Early detection methods for cognitive impairment are crucial for its effective treatment. Dual-task-based pipelines that rely on skeleton sequences can detect cognitive impairment reliably. Although such pipelines ach...
详细信息
Early detection methods for cognitive impairment are crucial for its effective treatment. Dual-task-based pipelines that rely on skeleton sequences can detect cognitive impairment reliably. Although such pipelines achieve state-of-the-art results by analyzing skeleton sequences of periodic stepping motion, we propose that their performance can be improved by decomposing the skeleton sequence into representative phase-aligned periods and focusing on them instead of the entire sequence. We present the phase-aligned periodic graph convolutional network, which is capable of processing phase-aligned periodic skeleton sequences. We trained it with a cross-modality feature fusion loss using a representative dataset of 392 samples annotated by medical professionals. As part of a dual-task cognitive impairment detection pipeline that relies on two-dimensional skeleton sequences extracted from RGB images to improve its general usability, our proposed method outperformed existing approaches and achieved a mean sensitivity of 0.9231 and specificity of 0.9398 in a four-fold cross-validation setup.
The CoronaVirus Disease of 2019 (COVID19) pandemic poses a significant global challenge, with millions affected and millions of lives lost. This study presents a privacy-conscious technique to early identification of ...
详细信息
The CoronaVirus Disease of 2019 (COVID19) pandemic poses a significant global challenge, with millions affected and millions of lives lost. This study presents a privacy-conscious technique to early identification of COVID19 using breathing sounds and chest X-ray images. Using Blockchain and optimized neural networks, the suggested solution provides data confidentiality and accuracy. Chest X-ray pictures are preprocessed, segmented, and feature extracted using modern algorithms. Breathing sounds are treated simultaneously using tri-gaussian filters and mel frequency cepstral coefficient features. A progressive split deformable field fusion module combines audio and visual characteristics. The proposed Dual Sampling dilated Pre-activation residual Attention convolution Neural Network (DSPANN) improves classification accuracy while decreasing computational complexity using augmented snake optimization. Furthermore, a privacy-focused blockchain-based encrypted crypto hash federated method is used for safe global model training. This complete method overcomes COVID-19 detection issues while simultaneously prioritizing data privacy in healthcare applications. The proposed framework exhibited recognition accuracy rates of 98%, specificity of 97.02%, and sensitivity of 98%.
The significant losses that banks and other financial organizations suffered due to new bank account (NBA) fraud are alarming as the number of online banking service users increases. The inherent skewness and rarity o...
详细信息
The significant losses that banks and other financial organizations suffered due to new bank account (NBA) fraud are alarming as the number of online banking service users increases. The inherent skewness and rarity of NBA fraud instances have been a major challenge to the machine learning (ML) models and happen when non-fraud instances outweigh the fraud instances, which leads the ML models to overlook and erroneously consider fraud as non-fraud instances. Such errors can erode the confidence and trust of customers. Existing studies consider fraud patterns instead of potential losses of NBA fraud risk features while addressing the skewness of fraud datasets. The detection of NBA fraud is proposed in this research within the context of value-at-risk as a risk measure that considers fraud instances as a worst-case scenario. Value-at-risk uses historical simulation to estimate potential losses of risk features and model them as a skewed tail distribution. The risk-return features obtained from value-at-risk were classified using ML on the bank account fraud (BAF) Dataset. The value-at-risk handles the fraud skewness using an adjustable threshold probability range to attach weight to the skewed NBA fraud instances. A novel detection rate (DT) metric that considers risk fraud features was used to measure the performance of the fraud detection model. An improved fraud detection model is achieved using a K-nearest neighbor with a true positive (TP) rate of 0.95 and a DT rate of 0.9406. Under an acceptable loss tolerance in the banking sector, value-at-risk presents an intelligent approach for establishing data-driven criteria for fraud risk management.
In this paper, a general recursive least square (GRLS) detection algorithm is proposed for the uplink of distributed massive multiple-input multiple-output (MIMO) to alleviate the bottlenecks in both computational com...
