计算机科学最新文献

筛选
英文 中文
DSRJR: A monitoring substitution framework via dual-stream reconstruction and joint representation for fault diagnosis DSRJR:基于双流重构和联合表示的故障诊断监测替代框架
IF 6.5 2区 计算机科学
Neurocomputing Pub Date : 2025-10-18 DOI: 10.1016/j.neucom.2025.131785
Qin Han , Li Jin , Nan Li , Hui Shi , Xiaoyin Nie , Gang Xie , Haifeng Yang
{"title":"DSRJR: A monitoring substitution framework via dual-stream reconstruction and joint representation for fault diagnosis","authors":"Qin Han ,&nbsp;Li Jin ,&nbsp;Nan Li ,&nbsp;Hui Shi ,&nbsp;Xiaoyin Nie ,&nbsp;Gang Xie ,&nbsp;Haifeng Yang","doi":"10.1016/j.neucom.2025.131785","DOIUrl":"10.1016/j.neucom.2025.131785","url":null,"abstract":"<div><div>Rotary machinery functions in harsh environments and is susceptible to failure, so dependable fault diagnosis methods are essential to ensure equipment safety. Most existing methods assume that the sensor types of inputs are consistent in the training and testing datasets. However, in practice, sensor failure or the lack of corresponding sensors installed on the equipment can cause the model to fail due to incomplete input information, which ultimately leads to monitoring interruption. Therefore, developing an effective diagnostic knowledge transfer mechanism is essential. To address fault monitoring interruptions caused by the absence of the single sensor, this study proposes a monitoring substitution framework via dual-stream reconstruction and joint representation for fault diagnosis. Dual-stream joint alignment framework (DSJA) designs unique feature extraction models according to the characteristics of each signal, and introduces locality-sensitive latent diffusion space (LSLDS) for feature reconstruction. Building on this foundation, joint representation of feature consistency and domain invariance is developed to effectively map and align feature spaces across different modalities. The monitoring-substitution of the two signals is validated using gradient-based class activation map (Grad-CAM) visualization, and the diagnostic and monitoring-substitution performance of the proposed method is assessed across four scenarios. Compared with existing methods, the proposed approach demonstrates superior fault diagnosis and monitoring-substitution capabilities.</div></div>","PeriodicalId":19268,"journal":{"name":"Neurocomputing","volume":"659 ","pages":"Article 131785"},"PeriodicalIF":6.5,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145326701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning on RISC-V Platforms at the Edge: A Perspective on the Hardware and Software Support 边缘RISC-V平台上的深度学习:硬件和软件支持的视角
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-18 DOI: 10.1145/3772277
Giovanni Agosta, Andrea Galimberti, Davide Zoni
{"title":"Deep Learning on RISC-V Platforms at the Edge: A Perspective on the Hardware and Software Support","authors":"Giovanni Agosta, Andrea Galimberti, Davide Zoni","doi":"10.1145/3772277","DOIUrl":"https://doi.org/10.1145/3772277","url":null,"abstract":"The growing demand for always-on intelligence in resource-constrained devices makes edge deployment of deep learning both a necessity and a challenge, requiring platforms that combine efficiency, scalability, and flexibility. RISC-V has emerged as the de facto standard architecture for modern computing platforms at the edge tasked with deep-learning workloads, a trend reinforced by the increasing availability of commercial solutions tailored for inference. This survey delivers a structured taxonomy of the hardware architectures for deep learning at the edge, classified according to how they process data in parallel, represent data, and optimize data movement and whether they implement an application-specific design, and of the supporting software tools, ranging from hardware-software co-design approaches to autotuning and compiler frameworks. Finally, it identifies a set of key findings and outlines the most promising directions for research in the field.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"26 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145314775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JDExtractor: an automated approach for efficient extraction of defect-related methods in Java projects JDExtractor:一种在Java项目中有效提取缺陷相关方法的自动化方法
IF 3.1 2区 计算机科学
Automated Software Engineering Pub Date : 2025-10-18 DOI: 10.1007/s10515-025-00563-z
