Objective: We introduce ECG-Image-Database, a large and diverse collection of electrocardiogram (ECG) images generated from ECG time-series data that exhibit real-world scanning, imaging, and physical artifacts. This ...
详细信息
Objective: We introduce ECG-Image-Database, a large and diverse collection of electrocardiogram (ECG) images generated from ECG time-series data that exhibit real-world scanning, imaging, and physical artifacts. This dataset addresses the need for digitizing paper-based and non-digital ECGs for computerized analysis, providing a foundation for developing robust machine and deep learning models capable of ECG image digitization. Approach: We used ECG-Image-Kit, an open-source Python toolkit, to generate realistic images of 12-lead ECG printouts from raw ECG time-series data. We include images with realistic distortions, including noise, wrinkles, stains, and perspective shifts generated both digitally and physically. The toolkit was applied to 977 12-lead ECG records from the PTB-XL database and 1,000 from Emory Healthcare to create high-fidelity synthetic ECG images. These 1,977 unique images were subjected to both programmatic distortions using ECG-Image-Kit and to physical effects, such as soaking, staining, and mold growth, followed by scanning and photography under various lighting conditions to create real-world artifacts, producing a total of 35,595 images. Main results: The resulting dataset includes 35,595 software-labeled ECG images (generated from 1,977 unique records) from different sources (in Germany and the USA) with a wide range of imaging artifacts and distortions. The dataset provides ground truth time-series data alongside the corresponding images, offering a reference for training and evaluating machine and deep learning models for ECG digitization and classification. The images vary in quality, ranging from clear scans of clean papers to noisy photographs of degraded papers, enabling the development of more generalizable and robust digitization algorithms. Significance: ECG-Image-Database addresses a critical gap in cardiovascular research by supporting the development of machine learning models capable of classifying or converting ECG images int
Pairwise rank aggregation (PRA) aims at learning a ranking from pairwise comparisons between objects that specify their relative ordering. The present study proposes the use of rank difference information for PRA, whi...
详细信息
ISBN:
(纸本)9781665473316
Pairwise rank aggregation (PRA) aims at learning a ranking from pairwise comparisons between objects that specify their relative ordering. The present study proposes the use of rank difference information for PRA, which characterizes the extent winners in paired comparisons beat their opponents. While such information can be effortlessly recognized by annotators, to our knowledge, it has not been utilized for PRA before. The challenge is three-fold: how to solicit such information, how to utilize it in rank aggregation, and how to overcome the noise from heterogeneous annotators. This study proposes a new query for soliciting information about rank difference that imposes limited cognitive burden on annotators. As prior methods for PRA abounds, it is of interest to empower them with information on rank difference. To this end, this study proposes a conservative learning objective that can be combined seamlessly with many existing PRA algorithms. The third contribution is a new method for PRA called mixture of exponentials (MoE). Annotators from a heterogeneous population might have diverse views concerning rank difference. For example, an annotator might be good at recognizing rank difference only for a subset of items but not the rest. This means that information about rank difference is likely to be perturbed. Unfortunately, such an object-dependent error pattern cannot be modeled with existing approaches. MoE assumes that each annotator uses a mixture of ranking functions in generating answers, and the mixture components can capture object-related patterns in data. The present study evaluates the proposals with extensive experiments on both real and synthetic datasets. The results confirm the efficacy of the proposals and shed light on their practical usage.
Image registration plays an important role in medical image fusion and surgical navigation. Iterative nearest point algorithm (INPA) is a high-precision image registration algorithm, but it also has the problems of hu...
详细信息
作者:
Träff, Jesper LarssonTU Wien
Faculty of Informatics Institute of Computer Engineering Research Group Parallel Computing 191-4 Treitlstrasse 3 5th Floor Vienna1040 Austria
We give optimally fast O(log p) time (per processor) algorithms for computing round-optimal broadcast schedules for message-passing parallel computing systems. This affirmatively answers the questions posed in Trä...
详细信息
Urban transportation is set to undergo a profound transformation with the advent of autonomous systems such as autonomous vehicles, automated buses, and sidewalk delivery robots. To promote safe, sustainable, and incl...
