Cancer survival prediction is pivotal in tailoring individualized treatment strategies and guiding clinician decision-making. Yet, existing methodologies grapple with efficiently harnessing the intricate distribution ...
Cancer survival prediction is pivotal in tailoring individualized treatment strategies and guiding clinician decision-making. Yet, existing methodologies grapple with efficiently harnessing the intricate distribution of medical data spanning various modalities. In response, we present SAMMS, an advanced multi-omics multimodal deep learning framework tailored for survival prediction. SAMMS leverages the robust image segmentation model, "Segment Anything" to adeptly characterize pathological images. This prowess is further enhanced by integrating multi-omics data and clinical insights, facilitating holistic modeling across a diverse modal spectrum. The framework weaves a modality-specific subnetwork with a cross-modality common subnetwork, meticulously capturing intra-modality nuances and inter-modality correlations. SAMMS eclipsed its contemporaries by delivering remarkable performance on TCGA’s LGG and KIRC tumor datasets. A battery of analyses underscored SAMMS’s unparalleled capability to distill multifaceted insights from multimodal datasets, yielding richer and more integrative multimodal representations. Such strides promise significant advancements in cancer survival analytics, bolstering the precision and efficacy of patient-centric treatments, disease oversight, and clinical decision processes.
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ...
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of segment switching nodes, aimed at achieving maximum network performance with the option of connecting request sources to the available communication paths with servers. The study considers the options for connecting each source of requests with one of the paths or with all paths for connecting to servers. The paper shows the existence of an optimal placement of path switching nodes, in which the maximum reliability of the system is achieved.
The accelerated advancement of consumer Internet of Things (CIoT) devices has resulted in their pervasive integration into the fabric of contemporary lifestyles. As these devices are capable of collecting vast quantit...
详细信息
The explosive growth of pervasive and diverse digital products demands the importance of addressing emotional design within the sphere of product development. As a result, there has been a significant focus from both ...
The explosive growth of pervasive and diverse digital products demands the importance of addressing emotional design within the sphere of product development. As a result, there has been a significant focus from both industry and academia on studying consumer perspectives related to a wide range of pervasive and digital products, adopting a variety of methods, tools, and resources to delve into user emotional experiences. However, a comprehensive study focusing on users' emotions, incorporating a precisely defined semantic or lexicon tailored for this type of user interface (UI) product design remains elusive. Therefore, this study aims to synthesize and validate a comprehensive array of emotional keywords applicable for pervasive and digital products through an extensive literature search and a rigorous validation procedure involving language experts. The result is a meticulously refined set of 175 keywords that will serve as a valuable point of reference for all endeavors associated with evaluating and configuring the emotional structure of pervasive and digital product UI experiences. The study's findings have the potential to provide valuable guidance to industry practitioners and academic researchers, contributing to the improvement of UI design landscape and the development of new systems by enhancing their insight into users' emotional experiences through the utilization of pertinent emotional keywords in a wide range of digital and pervasive UI product designs.
With society’s increasing data production and the corresponding demand for systems that are capable of utilizing them, the big data domain has gained significant importance. However, besides the systems’ actual impl...
With society’s increasing data production and the corresponding demand for systems that are capable of utilizing them, the big data domain has gained significant importance. However, besides the systems’ actual implementation, their testing also needs to be considered. For this, oftentimes, proper test data sets are necessary. This publication discusses several different approaches how these can be provisioned and, further, highlights the respective advantages, disadvantages, and suitable application scenarios. In doing so, researchers and practitioners that are implementing big data applications and need to test them, or who are generally interested in the domain, are supported in their own considerations on how to obtain test data.
Data compression is a trending field that is used in data storage and data transmission systems. Lossy compression means that data cannot be completely retrieved while in lossless compression the compressed data must ...
详细信息
ISBN:
(纸本)9781665482387
Data compression is a trending field that is used in data storage and data transmission systems. Lossy compression means that data cannot be completely retrieved while in lossless compression the compressed data must be reconstructed exactly. Lossless data compression is used in compressing binary files, telemetry data and high-fidelity medical and scientific images where details are crucial. There is no generic compression algorithm that gives best compression ratio on all data pattern. In this paper, we propose a hybrid lossless hardware architecture that compresses most of data patterns such as repeated data, Gaussian distribution data and images. A profiling-before-compressing and then choosing the right compression hardware is proposed. The proposed design is a highly parallelized architecture that can compress/decompress 64 bytes/cycle with minor overhead. Moreover, it provides high compression ratio on small block sizes as well as large ones.
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p...
详细信息
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch path segments on the probability of network connectivity with servers of the same type and heterogeneous in functionality. The purpose of the article is to increase the reliability of the network, taking into account the influence of the placement of communication nodes that implement the switching of route segments during reconfiguration, on the connectivity of the network with servers that are homogeneous and heterogeneous in functionality. The research involves the construction of a structural reliability model that takes into account the possibility of failures of both communication nodes and the links between them. The reliability model is built taking into account the availability of request sources with full and non-full access connections to the set of network paths.
Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the cost of ...
详细信息
作者:
Koana, TomohiroTechnische Universität Berlin
Faculty IV Institute of Software Engineering and Theoretical Computer Science Algorithmics and Computational Complexity Germany
In this work, we study the Induced Matching problem: Given an undirected graph G and an integer , is there an induced matching M of size at least ? An edge subset M is an induced matching in G if M is a matching such ...
详细信息
The first signer arranges for an agent to generate a proxy private key using an identity based proxy signature (IBPS) scheme. The agent outputs the proxy signature for the first signer can generate the signature for t...
详细信息
暂无评论