Tianyang Liu, Jiawei Ye, Weixing Ji
{"title":"JDExtractor: an automated approach for efficient extraction of defect-related methods in Java projects","authors":"Tianyang Liu,&nbsp;Jiawei Ye,&nbsp;Weixing Ji","doi":"10.1007/s10515-025-00563-z","DOIUrl":"10.1007/s10515-025-00563-z","url":null,"abstract":"<div><p>High-quality repositories containing real-world defects are essential for developing defect-related algorithms. Although plenty of defect repositories exist, they often fail to capture the context of inter-procedural defects, which include all methods in the propagation path from the defect-source method to the defect-triggering method. This limitation is particularly critical for the Null Pointer Exception (NPE), a common defect that often propagates across multiple methods in Java systems. To address this problem, we propose a novel and automatic approach, called <i>JDExtractor</i>, to extract defect-related methods from real applications. The main challenge is how to identify all defect-related methods efficiently and accurately. <i>JDExtractor</i> tackles this challenge by constructing a method-level data graph using the principle of Java type compatibility and simplifying the data graph using filtering criteria. Data flow analysis helps construct a coarse-grained method-level data graph, which reflects the potential patterns of inter-procedural data interaction, thereby ensuring analysis efficiency. Afterward, filtering analysis simplifies the data graph based on the propagation properties of inter-procedural defects, thus ensuring analysis accuracy. Evaluation results suggest that both the static slicing tool WALA and the dynamic slicing tool Slicer4J yield several false positives, whereas <i>JDExtractor</i> successfully extracts defect-related methods and defect propagation paths with fewer false positives in a short time. Moreover, <i>JDExtractor</i> has been applied to open source projects on GitHub, ultimately extracting defect-related methods for 67 defects from 319 compiled open source applications.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Cancelation in Massive MIMO Wireless Communication Systems Using the Kronecker Product–Constrained Least-Mean-Square Algorithm and Adaptive Kalman Filtering 基于Kronecker积约束最小均方算法和自适应卡尔曼滤波的大规模MIMO无线通信系统干扰消除
IF 1.8 4区 计算机科学
International Journal of Communication Systems Pub Date : 2025-10-18 DOI: 10.1002/dac.70296
Neeraj Kumar, Priyesh Tiwari, Subodh Kumar Tripathi
{"title":"Interference Cancelation in Massive MIMO Wireless Communication Systems Using the Kronecker Product–Constrained Least-Mean-Square Algorithm and Adaptive Kalman Filtering","authors":"Neeraj Kumar,&nbsp;Priyesh Tiwari,&nbsp;Subodh Kumar Tripathi","doi":"10.1002/dac.70296","DOIUrl":"https://doi.org/10.1002/dac.70296","url":null,"abstract":"<div>\u0000 \u0000 <p>A wireless communication system relies on wireless technology to transmit and receive information over a distance without the need for physical connections such as cables or wires. However, interference poses a significant challenge in such systems, occurring when multiple transmitters and receivers operate in the same frequency band. This interference hampers communication efficiency and necessitates sophisticated signal-processing techniques for mitigation. Interference cancelation techniques, particularly in Massive MIMO wireless communication systems, play a crucial role in reducing the impact of interference caused by multiple transmissions from different users. This paper proposes the utilization of the Kronecker product-constrained least-mean-square (KCLMS) algorithm to nullify interference and employs the adaptive Kalman filtering approach to further minimize interference effects. Simulation results demonstrate that the proposed KCLMS + adaptive Kalman method achieves superior performance, with an RMSE of 0.045, PCC of 0.980, and SIR of 32.0 dB, outperforming transformer, DNN, CNN-LSTM, and traditional filtering methods. Additionally, it exhibits high performance-to-cost efficiency with moderate computational time (0.84 ms per iteration) and memory usage (13.5 MB), making it a practical solution for efficient, interference-resilient wireless communications. Performance validation is conducted using subjective tests, with evaluation metrics like Pearson correlation coefficient (PCC) and root mean square error (RMSE) to demonstrate the improved outcome. The proposed methodology aims to be beneficial for wireless networks providing communication services.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 17","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the role of search budgets in model-based software refactoring optimization 搜索预算在基于模型的软件重构优化中的作用