详细信息
Urban transportation is set to undergo a profound transformation with the advent of autonomous systems such as autonomous vehicles, automated buses, and sidewalk delivery robots. To promote safe, sustainable, and inclusive urban mobility, understanding and predicting the behaviors of pedestrians and cyclists, including their intentions, decisions, and movements, when they interact with autonomous systems becomes crucial. Gaining a thorough understanding of these complex interactions can not only improve the safety, efficiency, and acceptance of autonomous systems but also enhance the design and implementation of these technologies. Through a comprehensive review of the literature spanning the years 2014 to 2023, we identify 99 articles that empirically investigate the interactions of humans and autonomous systems. Based on our overview of progress and challenges within this field, we further identify five research gaps that future research should address to enhance human-autonomous system interactions, including: (1) scaling up experimental scenarios to multi-user and multi-modal setups to better represent real-world challenges, (2) emphasizing safety-critical scenarios that are difficult to achieve in real-world environments by applying virtual reality, (3) incorporating diverse behavioral data from the human perspective to deepen the understanding of vulnerable road user behavior and decisions, (4) embracing continuous and real-time interaction to better predict dynamic future environments, and (5) enhancing the generalization ability to ensure realism and broad applicability. This review article offers valuable insights for the growing human-autonomous system research community, specifically those interested in leveraging controlled experiments to enhance the understanding and prediction of pedestrians' and cyclists' behaviors in future urban environments.
We formulate a stochastic zero-sum game over continuous-time dynamics to analyze the competition between the attacker, who tries to covertly misguide the vehicle to an unsafe region, versus the detector, who tries to ...
详细信息
The public e-Procurement system in Malaysia is a crucial component of the e-Government services. Its primary function is to provide a platform for government agencies to efficiently procure goods and services from bus...
The public e-Procurement system in Malaysia is a crucial component of the e-Government services. Its primary function is to provide a platform for government agencies to efficiently procure goods and services from business users. The user experience (UX) of this e-Procurement system has emerged as a pivotal factor in the success of the broader e-Government digital transformation. Ensuring that the digitalization of the public e-Procurement system aligns with its objectives and delivers a top-tier Government Electronic Procurement System is imperative. This research aims to gain a comprehensive understanding of the UX issues and challenges faced by stakeholders when using the public e-Procurement system. The study employs a qualitative approach, delving into the perspectives and insights of e-Procurement system users. Data from interview sessions involving nine (9) participants have been meticulously interpreted, coded, and subjected to thematic analysis, revealing five distinct dimensions of issues and challenges: usability, performance, operational, quality, and user satisfaction. To address these identified concerns, we proposed several recommendations. Enhancements in system user interface (UI), navigational aspects, system features, performance, and operational aspects are essential to ensure sustained quality and user satisfaction within the e-Procurement system. The study also explores avenues for future work to further refine and augment these improvements.
Decentralized cryptocurrencies are influential smart contract applications in the blockchain, drawing interest from industry and academia. The capacity to govern and manage token behavior provided by the token smart c...
详细信息
Decentralized cryptocurrencies are influential smart contract applications in the blockchain, drawing interest from industry and academia. The capacity to govern and manage token behavior provided by the token smart contract adds to thriving decentralized applications. However, token smart contracts face security challenges in technology weakness and manipulation risks. In this work, we briefly describe the manipulation risk and propose TokenAuditor, a fuzzing framework detecting those risks in token smart contracts. TokenAuditor constructs basic blocks based on the contract bytecodes and adopts the rarity selection and mutation strategy to generate test cases. The main idea is to select the test cases that have hit rare basic blocks since the fuzzing started as candidates and perform mutation operations on them. In our evaluation, TokenAudiotr discovered 664 manipulation risks of four types in 4021 real-world token contracts.
Researchers are working hard to face various challenges in the fast-moving field of network security and data exchange. When it comes to encryption techniques, efforts vary to address multiple issues such as computati...
Researchers are working hard to face various challenges in the fast-moving field of network security and data exchange. When it comes to encryption techniques, efforts vary to address multiple issues such as computational speed, data size requirements, application scope, etc. that are driven by the purposes of collecting and sharing sensitive data that must be stored and processed securely. This paper proposes an efficient asymmetric cryptosystem that bases on the multiplication of plaintext by a variable public key. The origin of this key is constant, but for each encryption, a random number must be added to it. Therefore, a new public key each time is generated; in other words, a simulation of a one-time pad system. For each message, the sender generates a new secret twin of the public key; The receiver can decrypt all messages encrypted by different twins with a single private key. The proposed probabilistic scheme is linear coding and hence is lightweight, easy to execute, and practical in many areas. We consider the cloud to be an untrusted part that tries to disclose data when decoded by systems, the proposed method provides the additive homomorphic property and ensures data integrity when a homomorphic operation is performed by the cloud; thus, we realize verifiable partial homomorphic encryption.
The use of artificial intelligence (AI) in automated disease classification significantly reduces healthcare costs and improves the accessibility of services. However, this transformation has given rise to concerns ab...
详细信息
暂无评论