Medical Image Analysis (MIA) is integral to healthcare, demanding advanced computational techniques for precise diagnostics and treatment planning. The demand for accurate and interpretable models is imperative in the...
详细信息
Medical Image Analysis (MIA) is integral to healthcare, demanding advanced computational techniques for precise diagnostics and treatment planning. The demand for accurate and interpretable models is imperative in the ever-evolving healthcare landscape. This paper explores the potential of Self-Supervised Learning (SSL), transfer learning and domain adaptation methods in MIA. The study comprehensively reviews SSL-based computational techniques in the context of medical imaging, highlighting their merits and limitations. In an empirical investigation, this study examines the lack of interpretable and explainable component selection in existing SSL approaches for MIA. Unlike prior studies that randomly select SSL components based on their performance on natural images, this paper focuses on identifying components based on the quality of learned representations through various clustering evaluation metrics. Various SSL techniques and backbone combinations were rigorously assessed on diverse medical image datasets. The results of this experiment provided insights into the performance and behavior of SSL methods, paving the way for an explainable and interpretable component selection mechanism for artificial intelligence models in medical imaging. The empirical study reveals the superior performance of BYOL (Bootstrap Your Own Latent) with resnet as the backbone, as indicated by various clustering evaluation metrics such as Silhouette Coefficient (0.6), Davies-Bouldin Index (0.67), and Calinski-Harabasz Index (36.9). The study also emphasizes the benefits of transferring weights from a model trained on a similar dataset instead of a dataset from a different domain. Results indicate that the proposed mechanism expedited convergence, achieving 98.66% training accuracy and 92.48% testing accuracy in 23 epochs, requiring almost half the number of epochs for similar results with ImageNet weights. This research contributes to advancing the understanding of SSL in MIA, providin
Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content *** study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their int...
详细信息
Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content *** study delves into the integration of Galois Field(GF)multiplication tables,especially GF(2^(4)),and their interaction with distinct irreducible *** primary aim is to enhance watermarking techniques for achieving imperceptibility,robustness,and efficient execution *** research employs scene selection and adaptive thresholding techniques to streamline the watermarking *** selection is used strategically to embed watermarks in the most vital frames of the video,while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria,maintaining the video's visual ***,careful consideration is given to execution time,crucial in real-world scenarios,to balance efficiency and *** Peak Signal-to-Noise Ratio(PSNR)serves as a pivotal metric to gauge the watermark's imperceptibility and video *** study explores various irreducible polynomials,navigating the trade-offs between computational efficiency and watermark *** parallel,the study pays careful attention to the execution time,a paramount consideration in real-world scenarios,to strike a balance between efficiency and *** comprehensive analysis provides valuable insights into the interplay of GF multiplication tables,diverse irreducible polynomials,scene selection,adaptive thresholding,imperceptibility,and execution *** evaluation of the proposed algorithm's robustness was conducted using PSNR and NC metrics,and it was subjected to assessment under the impact of five distinct attack *** findings contribute to the development of watermarking strategies that balance imperceptibility,robustness,and processing efficiency,enhancing the field's practicality and effectiveness.
Neural Radiance Fields (NeRFs) have shown impressive capabilities in synthesizing photorealistic novel views. However, their application to room-size scenes is limited by the requirement of several hundred views with ...
详细信息
Neural Radiance Fields (NeRFs) have shown impressive capabilities in synthesizing photorealistic novel views. However, their application to room-size scenes is limited by the requirement of several hundred views with accurate poses for training. To address this challenge, we propose SN $^{2}$ eRF, a framework which can reconstruct the neural radiance field with significantly fewer views and noisy poses by exploiting multiple priors. Our key insight is to leverage both multi-view and monocular priors to constrain the optimization of NeRF in the setting of sparse and noisy pose inputs. Specifically, we extract and match key points to constrain pose optimization and use Ray Transformer with a monocular depth estimator to provide dense depth prior for geometry optimization. Benefiting from these priors, our approach achieves state-of-the-art accuracy in novel view synthesis for indoor room scenarios. IEEE
Time series data plays a crucial role in intelligent transportation *** flow forecasting represents a precise estimation of future traffic flow within a specific region and time *** approaches,including sequence perio...
