AIMC Topic: Software Validation

Clear Filters Showing 1 to 10 of 13 articles

Adversarial perturbation and defense for generalizable person re-identification.

Neural networks : the official journal of the International Neural Network Society
In the Domain Generalizable Person Re-Identification (DG Re-ID) task, the quality of identity-relevant descriptor is crucial for domain generalization performance. However, for hard-matching samples, it is difficult to separate high-quality identity-...

A fully automated artificial intelligence-driven software for planning of transcatheter aortic valve replacement.

Cardiovascular revascularization medicine : including molecular interventions
BACKGROUND: Transcatheter aortic valve replacement (TAVR) is increasingly performed for the treatment of aortic stenosis. Computed tomography (CT) analysis is essential for pre-procedural planning. Currently available software packages for TAVR plann...

Efficient Computation Reduction in Bayesian Neural Networks Through Feature Decomposition and Memorization.

IEEE transactions on neural networks and learning systems
The Bayesian method is capable of capturing real-world uncertainties/incompleteness and properly addressing the overfitting issue faced by deep neural networks. In recent years, Bayesian neural networks (BNNs) have drawn tremendous attention to artif...

MIScnn: a framework for medical image segmentation with convolutional neural networks and deep learning.

BMC medical imaging
BACKGROUND: The increased availability and usage of modern medical imaging induced a strong need for automatic medical image segmentation. Still, current image segmentation platforms do not provide the required functionalities for plain setup of medi...

Evaluation of a delineation software for cardiac atlas-based autosegmentation: An example of the use of artificial intelligence in modern radiotherapy.

Cancer radiotherapie : journal de la Societe francaise de radiotherapie oncologique
PURPOSE: The primary objective of this work was to implement and evaluate a cardiac atlas-based autosegmentation technique based on the "Workflow Box" software (Mirada Medical, Oxford UK), in order to delineate cardiac substructures according to Euro...

A systematic review of fuzzing based on machine learning techniques.

PloS one
Security vulnerabilities play a vital role in network security system. Fuzzing technology is widely used as a vulnerability discovery technology to reduce damage in advance. However, traditional fuzz testing faces many challenges, such as how to muta...

Comparison of Planning Quality and Efficiency Between Conventional and Knowledge-based Algorithms in Nasopharyngeal Cancer Patients Using Intensity Modulated Radiation Therapy.

International journal of radiation oncology, biology, physics
PURPOSE: Intensity modulated radiation therapy (IMRT) is widely used to achieve a highly conformal dose and improve treatment outcome. However, plan quality and planning time are institute and planner dependent, and no standardized tool exists to rec...

Supporting information retrieval from electronic health records: A report of University of Michigan's nine-year experience in developing and using the Electronic Medical Record Search Engine (EMERSE).

Journal of biomedical informatics
OBJECTIVE: This paper describes the University of Michigan's nine-year experience in developing and using a full-text search engine designed to facilitate information retrieval (IR) from narrative documents stored in electronic health records (EHRs)....

Ultrasound-based deep learning radiomics for enhanced axillary lymph node metastasis assessment: a multicenter study.

The oncologist
BACKGROUND: Accurate preoperative assessment of axillary lymph node metastasis (ALNM) in breast cancer is crucial for guiding treatment decisions. This study aimed to develop a deep-learning radiomics model for assessing ALNM and to evaluate its impa...