详细信息
In this paper, a general recursive least square (GRLS) detection algorithm is proposed for the uplink of distributed massive multiple-input multiple-output (MIMO) to alleviate the bottlenecks in both computational complexity and data bandwidth for interconnection. Different from the existing recursive least square (RLS) detection algorithm which only supports a single antenna in each distributed unit (DU), the proposed GRLS allows for multiple antennas in each DU, rendering it adaptable to a variety of practical scenarios. Moreover, among the total C DUs and with an integer parameter C-0, the computational complexity of C-C-0 DUs in GRLS can be significantly reduced by leveraging the channel hardening property. Through analysis, we demonstrate that the convergence of the GRLS algorithm is guaranteed if C-0 >= [ ( root B / 2 + root K )(2) / B ] holds, where K and B denote the numbers of antennas at the user side and each DU, respectively. Furthermore, based on the daisy-chain architecture, the proposed GRLS algorithm also enjoys excellent scalability, which can be easily extended with extra DUs for further improvement. Finally, the detection complexity and data bandwidth analysis are also provided to unveil the superiority of GRLS compared to other distributed detection schemes for massive MIMO.
Defense against adversarial attacks is critical for the reliability and safety of deep neural networks (DNNs). Current state-of-the-art defense methods achieve significant robustness against adversarial attacks. Howev...
详细信息
Defense against adversarial attacks is critical for the reliability and safety of deep neural networks (DNNs). Current state-of-the-art defense methods achieve significant robustness against adversarial attacks. However, such defense methods cannot distinguish between adversarial examples (AEs) and normal examples (NEs). Thus, they apply the same defense process for both examples to perform classification, resulting in performance degradation for NEs. In this paper, we propose a novel defense method based on the student-teacher framework that can minimize the classification performance degradation for NEs by detecting AEs and then applying the defense process only to AEs. Focusing on the fact that distortion in the hidden layer features is inevitable for the success of adversarial attacks, we train the student network to predict the undistorted hidden layer features of the teacher network (target DNN). Therefore, our method can detect AEs through the difference in the hidden layer features between the student and teacher network, and then recover the classification result of AEs using the penultimate layer features predicted by the student network. Through extensive experiments on representative image classification benchmark datasets, i.e., CIFAR-10, CIFAR-100, and TinyImagenet, we demonstrate the superiority of our method in both detection and defense compared with state-of-the-art methods. Furthermore, we show that our method achieves robust detection and defense performance for a fully white-box attack that assumes an attacker knows the information of our entire detection and defense mechanism.
The long-distance detection of the presence of elephants is pivotal to addressing the human-elephant conflict. IoT-based solutions utilizing seismic signals originating from the movement of elephants are a novel appro...
详细信息
The long-distance detection of the presence of elephants is pivotal to addressing the human-elephant conflict. IoT-based solutions utilizing seismic signals originating from the movement of elephants are a novel approach to solving this problem. This study introduces an instrumentation system comprising a specially designed geophone-sensor interface for non-invasive, long-range elephant detection using seismic waves while minimizing the vulnerability of seismic signals to noise. The geophone-sensor interface involves a cascade array of an instrumentation amplifier, a second-order Butterworth filter for signal filtering, and a signal amplifier. The introduced geophone-sensor interface was tested under laboratory conditions, and then real-world experiments were carried out for tamed, partly tamed, and untamed elephants. The experimental results reveal that the system remains stable within the tested frequency range from 1 Hz to 1 kHz and the temperature range of 10 degrees C to 40 degrees C. The system successfully captured the seismic signals generated by the footfalls of elephants within a maximum detection range of 155.6 m, with an overall detection accuracy of 99.5%.
This study researches the usage of YOLOv4 for real-time loose fruit detection in oil palm plantations as the first step in implementing automation in the collection of loose fruits. Our system leverages high-resolutio...
详细信息
This study researches the usage of YOLOv4 for real-time loose fruit detection in oil palm plantations as the first step in implementing automation in the collection of loose fruits. Our system leverages high-resolution video data (4K and 1080p) from various plantation settings. To address the challenges of detecting small and numerous loose fruits, we introduced an image preprocessing technique called "image tiling" into the vision system workflow. We studied the effects this has on the performance of the detection model. This involves slicing the image into smaller sections (i.e., tiles) for individual processing by YOLOv4 and YOLOv4-tiny models, enhancing detection accuracy. Refined models (YOLOv4-tiling and YOLOv4-tiny-tiling) are then evaluated. YOLOv4 achieved the highest precision (97%) and F1-score (86.3%), while YOLOv4-tiling offered a slight improvement in recall (80.8%). Notably, YOLOv4-tiny, initially underperforming (precision: 37.2%, recall: 20.9%, F1-score: 25%), showed significant improvement with tiling (precision: 90.5%, recall: 67.1%, F1-score: 73.8%). Also, replacing the SPP layer in YOLOv4 with SPP-Fast resulted in increased precision (92.6%) and a significantly improved F1 score of 91.4%. This vision system was then integrated with a custom-designed Loose Fruit Collector Robot through the Robot Operating System (ROS).
