The article presents the results of a study of the efficiency of various neural networks in the limited conditions of the source data and with a number of simple augmentations. In this case, the dependences were obtai...
详细信息
In architecture and engineering, the production of 3D models of various objects that are both simple and most closely related to reality is of particular importance. In this article, we are going to model different as...
详细信息
Food is the source of energy, and it plays a vital role in human existence. The quality of food is suffering day by day such as adulteration and heavy use of various pesticides. The traditional approach to analyze foo...
详细信息
Breast cancer is the second leading cause of cancer-related death after lung cancer in women. Early detection of breast cancer in X-ray mammography is believed to have effectively reduced the mortality rate since 1989...
详细信息
ISBN:
(纸本)9781728162157
Breast cancer is the second leading cause of cancer-related death after lung cancer in women. Early detection of breast cancer in X-ray mammography is believed to have effectively reduced the mortality rate since 1989. However, a relatively high false positive rate and a low specificity in mammography technology still exist. In this work, a computer-aided automatic mammogram analysis system is proposed to process the mammogram images and automatically discriminate them as either normal or cancerous, consisting of three consecutive imageprocessing, feature selection, and image classification stages. In designing the system, the discrete wavelet transforms (Daubechies 2, Daubechies 4, and Biorthogonal 6.8) and the Fourier cosine transform were first used to parse the mammogram images and extract statistical features. Then, an entropy-based feature selection method was implemented to reduce the number of features. Finally, different patternrecognition methods (including the Back-propagation Network, the Linear Discriminant Analysis, and the Naive Bayes Classifier) and a voting classification scheme were employed. The performance of each classification strategy was evaluated for sensitivity, specificity, and accuracy and for general performance using the Receiver Operating Curve. Our method is validated on the dataset from the Eastern Health in Newfoundland and Labrador of Canada. The experimental results demonstrated that the proposed automatic mammogram analysis system could effectively improve the classification performances.
The proceedings contain 23 papers. The special focus in this conference is on Computer Science, Electronics and Industrial Engineering. The topics include: Real-Time Hand Gesture recognition: A Long Short-Term Memory ...
ISBN:
(纸本)9783030336134
The proceedings contain 23 papers. The special focus in this conference is on Computer Science, Electronics and Industrial Engineering. The topics include: Real-Time Hand Gesture recognition: A Long Short-Term Memory Approach with Electromyography;development of a Fuzzy Logic-Based Solar Charge Controller for Charging Lead–Acid Batteries;enabling Electronic System for Emergency Alerts;evaluation of Internet of Things Protocols for Shopfloor Communication Integration;Embedded System for Hand Gesture recognition Using EMG Signals: Effect of Size in the Analysis Windows;A Novel Technique for Improving the Robustness to Sensor Rotation in Hand Gesture recognition Using sEMG;optimization of Motorcycle Assembly Processes Based on Lean Manufacturing Tools;a study on Modeling and Simulation of Automobile Painting Process Based on Flexsim;ergonomic Postural Evaluation System Through Non-invasive Sensors;semantic processing Method to Improve a Query-Based Approach for Mining Concept Maps;energy Supply of a Hybrid System of Biomass and Wind Turbines of the Pichacay Landfill Towards an Intelligent Network for the City of Cuenca-Ecuador;fractal Control Design with Anti-windup Effect for Optimal Operation of a Power Flyback Source;symptomatology of Musculoskeletal Pain Related to Repetitive Movements. Preliminary study "Post-harvest in Floriculture Companies";design of an Ergonomic Prototype for Physical Rehabilitation of People with Paraplegia;an Ontology-Based Data Management Model Applied to a Real Information System;image Analysis Based on Heterogeneous Architectures for Precision Agriculture: A Systematic Literature Review;educational Robot Using Lego Mindstorms and Mobile Device;use of E-learning and Audio-Lingual Method for the Development of Listening Comprehension Skills.
The proceedings contain 262 papers. The topics discussed include: spindle torus asymmetric key cryptosystem;solar photovoltaic array and zeta converter based water pumping system based on BLDC motor with torque ripple...
ISBN:
(纸本)9781728141428
The proceedings contain 262 papers. The topics discussed include: spindle torus asymmetric key cryptosystem;solar photovoltaic array and zeta converter based water pumping system based on BLDC motor with torque ripple compensation;spatial domain steganography techniques and neural network based steganalysis with differential storage;real time mold quality inspection in foundries using imageprocessing techniques;crop analysis and seed marketing using regression and association rules of India;PV integrated UPQC for sensitive load;machinelearning based analysis of sepsis : review;continuous integration and continuous deployment pipeline automation using Jenkins ansible;comparison of performance of parallel computation of CPU cores on CNN model;and ERPL: a language for structuring business processes in ERP Systems.
Braille books follow processes of deteriorations different from ordinary printed books because visually impaired people read the sharp dot with the finger's belly. In frequently read braille books, braille is dirt...
详细信息
ISBN:
(纸本)9783030212483;9783030212476
Braille books follow processes of deteriorations different from ordinary printed books because visually impaired people read the sharp dot with the finger's belly. In frequently read braille books, braille is dirty with aging, collapses, and holes open. Then, visually impaired people cannot read braille books. For braille books manually transcribed, the only method to republish them is to rebuild though the original is often and already disposed of. Now, we read degraded braille books with a scanner and restore them. In this paper, comparative experiments on what types of scanner are appropriate to successfully read degraded braille from old braille books are carried out. The candidates are two flatbed scanners, GT-S 650 and Plustek OpticBook 4800, and a stand scanner, ScanSnap SV600. Each scanner scans three types of braille papers, fresh books, used books and old books. Next, to recognize and identify dots in braille papers, we use two methods, the Haar classifier in OpenCV as imageprocessing function and the deep learning with Google's TensorFlow. For aiming at improving the recognition rate, we also use scanner options suitable for reading. Experimental results show that the flatbed scanner is suitable for reading.
This paper develops an algorithm that will help decipher the text in decrepit documents, which if put in simpler terms aims at converting stained, blotted, creased, and faded documents into a cleaner and legible forma...
详细信息
Wide series of forensic problems can be solved by detecting the camera model from copyright infringement to ownership attribution. There are many proposed methods for detection of the camera model. A method to identif...
详细信息
Adversarial images which can fool deep neural networks attract researchers' attentions to the security of machinelearning. In this paper, we employ a blind forensic method to detect adversarial images which are g...
详细信息
ISBN:
(纸本)9783030638320;9783030638337
Adversarial images which can fool deep neural networks attract researchers' attentions to the security of machinelearning. In this paper, we employ a blind forensic method to detect adversarial images which are generated by the gradient-based attacks including FGSM, BIM, RFGSM and PGD. Through analyzing adversarial images, we find out that the gradient-based attacks cause significant statistical changes in the image difference domain. Besides, the gradient-based attacks add different perturbations on R, G, B channels, which inevitably change the dependencies among R, G, B channels. To measure those dependencies, the 3rd-order co-occurrence is employed to construct the feature. Unlike previous works which extract the co-occurrence within each channel, we extract the co-occurrences across from the 1st-order difference of R, G, B channels to capture the inter dependence changes. Due to the shift of difference elements caused by attacks, some co-occurrence elements of the adversarial images have distinct larger values than those of legitimate images. Experimental results demonstrate that the proposed method performs stable for different attack types and different attack strength, and achieves detection accuracy up to 99.9% which exceeding state-of-the-art much.
暂无评论