Advanced molecular and imaging techniques, such as STAR-FISH, are frequently required to identify mutations in tissue specimens to properly diagnose Glioblastoma (GBM), an aggressive type of brain tumor. Mutations to ...
详细信息
ISBN:
(纸本)9781510686045
Advanced molecular and imaging techniques, such as STAR-FISH, are frequently required to identify mutations in tissue specimens to properly diagnose Glioblastoma (GBM), an aggressive type of brain tumor. Mutations to the telomerase reverse transcriptase promoter (TERTp) are common in cancer and present in approximately 80% of all GBM tumors. We hypothesize that machine learning can stratify cells by their TERTp mutation status using DAPI fluorescence images since the STAR-FISH technique can be costly and inaccessible for some healthcare facilities. In this study, we present a machine learning-based approach to recognize nuclei harboring TERTp mutations solely based on the DAPI fluorescence images of GBM tissues. The proposed pipeline integrates a convolutional neural network (CNN)-based deep learning model to segment cells, extract hand-engineered features, and feed them into fully connected (FC) layers within the neural network or other machine learning classifiers to identify TERTp mutant cells. This approach involves extracting DAPI features, including both morphological and textural image features, followed by an ensemble of machine learning modules to predict TERTp mutant cells. We evaluate our approach on a cohort of 18 patients (70 pairs of DAPI and STAR-FISH processed images). Our experimental results show that the FC layers within the neural network achieve the highest AUC, F1-Score, and recall of 0.77, 0.69, and 0.86, respectively, with the integrated CNN model achieving a Dice score of 0.83, accurately segmenting cells. Our work is one of the earliest attempts that we are aware of to use machine-learning models for TERTp mutation identification using DAPI fluorescence images. Our results indicate the possibility of improved GBM diagnosis accuracy. To improve patient diagnosis and treatment planning for GBM, future research aims will expand the cohort and enhance the models to provide more precise and diagnostically valuable models for the interpretation o
This research explores the methods that Nonfungible Token (NFT)s can be recommended to people who interact with NFT-marketplaces to explore NFTs of preference and similarity to what they have been searching for. While...
详细信息
Uncertainty estimation is crucial for the reliability of safety-critical human and artificial intelligence (AI) interaction systems, particularly in the domain of healthcare engineering. However, a robust and general ...
详细信息
Since modern anti-virus software mainly depends on a signature-based static analysis, they are not suitable for coping with the rapid increase in malware variants. Moreover, even worse, many vulnerabilities of operati...
详细信息
Gannet optimization algorithm (GOA) is a meta-heuristic algorithm based on habits of gannet proposed by Zhang et al. In this paper, we propose a Gannet optimization algorithm using parallel strategy (PGOA). Since the ...
Gannet optimization algorithm (GOA) is a meta-heuristic algorithm based on habits of gannet proposed by Zhang et al. In this paper, we propose a Gannet optimization algorithm using parallel strategy (PGOA). Since the GOA algorithm has the risk of easily falling into local optimality, the use of the parallel strategy can largely avoid falling into local optimality. Therefore, we use the parallel strategy to improve the GOA algorithm, which greatly improves the performance and efficiency of the algorithm. The improved algorithm is applied to image segmentation, and the processed images are evaluated using PSNR, SSIM, and FSIM as evaluation metrics. The experimental results show that the improved GOA algorithm can achieve higher quality image segmentation compared to other algorithms on image segmentation,
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog...
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technologies are described. Various anti-emulation techniques that are used in modern malware considered. Obfuscation as one primary approach to hide malware malicious actions described and discussed. State of emulator is presented, and the advantages of its usage are covered. Distributed model for malware detection is considered. Basic emulator and its current capabilities presented. Prepared files that represent malware are described. Experimental results for developed files that differs with included avoid techniques are presented. Disadvantages of proposed approach is described. Future research and sandbox improvement are described.
This study compares the effectiveness of various Generative Adversarial Network architectures, including WGAN and WGAN-GP, in data clustering using the Iris dataset. Performance was evaluated with metrics such as Silh...
详细信息
We demonstrate a wide gamut of color generation by large-scale, lithography-free, and environment-friendly plasmonic structures with a resolution of 100 µm for macroscopic color printing by utilizing femtosecond ...
详细信息
ISBN:
(纸本)9781957171258
We demonstrate a wide gamut of color generation by large-scale, lithography-free, and environment-friendly plasmonic structures with a resolution of 100 µm for macroscopic color printing by utilizing femtosecond laser photomodification of multi-functional optical elements.
This paper presents a comparative analysis of the application of Variational Autoencoders (VAE) and Wasserstein Generative Adversarial Networks (WGAN) for detecting anomalous images. The performance evaluation of the ...
详细信息
ISBN:
(数字)9798331534141
ISBN:
(纸本)9798331534158
This paper presents a comparative analysis of the application of Variational Autoencoders (VAE) and Wasserstein Generative Adversarial Networks (WGAN) for detecting anomalous images. The performance evaluation of the models is conducted using metrics such as AUC, Precision, Recall, and F1-Score. The results indicate that VAEs provide high Recall in anomaly detection but with low Precision, whereas WGANs demonstrate more balanced results with fewer false positives. Recommendations are proposed for selecting an appropriate model depending on the specific task requirements and the need to minimize false alarms or achieve high detection completeness.
暂无评论