IF 3.1 2区 计算机科学
Automated Software Engineering Pub Date : 2025-10-18 DOI: 10.1007/s10515-025-00564-y
J. Andres Diaz-Pace, Daniele Di Pompeo, Michele Tucci
{"title":"On the role of search budgets in model-based software refactoring optimization","authors":"J. Andres Diaz-Pace,&nbsp;Daniele Di Pompeo,&nbsp;Michele Tucci","doi":"10.1007/s10515-025-00564-y","DOIUrl":"10.1007/s10515-025-00564-y","url":null,"abstract":"<div><p>Software model optimization is a process that automatically generates design alternatives aimed at improving quantifiable non-functional properties of software systems, such as performance and reliability. Multi-objective evolutionary algorithms effectively help designers identify trade-offs among the desired non-functional properties. To reduce the use of computational resources, this work examines the impact of implementing a search budget to limit the search for design alternatives. In particular, we analyze how time budgets affect the quality of Pareto fronts by utilizing quality indicators and exploring the structural features of the generated design alternatives. This study identifies distinct behavioral differences among evolutionary algorithms when a search budget is implemented. It further reveals that design alternatives generated under a budget are structurally different from those produced without one. Additionally, we offer recommendations for designers on selecting algorithms in relation to time constraints, thereby facilitating the effective application of automated refactoring to improve non-functional properties.</p></div>","PeriodicalId":55414,"journal":{"name":"Automated Software Engineering","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s10515-025-00564-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
M3IF-(SWT-TVC): Multi-Modal Medical Image Fusion via Weighted Energy, Contrast in the SWT Domain, and Total Variation Minimization With Chambolle's Algorithm M3IF-(SWT- tvc):基于加权能量、SWT域对比度和Chambolle算法的总变异最小化的多模态医学图像融合
IF 2.5 4区 计算机科学
International Journal of Imaging Systems and Technology Pub Date : 2025-10-18 DOI: 10.1002/ima.70222
Prabhishek Singh, Manoj Diwakar
{"title":"M3IF-(SWT-TVC): Multi-Modal Medical Image Fusion via Weighted Energy, Contrast in the SWT Domain, and Total Variation Minimization With Chambolle's Algorithm","authors":"Prabhishek Singh,&nbsp;Manoj Diwakar","doi":"10.1002/ima.70222","DOIUrl":"https://doi.org/10.1002/ima.70222","url":null,"abstract":"<div>\u0000 \u0000 <p>The multi-modal medical image fusion (M3IF) combines the required and important information from different medical imaging modalities (computed tomography [CT], magnetic resonance imaging (MRI), positron emission tomography [PET], and single photon emission computed tomography [SPECT]) to provide single informative image. M3IF provides enhanced patient diagnosis, and precise treatment planning. This paper proposes a hybrid <i>M3IF</i> where input medical images are decomposed using stationary wavelet transform (SWT) into low-frequency components (LFCs) and high-frequency components (HFCs). The LFCs and HFCs are fused using energy- and contrast-based metrics. And later reconstruction is performed using inverse SWT (ISWT). The total variation minimization (TVM) using Chambolle's algorithm is applied as a post-refinement operation to reduce noise and preserves the fine details. In this paper, the proposed methodology is termed as M3IF-(SWT-TVC), Here, the acronym TVC is the combination of TVM using Chambolle's algorithm. TVM refinement process is an iterative approach, with the fusion outcomes of M3IF-(SWT-TVC) assessed over a predefined 100 iterations. The TVM, and SWT are blended to balance smoothness and structural details. The final fusion results obtained through M3IF-(SWT-TVC) are evaluated against several prominent non-traditional methods. Based on both visual quality and quantitative metric analysis, it is observed that M3IF-(SWT-TVC) outperforms all the methods used for comparison.</p>\u0000 </div>","PeriodicalId":14027,"journal":{"name":"International Journal of Imaging Systems and Technology","volume":"35 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Robot Interaction: Integrating BCI-Controlled Virtual Robotic Arm With Manual Control in VR Environment 人机交互:虚拟现实环境中bci控制的虚拟机械臂与手动控制的集成
