Annu Int Conf IEEE Eng Med Biol Soc
July 2022
Pain is an unpleasant feeling that can reflect a patient's health situation. Since measuring pain is subjective, time-consuming, and needs continuous monitoring, automated pain intensity detection from facial expression holds great potential for smart healthcare applications. Convolutional Neural Networks (CNNs) are recently being used to identify features, map and model pain intensity from facial images, delivering great promise in helping practitioners detect disease.
View Article and Find Full Text PDFAnnu Int Conf IEEE Eng Med Biol Soc
July 2022
Undertreatment or overtreatment of pain will cause severe consequences physiologically and psychologically. Thus, researchers have made great efforts to develop automatic pain assessment approaches based on physiological signals using machine learning techniques. However, state-of-art research mainly focuses on verifying the hypothesis that physiological signals can be used to assess pain.
View Article and Find Full Text PDFObjectives: The tumor microenvironment (TME) consists of cellular and noncellular components which enable the tumor to interact with its surroundings and plays an important role in the tumor progression and how the immune system reacts to the malignancy. In the present study, we investigate the diagnostic potential of the TME in differentiating benign and malignant lesions using image quantification and machine learning.
Methods: A total of 229 breast lesions and 220 cervical lymph nodes were included in the study.
Nowadays, medical image modalities are almost available everywhere. These modalities are bases of diagnosis of various diseases sensitive to specific tissue type. Usually physicians look for abnormalities in these modalities in diagnostic procedures.
View Article and Find Full Text PDFCircuit obfuscation is a recently proposed defense mechanism to protect the intellectual property (IP) of digital integrated circuits (ICs) from reverse engineering. There have been effective schemes, such as satisfiability (SAT)-checking based attacks that can potentially decrypt obfuscated circuits, which is called deobfuscation. Deobfuscation runtime could be days or years, depending on the layouts of the obfuscated ICs.
View Article and Find Full Text PDF