The discussion topics of this paper are the original goals of the design and construction of a microcomputer laboratory in a computer and informationsciencedepartment and how these goals have changed during the labo...
详细信息
The discussion topics of this paper are the original goals of the design and construction of a microcomputer laboratory in a computer and informationsciencedepartment and how these goals have changed during the laboratory's existence. Aspects discussed are the type of single board systems for student use, budget, compability of systems across time, and student background and its effect on the laboratory's design.
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u...
详细信息
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
The k-Nearest Neighbors (kNN) algorithm is one of the most widely used techniques for data classification. However, the imbalanced class is a key problem for its declining performance. Therefore, the kNN algorithm is ...
详细信息
Text classification is a quintessential and practical problem in natural language processing with applications in diverse domains such as sentiment analysis, fake news detection, medical diagnosis, and document classi...
详细信息
Medical Image Analysis (MIA) is integral to healthcare, demanding advanced computational techniques for precise diagnostics and treatment planning. The demand for accurate and interpretable models is imperative in the...
详细信息
Medical Image Analysis (MIA) is integral to healthcare, demanding advanced computational techniques for precise diagnostics and treatment planning. The demand for accurate and interpretable models is imperative in the ever-evolving healthcare landscape. This paper explores the potential of Self-Supervised Learning (SSL), transfer learning and domain adaptation methods in MIA. The study comprehensively reviews SSL-based computational techniques in the context of medical imaging, highlighting their merits and limitations. In an empirical investigation, this study examines the lack of interpretable and explainable component selection in existing SSL approaches for MIA. Unlike prior studies that randomly select SSL components based on their performance on natural images, this paper focuses on identifying components based on the quality of learned representations through various clustering evaluation metrics. Various SSL techniques and backbone combinations were rigorously assessed on diverse medical image datasets. The results of this experiment provided insights into the performance and behavior of SSL methods, paving the way for an explainable and interpretable component selection mechanism for artificial intelligence models in medical imaging. The empirical study reveals the superior performance of BYOL (Bootstrap Your Own Latent) with resnet as the backbone, as indicated by various clustering evaluation metrics such as Silhouette Coefficient (0.6), Davies-Bouldin Index (0.67), and Calinski-Harabasz Index (36.9). The study also emphasizes the benefits of transferring weights from a model trained on a similar dataset instead of a dataset from a different domain. Results indicate that the proposed mechanism expedited convergence, achieving 98.66% training accuracy and 92.48% testing accuracy in 23 epochs, requiring almost half the number of epochs for similar results with ImageNet weights. This research contributes to advancing the understanding of SSL in MIA, providin
Deformable image registration is a fundamental technique in medical image analysis and provide physicians with a more complete understanding of patient anatomy and function. Deformable image registration has potential...
详细信息
The coronavirus disease 2019 (COVID-19) has posed significant challenges globally, with image classification becoming a critical tool for detecting COVID-19 from chest X-ray and CT images. Convolutional neural network...
详细信息
A fuzzy visual image denoising algorithm based on Bayesian estimation is proposed to address the problems of poor denoising performance and long denoising time in traditional image denoising algorithms. First, analyse...
详细信息
暂无评论