IF 1.7 4区 计算机科学
Computer Animation and Virtual Worlds Pub Date : 2025-10-18 DOI: 10.1002/cav.70072
Jian Teng, Sukyoung Cho, Shaw-mung Lee
{"title":"Human-Robot Interaction: Integrating BCI-Controlled Virtual Robotic Arm With Manual Control in VR Environment","authors":"Jian Teng,&nbsp;Sukyoung Cho,&nbsp;Shaw-mung Lee","doi":"10.1002/cav.70072","DOIUrl":"https://doi.org/10.1002/cav.70072","url":null,"abstract":"<div>\u0000 \u0000 <p>This study presents a novel tri-manual interaction framework that enables users to control two physical hands via VR controllers and a virtual robotic arm through a hybrid brain-computer interface (32-channel EEG and eye-tracking). The virtual robotic arm, implemented as a 6-DOF industrial manipulator in Unity, is controlled through simplified BCI commands: forward/backward movement along the z-axis based on motor imagery strength, with automatic grasping triggered by sustained attention thresholds. Twenty-five participants completed 30 trials, each following a 60-s protocol with five phases: rest, target presentation, preparation, execution, and feedback. Results demonstrated that the hybrid BCI system achieved superior performance compared to EEG-only control: 8.5% improvement in task success rate, 34.5% increase in positioning accuracy, and 46.2% reduction in cognitive load. The CNN-LSTM architecture achieved 86.3% motor imagery classification accuracy. Learning effects were observed within trials, with performance plateauing after 3.8 ± 0.7 attempts. Time-frequency analysis revealed hierarchical neural coordination mechanisms underlying the tri-manual control. This research validates the feasibility of augmented manipulation in virtual environments, establishing a foundation for advanced human-robot collaboration in animation and VR applications.</p>\u0000 </div>","PeriodicalId":50645,"journal":{"name":"Computer Animation and Virtual Worlds","volume":"36 5","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145317760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Threshold Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications 阈值签名的调查:NIST标准,后量子密码学,外来技术和现实世界的应用
IF 16.6 1区 计算机科学
ACM Computing Surveys Pub Date : 2025-10-18 DOI: 10.1145/3772274
Kiarash Sedghighadikolaei, Attila Altay Yavuz
{"title":"A Survey of Threshold Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications","authors":"Kiarash Sedghighadikolaei, Attila Altay Yavuz","doi":"10.1145/3772274","DOIUrl":"https://doi.org/10.1145/3772274","url":null,"abstract":"Threshold digital signatures enable a distributed execution of signature functionalities and will play a crucial role in the security of emerging decentralized next-generation networked systems and applications. In this paper, we provide a comprehensive and systematic survey of threshold and distributed signatures with advanced features. Our survey encompasses threshold signatures in conventional and post-quantum cryptography (PQC) settings and captures custom-design and standard signatures (e.g., conventional NIST and NIST-PQC). We examine both generic (via secure multi-party computation) and custom thresholding techniques for a myriad of signature families while investigating exotic signatures, real-life applications, and potential future research directions.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"16 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145314776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel coverage path planning method based on shrink-wrapping technique for autonomous inspection of complex structures using unmanned aerial vehicle 一种基于收缩包裹技术的无人机复杂结构自主检测覆盖路径规划方法
IF 10.4 1区 计算机科学
Robotics and Computer-integrated Manufacturing Pub Date : 2025-10-18 DOI: 10.1016/j.rcim.2025.103149
Burak Kaleci, Gulin Elibol Secil, Sezgin Secil, Zühal Kartal, Metin Ozkan
