Diabetic Retinopathy (DR) is one of the most severe eye complications associated with diabetes, hence the need to diagnose and treat at the initial stages. The current approaches of DR detection that use ophthalmoscop...
详细信息
ISBN:
(数字)9798350379716
ISBN:
(纸本)9798350379723
Diabetic Retinopathy (DR) is one of the most severe eye complications associated with diabetes, hence the need to diagnose and treat at the initial stages. The current approaches of DR detection that use ophthalmoscopic inspection of the optic fundus images are subjective and take an ample amount of time. This paper focuses on the application of Convolutional Neural Networks (CNNs) in automating DR detection as well as its classification process using large archive annotated datasets for training and testing. The structure of our CNN excels in capturing stipples of the retinal image and reaches a level higher than 90% accuracy while remaining sensitive and specific. By presenting feature maps and class activation maps, there is an improved credibility as the process the model goes through is explained. The analysis shows that using the CNN-based system can bring notable benefits in the form of early detection, a decrease in the amount of work performed by ophthalmologists, and enhancement of patient outcomes. Future work seeks to implement this model in clinical practice and work to overcome problems such as data privacy and real-time processing, thus demonstrating the revolutionary impact that deep learning holds for ophthalmology.
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an...
详细信息
ISBN:
(数字)9798331519254
ISBN:
(纸本)9798331519261
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security and social stability. Behind the re-evolution of deepfake lies the rampant proliferation of fake content, which is used for election tampering, identity fraud, fraud, spreading fake news, and so on. To address these challenges, researchers are constantly exploring and developing image-based deepfake detection techniques, which aim to effectively identify and prevent deepfake content in images and videos. This article will introduce the current development status of deepfake detection technology, present its principles and methods in detail, and look ahead to its future development directions.
We introduce DRESS, a novel approach for generating stylized large language model (LLM) responses through representation editing. Existing methods like prompting and fine-tuning are either insufficient for complex sty...
详细信息
This paper provides an overview of the Internet of Things (IoT) and its significance. It discusses the concept of Man-in-the-Middle (MitM) attacks in detail, including their causes, potential solutions, and challenges...
详细信息
Requirement engineering is a major phase of software development process. A project's success mainly depends on an efficient and effective requirement engineering process. Practices have been defined to ensure suc...
详细信息
Requirement engineering is a major phase of software development process. A project's success mainly depends on an efficient and effective requirement engineering process. Practices have been defined to ensure successful requirement engineering of software projects. Yet the professionals face numerous issues during this phase. This paper explores the software requirement engineering practices from in the software industry of Pakistan. It highlights the common problems faced by the software professionals, as well as commonly deployed solutions and practices.
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of ...
详细信息
ISBN:
(数字)9798350330663
ISBN:
(纸本)9798350330670
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of 5,896 PTM-related questions on Stack Overflow. We first analyze the popularity and difficulty trends of PTM-related questions. We find that PTM - related questions are becoming more and more popular over time. However, it is noteworthy that PTM-related questions not only have a lower response rate but also exhibit a longer response time compared to many well-researched topics in softwareengineering. This observation emphasizes the significant difficulty and complexity associated with the practical application of PTMs. To delve into the specific challenges, we manually annotate 430 PTM - related questions, categorizing them into a hierarchical taxonomy of 42 codes (i.e., leaf nodes) and three categories. This taxonomy encompasses many PTM prominent challenges such as fine-tuning, output understanding, and prompt customization, which reflects the gaps between current techniques and practical needs. We discuss the implications of our study for PTM practitioners, vendors, and educators, and suggest possible directions and solutions for future research.
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source...
详细信息
ISBN:
(数字)9798400705021
ISBN:
(纸本)9798350351781
History of code elements is essential for software maintenance tasks. However, code refactoring is one of the main causes that makes obtaining a consistent view on code evolution difficult as renaming or moving source code elements break such history. To this end, this paper presents RAT, a refactoring-aware tool for keeping track of code elements evolution across time, not just in terms of revisions but also in terms of refactoring. This is the first tool that enables fine-grained code element traceability of the whole repository. Empirical evaluation of leveraging our tool in three bug localization techniques relying on code history shows significant improvement in localization accuracy. Based on our findings, we believe that many of the state-of-the-art approaches using past source code data would benefit from our tool. Demo Tool: https://***/feifeiniu-se/RAT_Demo Demo Video: https://***/VI_xwUaIPp4
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the ...
The development of deep learning has driven the development of ReID, and more and more excellent methods have been proposed, but most of these are artificially designed network backbones. Automation is a trend in the development of deep learning. This paper propose FAS-ReID(Fair Architecture Search for Person Re-IDentification), which can automatically design and generate a neural network backbone for ReID. This paper compare operation selection to competition, and inject noise to make the competition fairer, while making the architecture of automated search More adaptable to ReID We use TriHard loss to improve the feature extraction ability. Our experiments show that the backbone searched by FAS-ReID is better and reduces the search time. Meanwhile, as for the problem of performance collapse caused by skip-connection enrichment in the search process, FAS-Reid does not use the early stop strategy to avoid performance loss like other solutions, which is also the reason why our method is more reliable and robust.
Recently, federated learning (FL) has gained momentum because of its capability in preserving data privacy. To conduct model training by FL, multiple clients exchange model updates with a parameter server via Internet...
详细信息
ISBN:
(数字)9798350383508
ISBN:
(纸本)9798350383515
Recently, federated learning (FL) has gained momentum because of its capability in preserving data privacy. To conduct model training by FL, multiple clients exchange model updates with a parameter server via Internet. To accelerate the communication speed, it has been explored to deploy a programmable switch (PS) in lieu of the parameter server to coordinate clients. The challenge to deploy the PS in FL lies in its scarce memory space, prohibiting running memory consuming aggregation algorithms on the PS. To overcome this challenge, we propose Federated Learning in-network Aggregation with Compression (FediAC) algorithm, consisting of two phases: client voting and model aggregating. In the former phase, clients report their significant model update indices to the PS to estimate global significant model updates. In the latter phase, clients upload global significant model updates to the PS for aggregation. FediAC consumes much less memory space and communication traffic than existing works because the first phase can guarantee consensus compression across clients. The PS easily aligns model update indices to swiftly complete aggregation in the second phase. Finally, we conduct extensive experiments by using public datasets to demonstrate that FediAC remarkably surpasses the state-of-the-art baselines in terms of model accuracy and communication traffic.
The paper presents a study of the effectiveness of software from the point of view of minimizing the energy consumption of microprocessor devices. In this case, the programming of the microcontroller in various progra...
详细信息
暂无评论