-
SAGE: Sequential Attribute Generator for Analyzing Glioblastomas using Limited Dataset
Authors:
Padmaja Jonnalagedda,
Brent Weinberg,
Jason Allen,
Taejin L. Min,
Shiv Bhanu,
Bir Bhanu
Abstract:
While deep learning approaches have shown remarkable performance in many imaging tasks, most of these methods rely on availability of large quantities of data. Medical image data, however, is scarce and fragmented. Generative Adversarial Networks (GANs) have recently been very effective in handling such datasets by generating more data. If the datasets are very small, however, GANs cannot learn th…
▽ More
While deep learning approaches have shown remarkable performance in many imaging tasks, most of these methods rely on availability of large quantities of data. Medical image data, however, is scarce and fragmented. Generative Adversarial Networks (GANs) have recently been very effective in handling such datasets by generating more data. If the datasets are very small, however, GANs cannot learn the data distribution properly, resulting in less diverse or low-quality results. One such limited dataset is that for the concurrent gain of 19 and 20 chromosomes (19/20 co-gain), a mutation with positive prognostic value in Glioblastomas (GBM). In this paper, we detect imaging biomarkers for the mutation to streamline the extensive and invasive prognosis pipeline. Since this mutation is relatively rare, i.e. small dataset, we propose a novel generative framework - the Sequential Attribute GEnerator (SAGE), that generates detailed tumor imaging features while learning from a limited dataset. Experiments show that not only does SAGE generate high quality tumors when compared to standard Deep Convolutional GAN (DC-GAN) and Wasserstein GAN with Gradient Penalty (WGAN-GP), it also captures the imaging biomarkers accurately.
△ Less
Submitted 3 June, 2022; v1 submitted 14 May, 2020;
originally announced May 2020.
-
Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
Authors:
Kamlesh Kumar Hingwe,
S. Mary Saira Bhanu
Abstract:
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on untrusted server. The access control mechanism can restrict users from unauthorized access, but in cloud environment access control policies are…
▽ More
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on untrusted server. The access control mechanism can restrict users from unauthorized access, but in cloud environment access control policies are more flexible. However, an attacker can gather sensitive information for a malicious purpose by abusing the privileges as another user and so database security is compromised. The other problems associated with the DBaaS are to manage role hierarchy and secure session management for query transaction in the database. In this paper, a role-based access control for the multitenant database with role hierarchy is proposed. The query is granted with least access privileges, and a session key is used for session management. The proposed work protects data from privilege escalation and SQL injection. It uses the partial homomorphic encryption (Paillier Encryption) for the encrypting the sensitive data. If a query is to perform any operation on sensitive data, then extra permissions are required for accessing sensitive data. Data confidentiality and integrity are achieved using the role-based access control with partial homomorphic encryption.
△ Less
Submitted 1 March, 2016;
originally announced March 2016.
-
Effective Bandwidth Utilization in IEEE802.11 for VOIP
Authors:
S. Vijay Bhanu,
RM. Chandrasekaran,
V. Balakrishnan
Abstract:
Voice over Internet protocol (VoIP) is one of the most important applications for the IEEE 802.11 wireless local area networks (WLANs). For network planners who are deploying VoIP over WLANs, one of the important issues is the VoIP capacity. VoIP bandwidth consumption over a WAN is one of the most important factors to consider when building a VoIP infrastructure. Failure to account for VoIP bandwi…
▽ More
Voice over Internet protocol (VoIP) is one of the most important applications for the IEEE 802.11 wireless local area networks (WLANs). For network planners who are deploying VoIP over WLANs, one of the important issues is the VoIP capacity. VoIP bandwidth consumption over a WAN is one of the most important factors to consider when building a VoIP infrastructure. Failure to account for VoIP bandwidth requirements will severely limit the reliability of a VoIP system and place a huge burden on the WAN infrastructure. Less bandwidth utilization is the key reasons for reduced number of channel accesses in VOIP. But in the QoS point of view the free bandwidth of atleast 1-5% will improve the voice quality. This proposal utilizes the maximum bandwidth by leaving 1-5% free bandwidth. A Bandwidth Data rate Moderation (BDM) algorithm has been proposed which correlates the data rate specified in IEEE802.11b with the free bandwidth. At each time BDM will calculate the bandwidth utilization before sending the packet to improve performance and voice quality of VoIP. The bandwidth calculation in BDM can be done by using Erlang and VOIP bandwidth calculator. Finally, ns2 experimental study shows the relationship between bandwidth utilization, free bandwidth and data rate. The paper concludes that marginal VoIP call rate has been increased by BDM algorithm.
△ Less
Submitted 6 May, 2010;
originally announced May 2010.