Topic Review
Peripheral Blood Smears Examination by Artificial Intelligence
Artificial intelligence (AI) has emerged as a cutting-edge tool, simultaneously accelerating, securing, and enhancing the diagnosis and treatment of patients. An exemplification of this capability is evident in the analysis of peripheral blood smears (PBS). In university medical centers, hematologists routinely examine hundreds of PBS slides daily to validate or correct outcomes produced by advanced hematology analyzers assessing samples from potentially problematic patients. This process may logically lead to erroneous PBC readings, posing risks to patient health. AI functions as a transformative tool, significantly improving the accuracy and precision of readings and diagnoses.
  • 238
  • 27 Dec 2023
Topic Review
Filmmaking Education and Artificial Intelligence
Artificial intelligence (AI) has witnessed remarkable advancements, revolutionizing various industries and domains, including education. From intelligent algorithms in the financial sector to diagnostic tools in healthcare and autonomous vehicles in transportation, artificial intelligence (AI) has demonstrated immense potential across various domains. However, despite its remarkable strides in many fields, the application of AI in the realm of education has lagged behind. Its full potential in the field of filmmaking education remains largely untapped. 
  • 275
  • 26 Dec 2023
Topic Review
Enhanced Genetic Method for Optimizing Multiple Sequence Alignment
In the realm of bioinformatics, Multiple Sequence Alignment (MSA) is a pivotal technique used to optimize the alignment of multiple biological sequences, guided by specific scoring criteria. Existing approaches addressing the MSA challenge tend to specialize in distinct biological features, leading to variability in alignment outcomes for the same set of sequences.
  • 283
  • 26 Dec 2023
Topic Review
Patent Analysis and Tools
Patent analysis is a field that concerns the analysis of patent records, for the purpose of extracting insights and trends, and it is widely used in various fields. Despite the abundance of proprietary software employed for this purpose, there is currently a lack of easy-to-use and publicly available software that can offer simple and intuitive visualizations, while advocating for open science and scientific software development.
  • 318
  • 25 Dec 2023
Topic Review
ISTD Based on Background-SuppressionProximal Gradient and GPU Acceleration
Infrared Small-Target Detection (ISTD) is an important component of infrared search and tracking, aiming to exploit the thermal radiation difference between a target and its background to achieve long-range target detection. According to the definition by the Society of Photo-Optical Instrumentation Engineers (SPIE), small targets typically refers to objects in a 256 × 256 image with an area of fewer than 80 pixels, accounting for approximately 0.12% of the total image area.
  • 238
  • 25 Dec 2023
Topic Review
Facial Expression Recognition Using Local Sliding Window Attention
There are problems associated with facial expression recognition (FER), such as facial occlusion and head pose variations. These two problems lead to incomplete facial information in images, making feature extraction extremely difficult. 
  • 176
  • 25 Dec 2023
Topic Review
Semantic Change Detection for High Resolution RS Images
Change detection in high resolution (HR) remote sensing images faces more challenges than in low resolution images because of the variations of land features, which prompts research on faster and more accurate change detection methods. 
  • 206
  • 22 Dec 2023
Topic Review
Blockchain and Access Control for Internet of Things
The Internet of Things (IoT) has recently attracted much interest from researchers due to its diverse IoT applications. However, IoT systems encounter additional security and privacy threats. Developing an efficient IoT system is challenging because of its sophisticated network topology. Effective access control is required to ensure user privacy in the Internet of Things. Traditional access control methods are inappropriate for IoT systems because most conventional access control approaches are designed for centralized systems. 
  • 135
  • 22 Dec 2023
Topic Review
UNet and Conventional DL Systems for CAD
The ability of UNet-based deep learning models as shown before is very powerful in the imaging domain and can handle image noise, structure, scale, size, resolution, and further, the variability in the shapes.
  • 110
  • 22 Dec 2023
Topic Review
Privacy Protection in Mobile Edge Computing
Data sharing and analyzing among different devices in mobile edge computing is valuable for social innovation and development. The limitation to the achievement of this goal is the data privacy risk. Therefore, existing studies mainly focus on enhancing the data privacy-protection capability. On the one hand, direct data leakage is avoided through federated learning by converting raw data into model parameters for transmission. On the other hand, the security of federated learning is further strengthened by privacy-protection techniques to defend against inference attack. However, privacy-protection techniques may reduce the training accuracy of the data while improving the security. Particularly, trading off data security and accuracy is a major challenge in dynamic mobile edge computing scenarios. 
  • 178
  • 22 Dec 2023
  • Page
  • of
  • 371
Video Production Service