Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure con...
详细信息
Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure concerning its *** DVR,transfer function(TF)plays a key role by enabling accurate identification of SOIs interactively as well as ensuring appropriate visibility of *** generation typically involves non-intuitive trial-and-error optimization of rendering parameters,which is time-consuming and *** at mitigating this manual process have led to approaches that make use of a knowledge database consisting of pre-designed TFs by domain *** these approaches,a user navigates the knowledge database to find the most suitable pre-designed TF for their input volume to visualize the *** these approaches potentially reduce the workload to generate the TFs,they,however,require manual TF navigation of the knowledge database,as well as the likely fine tuning of the selected TF to suit the *** this work,we propose a TF design approach,CBR-TF,where we introduce a new content-based retrieval(CBR)method to automatically navigate the knowledge *** of pre-designed TFs,our knowledge database contains volumes with SOI *** an input volume,our CBR-TF approach retrieves relevant volumes(with SOI labels)from the knowledge database;the retrieved labels are then used to generate and optimize TFs of the *** approach largely reduces manual TF navigation and fine *** our CBR-TF approach,we introduce a novel volumetric image feature which includes both a local primitive intensity profile along the SOIs and regional spatial semantics available from the co-planar images to the *** the regional spatial semantics,we adopt a convolutional neural network to obtain high-level image feature *** the intensity profile,we extend the dynamic time warping technique to address subtle alignment
Millibots, miniature robotic platforms, have emerged as pivotal tools in various domains, ranging from medical interventions to environmental monitoring. However, their diminutive size presents formidable challenges i...
详细信息
Indonesia's tourism sector, boosted by its captivating landscapes, has seen a rise in the popularity of Online Travel Agencies (OTAs) like Traveloka, ***, and Agoda. To effectively assist tourists, OTAs are antici...
详细信息
We study extensions of Semënov arithmetic, the first-order theory of the structure (N,+,2x). It is well-known that this theory becomes undecidable when extended with regular predicates over tuples of number strin...
详细信息
Graphics Interchange Format (GIF) encoding is the art of reproducing an image with limited colors. Existing GIF encoding schemes often introduce unpleasant visual artifacts such as banding artifact, dotted-pattern noi...
详细信息
This research offers a new perspective on predicting the activity of the HIV virus from the Drug Therapeutics Program (DTP) Antiviral Screen by using the molecular data represented in SMILES notation. The topic has si...
详细信息
As social media significantly shapes societal norms and ethical paradigms, understanding real-time public sentiment provides valuable insights for political parties to evaluate their candidates, key issues, and campai...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
The study investigates the increasing demand of online learning as a means of addressing education issues in the context of the COVID-19 epidemic. Online learning requires several adaptations for teaching methods, lea...
详细信息
Spatial Message Passing Graph Neural Networks (MPGNNs) are widely used for learning on graph-structured data. However, key limitations of -step MPGNNs are that their "receptive field" is typically limited to...
暂无评论