Advanced search
Showing result 1 - 5 of 22 essays matching the above criteria.
-
1. Improving customer support efficiency through decision support powered by machine learning
University essay from Linköpings universitet/Programvara och systemAbstract : More and more aspects of today’s healthcare are becoming integrated with medical technology and dependent on medical IT systems, which consequently puts stricter re-quirements on the companies delivering these solutions. As a result, companies delivering medical technology solutions need to spend a lot of resources maintaining high-quality, responsive customer support. READ MORE
-
2. Using Generative Adversarial Networks for H&E-to-HER2 Stain Translation in Digital Pathology Images
University essay from Linköpings universitet/Institutionen för medicinsk teknikAbstract : In digital pathology, hematoxylin & eosin (H&E) is a routine stain which is performed on most clinical cases and it often provides clinicians with sufficient information for diagnosis. However, when making decisions on how to guide breast cancer treatment, immunohistochemical staining of human epidermal growth factor 2 (HER2 staining) is also needed. READ MORE
-
3. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE
-
4. Image Similarity Scoring for Medical Images in 3D
University essay from Linköpings universitet/DatorseendeAbstract : Radiologists often have to look through many different patients and examinations in quick succession, and to aid in the workflow the different types of images should be presented for the radiologist in the same manner and order between each new examination. Thus decreasing the time needed for the radiologist to either find the correct image or rearrange the images to their liking. READ MORE
-
5. Tamper Protection for Cryptographic Hardware : A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys
University essay from Linköpings universitet/InformationskodningAbstract : This master's thesis was conducted at Sectra Communications AB, where the aim of the thesis was to investigate the state of the art of physical hardware tampering attacks and corresponding protections and mitigations, and finally combining this to a protection model that conforms to the FIPS 140-2 standard. The methods used to investigate and evaluate the different attacks were literature searching, looking for articles presenting different attacks that have been used against real targets, and attacks that there are no records of being attempted on a real target, but are theoretically possible. READ MORE