{"title":"A novel coverage path planning method based on shrink-wrapping technique for autonomous inspection of complex structures using unmanned aerial vehicle","authors":"Burak Kaleci, Gulin Elibol Secil, Sezgin Secil, Zühal Kartal, Metin Ozkan","doi":"10.1016/j.rcim.2025.103149","DOIUrl":"https://doi.org/10.1016/j.rcim.2025.103149","url":null,"abstract":"The inspection of large-scale structures can be challenging, time-consuming, costly, and dangerous. Autonomous robotic systems can provide an effective solution for performing such tasks by overcoming the negative aspects. In this paper, we present a novel coverage path planning method for complete sensor scanning of the outer surface of complex structures using an unmanned aerial vehicle (UAV) with a depth camera. The proposed method introduces a new approach by applying the shrink-wrapping technique to construct a 3D triangular mesh representing the structure's surface boundary. Viewpoints are then generated based on this mesh. Additionally, the triangles within the depth camera's field of view for each viewpoint are determined. The set covering problem (SCP) accepts the set of triangles covered by each viewpoint and reduces the number of viewpoints to decrease the flight distance and time. Finally, the coverage route that includes all the selected viewpoints is defined as the solution to the traveling salesman problem (TSP). We conduct extensive experiments to demonstrate the effectiveness of the proposed method across three different large-scale structures. The results show the validity and effectiveness of the proposed method.","PeriodicalId":21452,"journal":{"name":"Robotics and Computer-integrated Manufacturing","volume":"113 1 1","pages":""},"PeriodicalIF":10.4,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145314952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic review of semantic segmentation methods for histopathology images: a focused survey on breast, colon, and prostate cancers 组织病理学图像语义分割方法的系统回顾:对乳腺癌、结肠癌和前列腺癌的重点调查
IF 3.5 2区 计算机科学
Applied Intelligence Pub Date : 2025-10-18 DOI: 10.1007/s10489-025-06906-3
Danial Iqbal Tan Muhammad Hakimi Tan, Xiao Jian Tan, Li Li Lim, Khairul Shakir Ab Rahman, Joseph Jiun Wen Siet
{"title":"A systematic review of semantic segmentation methods for histopathology images: a focused survey on breast, colon, and prostate cancers","authors":"Danial Iqbal Tan Muhammad Hakimi Tan,&nbsp;Xiao Jian Tan,&nbsp;Li Li Lim,&nbsp;Khairul Shakir Ab Rahman,&nbsp;Joseph Jiun Wen Siet","doi":"10.1007/s10489-025-06906-3","DOIUrl":"10.1007/s10489-025-06906-3","url":null,"abstract":"<div><p>Cancer, a non-communicable disease in which abnormal cells grow uncontrollably, harms and disrupts normal body functions, often leading to severe health complications and, if untreated, can be fatal. Amongst the non-communicable cancers, breast, colon, and prostate cancer are found to be prevalent as one of the top-ranking cancers recognized by the World Health Organization (WHO). Semantic segmentation is one of the useful methods widely used in histopathology segmentation and was found superior typically in digital pathology for grading purposes. Here, this study aims to provide a comprehensive systematic review, offering a broad overview of different semantic segmentation methods, focusing on breast, colon, and prostate cancers by using histopathology images. This study is meant to review research articles from the past decade: 2015–2024 compliant with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guideline. Based on the proposed search strategy, a total of 43 articles were included for synthesis activity. The findings from this study reveal patterns, networks, relationships, and trends in the methods of semantic segmentation in breast, colon, and prostate cancers in the past decade. The findings of this study could be valuable for both the research community and medical service providers. They offer insights into the progress and trends of semantic segmentation in breast, colon, and prostate cancers over the past decade. At the same time, the study helps identify research gaps, potential markets, and key advantages, while also highlighting future possibilities. Ultimately, it contributes to ongoing research by either deepening or broadening the understanding of this important topic.</p></div>","PeriodicalId":8041,"journal":{"name":"Applied Intelligence","volume":"55 16","pages":""},"PeriodicalIF":3.5,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145316472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信