JP
J.A. Pouwelse
43 records found
1
Understanding the influence of DNA fragment lengths in detecting cancer
Detection of cancer using blood
Detecting cancer at an initial stage could change the course of the disease's development. A non-invasive examination consists of the liquid biopsy of blood, revealing biomarkers that could provide information about the existence of a tumour or not in the organism. The research t
...
Key Fragmentomics Features for Cancer Detection
An Analytical Approach to Identifying Essential Characteristics for Cancer Detection and Classification Using DNA Fragments from Blood Samples
Cancer represents a huge challenge in the medical world, necessitating early detection methods to improve treatment outcomes. The field of fragmentomics emerged as a promising option towards developing efficient non-invasive cancer diagnosis tools. By analysing the differences be
...
Quantifying complementarity between different cfDNA features
Detection of cancer using blood
Recent research has indicated attributes of cell-free DNA (cfDNA) called fragmentomics
as a promising method for late stage cancer detection in a non-invasive manner. The pri-
mary objective of this research is to uncover hidden patterns and interactions that could
en ...
as a promising method for late stage cancer detection in a non-invasive manner. The pri-
mary objective of this research is to uncover hidden patterns and interactions that could
en ...
Analysis of cell deconvolution methods
A comparison of reference-based and reference-free cell deconvolution
In recent years, a new way of cancer diagnostics has emerged, the analysis of DNA fragments circulating in the blood of cancer patients known as fragmentomics. This DNA, known as cell-free DNA (cfDNA), is an easily available biomarker for cell types. Deducing the tissue origin of
...
On-Device Split Inference for Edge Devices
A literature review
Nowadays, the popularity of machine learning and artificial intelligence algorithms is very high. A new research direction has emerged where the machine learning algorithms are executed on resource-constrained embedded devices. With the development of the Internet of Things parad
...
TinyML-Empowered Spectrum Sensing on Microcontrollers
A continuation of the Spectrum Painting method
Spectrum sensing is a vital technology for alleviating pressure on the radio spectrum and will become more sophisticated as billions more devices come online. In the future, more advanced techniques utilizing deep learning will sense which parts of the spectrum are available to c
...
Visible Light Positioning with TinyML
Improving Data Quality and Reducing Data Collection Effort
Visible light positioning (VLP) systems enable indoor positioning through a deployment of light-emitting diodes (LEDs) as transmitters and photodiodes (PDs) as receivers. A promising approach in VLP involves recording the received signal strength (RSS) to construct fingerprint sa
...
A Survey on Distributed Tiny Machine Learning
Exploring Techniques, Applications, Challenges, and Future Directions in Distributed Tiny Machine Learning
The explosive growth in data collection driven by the proliferation of interconnected devices necessitates novel approaches to data processing. Traditional centralised data processing methods are increasingly inadequate due to the sheer volume of data generated. Distributed Tiny
...
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic i
...
Byzantine consensus protocols are designed to build resilient systems to achieve consensus under Byzantine settings, maintaining safety guarantees under any network synchrony model and providing liveness in partially or fully synchronous networks.
However, several Byzantine c ...
However, several Byzantine c ...
Concurrency bugs are easy to introduce but dif- ficult to detect, especially in implementations of distributed algorithms where concurrency non- determinism is an inherent problem. These bugs may only be identified under very specific order- ings of execution events, making them
...
Concurrency Testing of PBFT
How do different exploration strategies perform for detecting concurrency bugs in PBFT?
Consensus algorithms, as well as distributed systems in general, are vulnerable to concurrency bugs due to non-determinism. Such bugs are hard to detect since it is necessary to test using a lot of different scenarios and even then, there is no guarantee to find one.
Co ...
Co ...
The testing of consensus systems has received growing attention and recent testing tools generate many faulty executions. However, there is a lack of methods that automatically analyze these outputs to identify the root causes of the bugs they found.
This paper presents Isola ...
This paper presents Isola ...
Due to trends such as the Internet of Things, there has been a growing number of devices that use wireless technologies for communication. This increase leads to bandwidth limitations that forced researchers to explore other types of wireless communication. One of these alternati
...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usage of third-party verified credentials bring us convenience in authentication. The Verifiable Credential (VC) data model is a new standard proposed by the W3C association to ease t
...
Dynamic programming languages (DPLs), such as Python and Ruby, are often used for their flexibility and fast development. The absence of static typing can lead to runtime exceptions and reduced program understandability. To overcome these problems, some DPLs have introduced optio
...
Microtask crowdsource workers are negatively influenced, mentally as well as physically, by the repetitive nature of the tasks they perform. Research is ongoing on whether using a gesture-based input technique could mitigate these negative effects. This paper identifies possible
...
Microtask crowdsourcing has grown in popularity in recent years. Microtasking is a form of crowdsourcing in which typically small, simple tasks are distributed over the Internet to a large number of people, also known as workers. Workers are highly susceptible to developing muscu
...
Researchers at the Delft University of Technology have developed Type4Py: a tool that uses Machine Learning to predict types for Python code. These predictions can be applied by developers to their python code to increase readability and can later be tested by a type-checker for
...
Microtask crowdsourcing workers, also known as crowd workers, perform small tasks known as microtasks.
These people use crowdsourcing platforms to complete these microtasks.
Crowd workers have to work in front of a screen to complete these microtasks, risking musculoskele ...
These people use crowdsourcing platforms to complete these microtasks.
Crowd workers have to work in front of a screen to complete these microtasks, risking musculoskele ...