To enhance their company operations, organizations within the industry leverage the ecosystem of big data to manage vast volumes of information effectively. To achieve this objective, it is imperative to analyze textu...
详细信息
To enhance their company operations, organizations within the industry leverage the ecosystem of big data to manage vast volumes of information effectively. To achieve this objective, it is imperative to analyze textual data while prioritizing the safeguarding of data integrity and implementing robust measures for organizing and validating data through the utilization of spam filters. Various methodologies can be employed, including Word2Vec, bag-of-words, BERT, as well as term frequency & reciprocal document frequency (TF-IDF). Nevertheless, none of these solutions effectively address the problem of data scarcity, which might lead to the existence of missing information in the collected documents. To properly address this problem, it is necessary to employ a strategy that categorizes each document based on the topic matter and uses statistical approaches for approximation. This research paper presents a novel approach for spam detection using natural language processing. The proposed strategy utilizes a least-squares model to modify themes and incorporates gradient descent and altering least-squares (i.e., AMALS) models for estimating missing data. TF-IDF and uniform-distribution methods perform the estimation. The performance evaluation reveals that the suggested technique exhibits a superior performance of 98% compared to the existing industry TF-IDF model in accurately predicting spam within big data ecosystems. By this model, the environment of an organization or a company can be saved from spamming or other attacks, which can lead to extracting their data for unauthorized users to protect the details.
The security of Industrial Supply Chain (ISC) has emerged through the integration of Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves effectively protecting IIoT systems from ...
详细信息
The security of Industrial Supply Chain (ISC) has emerged through the integration of Industrial Internet of Things (IIoT) and Blockchain (BC) technology. This new era involves effectively protecting IIoT systems from various threats and ensuring their smooth operation and resilience against potential cyber-attacks. Within the ISC ecosystem, combining machine learning (ML)-based security models for cyber-attack detection can play a crucial role in enhancing the ISC security and proactively identifying potential threats. This paper presents a BC-enabled ISC that embed ML security model integrated within a multi-layered approach. We conducted a comparative study and performance analysis of several ML classification techniques, with a focus on supervised methods to identify the lightweight model for cyber-attack detection suitable for deployment in resource-constrained IIoT environment. We investigate the performance of Gaussian Naive Bayes (NB), K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), and three ensemble techniques, namely Bagging, Stacking, and Boosting. The study employs the WUSTL-IIOT-2021 imbalanced dataset, which contains samples representing four types of attacks, including denial of service (DoS), SQL injection, reconnaissance, and backdoor. The paper addresses the imbalance in class representation by customizing the dataset for training and testing the ML models. Both Mutual Information (MI) and Extra-trees (ET) are applied as a one-stage ensemble feature selection. The performance of the ML models are investigated using classification accuracy (Acc), precision, recall, F1 score, Matthews correlation coefficient (MCC), model size (Mem), training time (TT) and prediction time (PT).
Brain hemorrhage refers to a potentially fatal medical disorder that affects millions of individuals. The percentage of patients who survive can be significantly raised with the prompt identification of brain hemorrha...
详细信息
Brain hemorrhage refers to a potentially fatal medical disorder that affects millions of individuals. The percentage of patients who survive can be significantly raised with the prompt identification of brain hemorrhages, due to image-guided radiography, which has emerged as the predominant treatment modality in clinical practice. A Computed Tomography Image has frequently been employed for the purpose of identifying and diagnosing neurological disorders. The manual identification of anomalies in the brain region from the Computed Tomography Image demands the radiologist to devote a greater amount of time and dedication. In the most recent studies, a variety of techniques rooted in Deep learning and traditional Machine Learning have been introduced with the purpose of promptly and reliably detecting and classifying brain hemorrhage. This overview provides a comprehensive analysis of the surveys that have been conducted by utilizing Machine Learning and Deep Learning. This research focuses on the main stages of brain hemorrhage, which involve preprocessing, feature extraction, and classification, as well as their findings and limitations. Moreover, this in-depth analysis provides a description of the existing benchmark datasets that are utilized for the analysis of the detection process. A detailed comparison of performances is analyzed. Moreover, this paper addresses some aspects of the above-mentioned technique and provides insights into prospective possibilities for future research.
暂无评论