In this paper, we introduce a Variational Autoencoder (VAE) based training approach that can compress and decompress cancer pathology slides at a compression ratio of 1:512, which is better than the previously reporte...
In this paper, we introduce a Variational Autoencoder (VAE) based training approach that can compress and decompress cancer pathology slides at a compression ratio of 1:512, which is better than the previously reported state of the art (SOTA) in the literature, while still maintaining accuracy in clinical validation tasks. The compression approach was tested on more common computer vision datasets such as CIFAR10, and we explore which image characteristics enable this compression ratio on cancer imaging data but not generic images. We generate and visualize embeddings from the compressed latent space and demonstrate how they are useful for clinical interpretation of data, and how in the future such latent embeddings can be used to accelerate search of clinical imaging data.
This paper presents a comparative analysis of three widely used encryption algorithms, namely AES (Advanced Encryption Standard), RC (Rivest Cipher), and Twofish, with a focus on their performance in data encryption a...
详细信息
ISBN:
(数字)9798350353839
ISBN:
(纸本)9798350353846
This paper presents a comparative analysis of three widely used encryption algorithms, namely AES (Advanced Encryption Standard), RC (Rivest Cipher), and Twofish, with a focus on their performance in data encryption and decryption. The study aims to evaluate the strengths and weaknesses of these algorithms in terms of security, speed, and efficiency. The analysis involves benchmarking the algorithms against various performance metrics, including encryption time, decryption time, key size, and resistance against cryptanalysis attacks. Additionally, the research explores the impact of different data sizes and configurations on the performance of each algorithm. The findings of this study will provide valuable insights for decision-makers and practitioners in selecting the most suitable encryption algorithm for their specific needs, considering the tradeoffs between security and performance.
Effort estimation models are a fundamental tool in software management, and used as a forecast for resources, constraints and costs associated to software development. For Free/Open Source Software (FOSS) projects, ef...
详细信息
This work presents a numerical investigation of acoustic cavitation in Newtonian fluid based on frequency ultrasound. The model of ultrasonic cavitation dynamics is formulated by a modified Rayleigh-Plesset equation a...
This work presents a numerical investigation of acoustic cavitation in Newtonian fluid based on frequency ultrasound. The model of ultrasonic cavitation dynamics is formulated by a modified Rayleigh-Plesset equation and an acoustic pressure equation. The exponential B-Spline collection method was employed to obtain the numerical solutions of the given cavitation bubble model, considering the effect of acoustic pressure. The behaviour of the cavitation microbubbles' radius and the internal pressure of acoustic cavitation were examined at different values of frequencies. The obtained results reveal the importance of frequencies in ultrasound, which play a vital role in changing the behaviour of cavitation bubbles.
The growing societal dependence on social media and user generated content for news and information has increased the influence of unreliable sources and fake content, which muddles public discourse and lessens trust ...
详细信息
Data processing is very important in the development of information technology. Almost all fields of work have information data. Data can be used to help analysis in work. At present, health information data is very i...
详细信息
The primary objective of university education is to provide students with the required information and skills to enable them to make a successful contribution to the national development effort. In order to evaluate t...
详细信息
In-band Full-Duplex (FD) Multiple-Input Multiple-Output (MIMO) systems offer a significant opportunity for Integrated Sensing and Communications (ISAC) due to their capability to realize simultaneous signal transmissi...
We present ResilienC, a framework for resilient control of Cyber-Physical Systems subject to STL-based requirements. ResilienC utilizes a recently developed formalism for specifying CPS resiliency in terms of sets of ...
详细信息
Although system heterogeneity has been extensively studied in the past, there is yet to be a study on measuring the impact of heterogeneity on system performance. For this purpose, we propose a heterogeneity measure t...
详细信息
暂无评论