Steganography is a technique used to hide data within other data, emerging from the realization that information is valuable and must be concealed. By considering the potential of blockchain technology, which produces...
详细信息
Many things, such as goods, products, and websites are evaluated based on user's notes and comments. One popular research project is sentiment analysis, which aims to extract information from notes and comments as...
详细信息
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in...
详细信息
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,including scattering noise,low contrast,and limited resolution in ultrasound *** existing segmentation models have made progress,they still suffer from several limitations,such as high error rates,low generalizability,overfitting,limited feature learning capability,*** address these challenges,this paper proposes a Multi-level Relation Transformer-based U-Net(MLRT-UNet)to improve thyroid nodule *** MLRTUNet leverages a novel Relation Transformer,which processes images at multiple scales,overcoming the limitations of traditional encoding *** transformer integrates both local and global features effectively through selfattention and cross-attention units,capturing intricate relationships within the *** approach also introduces a Co-operative Transformer Fusion(CTF)module to combine multi-scale features from different encoding layers,enhancing the model’s ability to capture complex patterns in the ***,the Relation Transformer block enhances long-distance dependencies during the decoding process,improving segmentation *** results showthat the MLRT-UNet achieves high segmentation accuracy,reaching 98.2% on the Digital Database Thyroid Image(DDT)dataset,97.8% on the Thyroid Nodule 3493(TG3K)dataset,and 98.2% on the Thyroid Nodule3K(TN3K)*** findings demonstrate that the proposed method significantly enhances the accuracy of thyroid nodule segmentation,addressing the limitations of existing models.
Security is a major challenge in storage and transmission of digital data. Secret sharing scheme is a fundamental primitive used in multiparty computations, access control and key management, which is based here on tw...
详细信息
The reduced visibility during the winter season in an outdoor setting can be attributed primarily to the presence of haze or fog. Despite adjusting the lens of an optical sensor system for various purposes, such as au...
详细信息
Digital twinning enables manufacturers to create digital representations of physical entities,thus implementing virtual simulations for product *** efforts of digital twinning neglect the decisive consumer feedback in...
详细信息
Digital twinning enables manufacturers to create digital representations of physical entities,thus implementing virtual simulations for product *** efforts of digital twinning neglect the decisive consumer feedback in product development stages,failing to cover the gap between physical and digital *** work mines real-world consumer feedbacks through social media topics,which is significant to product *** specifically analyze the prevalent time of a product topic,giving an insight into both consumer attention and the widely-discussed time of a *** primary body of current studies regards the prevalent time prediction as an accompanying task or assumes the existence of a preset ***,these proposed solutions are either biased in focused objectives and underlying patterns or weak in the capability of generalization towards diverse *** this end,this work combines deep learning and survival analysis to predict the prevalent time of *** propose a specialized deep survival model which consists of two *** first module enriches input covariates by incorporating latent features of the time-varying text,and the second module fully captures the temporal pattern of a rumor by a recurrent network ***,a specific loss function different from regular survival models is proposed to achieve a more reasonable *** experiments on real-world datasets demonstrate that our model significantly outperforms the state-of-the-art methods.
A new, to our knowledge, doped combination of Nd3+, Tm3+, and Ce3+ ions was developed in tellurite glass with a fundamental composition of TeO2-ZnO-WO3-Bi2O3, and the structural, thermal, and especially near-infrared ...
详细信息
Brain tumor classification is crucial for personalized treatment *** deep learning-based Artificial Intelligence(AI)models can automatically analyze tumor images,fine details of small tumor regions may be overlooked d...
详细信息
Brain tumor classification is crucial for personalized treatment *** deep learning-based Artificial Intelligence(AI)models can automatically analyze tumor images,fine details of small tumor regions may be overlooked during global feature ***,we propose a brain tumor Magnetic Resonance Imaging(MRI)classification model based on a global-local parallel dual-branch *** global branch employs ResNet50 with a Multi-Head Self-Attention(MHSA)to capture global contextual information from whole brain images,while the local branch utilizes VGG16 to extract fine-grained features from segmented brain tumor *** features from both branches are processed through designed attention-enhanced feature fusion module to filter and integrate important ***,to address sample imbalance in the dataset,we introduce a category attention block to improve the recognition of minority *** results indicate that our method achieved a classification accuracy of 98.04%and a micro-average Area Under the Curve(AUC)of 0.989 in the classification of three types of brain tumors,surpassing several existing pre-trained Convolutional Neural Network(CNN)***,feature interpretability analysis validated the effectiveness of the proposed *** suggests that the method holds significant potential for brain tumor image classification.
In this paper,an induced current learning method(ICLM)for microwave through wall imaging(TWI),named as TWI-ICLM,is *** the inversion of induced current,the unknown object along with the enclosed walls are treated as a...
详细信息
In this paper,an induced current learning method(ICLM)for microwave through wall imaging(TWI),named as TWI-ICLM,is *** the inversion of induced current,the unknown object along with the enclosed walls are treated as a combination of ***,a non-iterative method called distorted-Born backpropagation(DB-BP)is utilized to generate the initial *** the training stage,several convolutional neural networks(CNNs)are cascaded to improve the estimated induced *** addition,a hybrid loss function consisting of the induced current error and the permittivity error is used to optimize the network ***,the relative permittivity images are conducted analytically using the predicted current based on *** the numerical and experimental TWI tests prove that,the proposed method can achieve better imaging accuracy compared to traditional distorted-Born iterative method(DBIM).
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely *** verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented *** this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly *** verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
暂无评论