...
Software development is implemented in several key phases, one of which is software testing. Software testing consists of selecting techniques for the purpose of finding software defects and bugs in the process of writing code. There are several ways and approaches that lead us to that purpose, with the goal of selecting the most adequate method in terms of cost, complexity, and efficiency. In this paper, we will take a deeper dive into mutation testing techniques. Mutation testing techniques are fault-based and focus more on test structures than the input data, which is considered the testing start point. The basic concept of mutation testing consists of a few steps, which will be covered in this paper, and metrics that measure how effective the tests really are. With a few code examples, we will show why code coverage, which is mostly taken as a measure while testing, is sometimes not the most reliable source and does not give a full picture when talking about the quality of written tests.
Artificial intelligence, Machine Learning, and Deep Learning are increasingly making significant contributions to the field of medicine. Individual patient conditions, disease localization, and various influencing fac...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
Artificial intelligence, Machine Learning, and Deep Learning are increasingly making significant contributions to the field of medicine. Individual patient conditions, disease localization, and various influencing factors underscore the complexity of disease diagnosis and treatment planning. Introducing new technologies can revolutionize medical diagnostics, facilitating swift and accurate assessments. Among the noninvasive diagnostic methods, Magnetic Resonance Imaging (MRI) stands out, particularly in tumor diagnosis. UNet, renowned for its effectiveness in medical image analysis, serves as a robust model for semantic segmentation, as does DeepLabV3+. However, these models are inherently complex, and their inference process can be time-consuming. By leveraging the OpenVINO toolkit, the inference process is significantly reduced. In this study, nearly a 2-fold acceleration is achieved in inference time with the DeepLabV3+ model and a roughly 1.2-fold improvement with the UNet model on CPU. Moreover, when employing GPU with FP16 precision, the acceleration reached almost 2.5fold for UNet and nearly 3-fold for DeepLabV3+, showcasing the substantial performance enhancements attainable through optimized hardware utilization.
Computational Design approaches facilitate the generation of typographic design, but evaluating these designs remains a challenging task. In this paper, we propose a set of heuristic metrics for typographic design eva...
详细信息
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., so...
详细信息
ISBN:
(数字)9798350364101
ISBN:
(纸本)9798350364118
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., someone who does excessive activity has a faster heart rate. Then, a diagnosis is needed to classify arrhythmias. One method used is ECG (Electrocardiogram) signal analysis. The ECG signal consists of P, QRS Complex, and T waves. The morphology of the QRS is used for arrhythmia classification. Currently, cardiologists analyze ECG signals by observing directly. This method is depending on the level of expertise of the cardiologist. Previous research classified arrhythmias based on the QRS morphology from a single ECG lead. As 12-lead ECG devices have now become standard in ECG examinations because abnormalities can be observed from multiple angles. This study proposes the classification of arrhythmias in 12-lead ECG signals based on the morphology of QRS complex waves using a deep learning 1-dimensional Convolutional Neural Network. The output of deep learning is the classification of arrhythmias into four classes, namely: Normal, Right Bundle Branch Block, Premature Ventricular Contraction, and Atrial Premature Beat. The outcome of the proposed system is that each QRS segment is used as input for deep learning, which can improve classification performance compared to the classification carried out by each lead. The experimental results show the method can be done well, with an average Accuracy, Precision, Sensitivity, and F1-Score were 98.8%, 99.2%, 99.2%, and 99.2%, respectively.
In recent years, cities as they adopt smart technology in an ever-evolving technological environment, face new complex threats and security challenges. Threats that affect the privacy of citizens but often impact crit...
详细信息
ISBN:
(纸本)9798400716263
In recent years, cities as they adopt smart technology in an ever-evolving technological environment, face new complex threats and security challenges. Threats that affect the privacy of citizens but often impact critical infrastructure of a smart city, creating sustainability risks. Hence, the cyber security incidents have multiplied, allowing these threats to disrupt the functioning of a smart digitized ecosystem. In addition to these challenges, the smart cities have been developed like a technological complex puzzle with different interconnected sensors and software. This Internet of Things (IoT) – based infrastructure of a smart city includes different smart grid systems which will be studied. This paper highlights the vulnerabilities of a digital ecosystem in a smart city environment and addresses the security and privacy issues regarding the IoT-based infrastructure and cloud computing. We also present future trends on blockchain technology and we focus on the presentation of a zero trust blockchain-security framework (ZTF) which can be developed to mitigate the urban surface area of vulnerability exploitation and security risks.
Security datasets often exhibit significant imbalances that can introduce bias during model training, diminish sensitivity to actual attacks, and lead to a substantial number of false negatives, potentially overlookin...
详细信息
ISBN:
(数字)9798350363104
ISBN:
(纸本)9798350363111
Security datasets often exhibit significant imbalances that can introduce bias during model training, diminish sensitivity to actual attacks, and lead to a substantial number of false negatives, potentially overlooking real threats. This is particularly evident in the highly skewed distribution of the UNSW-NB18 Bot-IoT dataset. To mitigate these issues, this study proposes implementing either Random Oversampling (ROS) or Synthetic Minority Oversampling (SMOTE) in conjunction with five ensemble algorithms to develop models for predicting intrusions in the Internet of Things networks. The results show that incorporating these methods with ensemble learners significantly improves model accuracy by 1 % to 4 % across the four algorithms compared to their absence. In addition, there were dramatic increases in precision, recall, and F1-score, achieving values between 95% and 100%.
Context: Technical debt (TD) is a metaphor that is used to communicate the consequences of poor software development practices to non-technical stakeholders. In recent years, it has gained significant attention in agi...
详细信息
暂无评论