Foot ulcer is a common complication of diabetes mellitus and, associated with substantial morbidity and mortality, remains a major risk factor for lower leg amputations. Extracting accurate morphological features from...
详细信息
ISBN:
(数字)9781665490627
ISBN:
(纸本)9781665490627
Foot ulcer is a common complication of diabetes mellitus and, associated with substantial morbidity and mortality, remains a major risk factor for lower leg amputations. Extracting accurate morphological features from foot wounds is crucial for appropriate treatment. Although visual inspection by a medical professional is the common approach for diagnosis, this is subjective and error-prone, and computer-aided approaches thus provide an interesting alternative. Deep learning-based methods, and in particular convolutional neural networks (CNNs), have shown excellent performance for various tasks in medical image analysis including medical image segmentation. In this paper, we propose an ensemble approach based on two encoder-decoder-based CNN models, namely LinkNet and U-Net, to perform foot ulcer segmentation. To deal with a limited number of available training samples, we use pretrained weights (EfficientNetB1 for the LinkNet model and EfficientNetB2 for the U-Net model) and perform further pre-training using the Medetec dataset while also applying a number of morphological-based and colour-based augmentation techniques. To boost the segmentation performance, we incorporate five-fold cross-validation, test time augmentation and result fusion. Applied on the publicly available chronic wound dataset and the MICCAI 2021 Foot Ulcer Segmentation (FUSeg) Challenge, our method achieves state-of-the-art performance with data-based Dice scores of 92.07% and 88.80%, respectively, and is the top ranked method in the FUSeg challenge leaderboard. The Dockerised guidelines, inference codes and saved trained models are publicly available at https://***/masih4/Foot Ulcer Segmentation.
Augmented Reality is becoming a fundamental technique to provide an easy access to additional information directly from the surrounding environment. It is however crucial that the mean through which the information is...
详细信息
The highly individualized production processes for long products in the steel industry is subject to a variety of influencing variables with mutual interactions in a complex manner. To handle this complexity, modern d...
详细信息
The highly individualized production processes for long products in the steel industry is subject to a variety of influencing variables with mutual interactions in a complex manner. To handle this complexity, modern datamining methods can be used for a highly efficient analysis of process data, to detect process anomalies in the process data, e.g. from rolling mills by statistical patternrecognition. This paper proposes a data-based strategy for detecting process anomalies within a hot rolling mill for long products. Suitable data are identified and selected from existing sensors and processed within a new database. This central database is used to train classification algorithms. The reliability of two prominent classifiers based on Principal Component Analysis (PCA) and One-Class Support Vector machines (OC-SVM) has been evaluated. From the comparison in this respective use case, it has been concluded that satisfying results can be obtained, but PCA is highly dependent on the data distribution. The OC-SVM has also been implemented and tested and offers advantages when the data sets have a more complex distribution. Copyright (c) 2022 The Authors. This is an open access article under the CC BY-NC-ND license (https://***/licenses/by-nc-nd/4.0/)
The proceedings contain 8 papers. The topics discussed include: a new framework to automate constrained microaggregation;record linkage performance for large data sets;SAX: a privacy preserving general pupose method a...
ISBN:
(纸本)9781605588049
The proceedings contain 8 papers. The topics discussed include: a new framework to automate constrained microaggregation;record linkage performance for large data sets;SAX: a privacy preserving general pupose method applied to detection of intrusions;applying differential privacy to search queries in a policy based interactive framework;weighted network decapitation: the economics of iterated attack and defense;incremental privacy preservation for associative classification;a novel approach for privacy mining of generic basic association rules;and on privacy preservation in text and document-based active learning for named entity recognition.
The Scaffolded Sound Beehive is an immersive multi-media installation which provides viewers an artistic visual and audio experience of activities in a beehive. data were recorded in urban beehives and processed using...
详细信息
ISBN:
(纸本)9781577357384
The Scaffolded Sound Beehive is an immersive multi-media installation which provides viewers an artistic visual and audio experience of activities in a beehive. data were recorded in urban beehives and processed using sophisticated patternrecognition, AI technologies, and sonification and computer graphics software. The installation includes an experiment in using Deep learning to interpret the activities in the hive based on sound and micro-climate recording.
In this paper our main focus is to discover different machinelearning techniques that are useful biometric System. As biometric authentication system is a combination of both image processing and patternrecognition,...
详细信息
We consider the setting of lazy random graph walks over directed graphs, where entities are represented as nodes and typed edges represent the relations between them. This framework has been used in a variety of probl...
详细信息
ISBN:
(纸本)9781595938480
We consider the setting of lazy random graph walks over directed graphs, where entities are represented as nodes and typed edges represent the relations between them. This framework has been used in a variety of problems to derive an extended measure of entity similarity. In this paper we contrast two different approaches for applying supervised learning in this framework to improve graph walk performance: a gradient descent algorithm that tunes the transition probabilities of the graph, and a reranking approach that uses features describing global properties of the traversed paths. An empirical evaluation on a set of tasks from the domain of personal information management and multiple corpora show that reranking performance is usually superior to the local gradient descent algorithm, and that the methods often yield best results when combined. Copyright 2007 ACM.
In this paper, we propose a fuzzy extension to proximal support vector classification via generalized eigenvalues. Here, a fuzzy membership value is assigned to each pattern, and points are classified by assigning the...
详细信息
ISBN:
(纸本)3540305068
In this paper, we propose a fuzzy extension to proximal support vector classification via generalized eigenvalues. Here, a fuzzy membership value is assigned to each pattern, and points are classified by assigning them to the nearest of two non parallel planes that are close to their respective classes. The algorithm is simple as the solution requires solving a generalized eigenvalue problem as compared to SVMs, where the classifier is obtained by solving a quadratic programming problem. The approach can be used to obtain an improved classification when one has an estimate of the fuzziness of samples in either class.
The proceedings contain 71 papers. The topics discussed include: soft computing algorithms applied to the segmentation of nerve cell images;patternrecognition based on time-frequency distributions of radar micro-Dopp...
详细信息
ISBN:
(纸本)0769522947
The proceedings contain 71 papers. The topics discussed include: soft computing algorithms applied to the segmentation of nerve cell images;patternrecognition based on time-frequency distributions of radar micro-Doppler dynamics;a quantitative software quality evaluation model for the artifacts of component based development;a new approach to software requirements elicitation;using datamining technology to design an intelligent CIM system for IC manufacturing;datamining for imprecise temporal associations;analysis of breast cancer using datamining and statistical techniques;analyzing the conditions of coupling existence based on program slicing and some abstract information-flow;a study of model layers and reflection;a general scalable implementation of fast matrix multiplication algorithms on distributed memory computers;error prediction for multi-classification;an integer support vector machine;and layered neural networks computations.
The understandability, maintainability, and reusability of object-oriented programs could be improved by automatically detecting well-known design patterns in programs. Many existing detection techniques are based on ...
详细信息
The understandability, maintainability, and reusability of object-oriented programs could be improved by automatically detecting well-known design patterns in programs. Many existing detection techniques are based on static analysis and use strict conditions composed of class structure data. Hence, it is difficult for them to detect design patterns in which the class structures are similar. Moreover, it is difficult for them to deal with diversity in design pattern applications. We propose a design pattern detection technique using metrics and machinelearning. Our technique judges candidates for the roles that compose the design patterns by using machinelearning and measurements of metrics, and it detects design patterns by analyzing the relations between candidates. It suppresses false negatives and distinguishes patterns in which the class structures are similar. We conducted experiments that showed that our technique was more accurate than two previous techniques.
暂无评论