101,900 research outputs found
TPU Cloud-Based Generalized U-Net for Eye Fundus Image Segmentation
Medical images from different clinics are acquired with different instruments and settings.
To perform segmentation on these images as a cloud-based service we need to train with multiple datasets
to increase the segmentation independency from the source. We also require an ef cient and fast segmentation
network. In this work these two problems, which are essential for many practical medical imaging
applications, are studied. As a segmentation network, U-Net has been selected. U-Net is a class of deep
neural networks which have been shown to be effective for medical image segmentation. Many different
U-Net implementations have been proposed.With the recent development of tensor processing units (TPU),
the execution times of these algorithms can be drastically reduced. This makes them attractive for cloud
services. In this paper, we study, using Google's publicly available colab environment, a generalized fully
con gurable Keras U-Net implementation which uses Google TPU processors for training and prediction.
As our application problem, we use the segmentation of Optic Disc and Cup, which can be applied to
glaucoma detection. To obtain networks with a good performance, independently of the image acquisition
source, we combine multiple publicly available datasets (RIM-One V3, DRISHTI and DRIONS). As a result
of this study, we have developed a set of functions that allow the implementation of generalized U-Nets
adapted to TPU execution and are suitable for cloud-based service implementation.Ministerio de Economía y Competitividad TEC2016-77785-
CoCalc as a Learning Tool for Neural Network Simulation in the Special Course "Foundations of Mathematic Informatics"
The role of neural network modeling in the learning content of the special
course "Foundations of Mathematical Informatics" was discussed. The course was
developed for the students of technical universities - future IT-specialists
and directed to breaking the gap between theoretic computer science and it's
applied applications: software, system and computing engineering. CoCalc was
justified as a learning tool of mathematical informatics in general and neural
network modeling in particular. The elements of technique of using CoCalc at
studying topic "Neural network and pattern recognition" of the special course
"Foundations of Mathematic Informatics" are shown. The program code was
presented in a CoffeeScript language, which implements the basic components of
artificial neural network: neurons, synaptic connections, functions of
activations (tangential, sigmoid, stepped) and their derivatives, methods of
calculating the network's weights, etc. The features of the Kolmogorov-Arnold
representation theorem application were discussed for determination the
architecture of multilayer neural networks. The implementation of the
disjunctive logical element and approximation of an arbitrary function using a
three-layer neural network were given as an examples. According to the
simulation results, a conclusion was made as for the limits of the use of
constructed networks, in which they retain their adequacy. The framework topics
of individual research of the artificial neural networks is proposed.Comment: 16 pages, 3 figures, Proceedings of the 13th International Conference
on ICT in Education, Research and Industrial Applications. Integration,
Harmonization and Knowledge Transfer (ICTERI, 2018
Advanced Cloud Privacy Threat Modeling
Privacy-preservation for sensitive data has become a challenging issue in
cloud computing. Threat modeling as a part of requirements engineering in
secure software development provides a structured approach for identifying
attacks and proposing countermeasures against the exploitation of
vulnerabilities in a system . This paper describes an extension of Cloud
Privacy Threat Modeling (CPTM) methodology for privacy threat modeling in
relation to processing sensitive data in cloud computing environments. It
describes the modeling methodology that involved applying Method Engineering to
specify characteristics of a cloud privacy threat modeling methodology,
different steps in the proposed methodology and corresponding products. We
believe that the extended methodology facilitates the application of a
privacy-preserving cloud software development approach from requirements
engineering to design
- …