详细信息
Time series data plays a crucial role in intelligent transportation *** flow forecasting represents a precise estimation of future traffic flow within a specific region and time *** approaches,including sequence periodic,regression,and deep learning models,have shown promising results in short-term series ***,forecasting scenarios specifically focused on holiday traffic flow present unique challenges,such as distinct traffic patterns during vacations and the increased demand for long-term ***,the effectiveness of existing methods diminishes in such ***,we propose a novel longterm forecasting model based on scene matching and embedding fusion representation to forecast long-term holiday traffic *** model comprises three components:the similar scene matching module,responsible for extracting Similar Scene Features;the long-short term representation fusion module,which integrates scenario embeddings;and a simple fully connected layer at the head for making the final *** results on real datasets demonstrate that our model outperforms other methods,particularly in medium and long-term forecasting scenarios.
Inefficient task scheduling schemes compromise network performance and increase latency for delay intolerant tasks. Cybertwin based 6G services support data logging of operational queries for appropriate resource allo...
详细信息
The detection of community structures in complex networks has garnered significant attention in recent years. Given its NP-hardness, numerous evolutionary optimization-based approaches have been proposed. However, the...
详细信息
The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network...
详细信息
The advent of Network Function Virtualization(NFV)and Service Function Chains(SFCs)unleashes the power of dynamic creation of network services using Virtual Network Functions(VNFs).This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long ***,the study shows with a set of test-bed experiments that packet loss at certain positions(i.e.,different VNFs)in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted *** overcome this challenge,this study focuses on resource scheduling and deployment of SFCs while considering packet loss *** study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming(MILP)and proved that it is *** this study,Palos is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping *** experiment results show that Palos can achieve up to 42.73%improvement on packet dropping cost and up to 33.03%reduction on average SFC latency when compared with two other state-of-the-art schemes.
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be...
详细信息
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have been developed to tackle these ***,most conventional Intrusion Detection System(IDS)models struggle with unseen cyberattacks and complex high-dimensional *** fact,this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system,named INTRUMER,which offers balanced accuracy,reliability,and security in cloud settings bymultiplemodulesworking together within *** traffic captured from cloud devices is first passed to the TC&TM module in which the Falcon Optimization Algorithm optimizes the feature selection process,and Naie Bayes algorithm performs the classification of *** selected features are classified further and are forwarded to the Heterogeneous Attention Transformer(HAT)*** this module,the contextual interactions of the network traffic are taken into account to classify them as normal or malicious *** classified results are further analyzed by the Explainable Prevention Module(XPM)to ensure trustworthiness by providing interpretable *** the explanations fromthe classifier,emergency alarms are transmitted to nearby IDSmodules,servers,and underlying cloud devices for the enhancement of preventive *** experiments on benchmark IDS datasets CICIDS 2017,Honeypots,and NSL-KDD were conducted to demonstrate the efficiency of the INTRUMER model in detecting network trafficwith high accuracy for different *** outperforms state-of-the-art approaches,obtaining better performance metrics:98.7%accuracy,97.5%precision,96.3%recall,and 97.8%*** results validate the robustness and effectiveness of INTRUMER in securing diverse cloud environments against sophisticated cyber threats.
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context ...
详细信息
The importance of secure data sharing in fog computing is increasing due to the growing number of Internet of Things(IoT)*** article addresses the privacy and security issues brought up by data sharing in the context of IoT fog *** suggested framework,called"BlocFogSec",secures key management and data sharing through blockchain consensus and smart *** existing solutions,BlocFogSec utilizes two types of smart contracts for secure key exchange and data sharing,while employing a consensus protocol to validate transactions and maintain blockchain *** process and store data effectively at the network edge,the framework makes use of fog computing,notably reducing latency and raising *** successfully blocks unauthorized access and data breaches by restricting transactions to authorized *** addition,the framework uses a consensus protocol to validate and add transactions to the blockchain,guaranteeing data accuracy and *** compare BlocFogSec's performance to that of other models,a number of simulations are *** simulation results indicate that BlocFogSec consistently outperforms existing models,such as Security Services for Fog Computing(SSFC)and Blockchain-based Key Management Scheme(BKMS),in terms of throughput(up to 5135 bytes per second),latency(as low as 7 ms),and resource utilization(70%to 92%).The evaluation also takes into account attack defending accuracy(up to 100%),precision(up to 100%),and recall(up to 99.6%),demonstrating BlocFogSec's effectiveness in identifying and preventing potential attacks.
The cellular automaton (CA), a discrete model, is gaining popularity in simulations and scientific exploration across various domains, including cryptography, error-correcting codes, VLSI design and test pattern gener...
详细信息
暂无评论