In general, ophthalmologists visually grade the state of a patient by counting the cells within the anterior chamber OCT image. The manual cell counting method is highly inaccurate and spends a lot of time to determin...
详细信息
In this paper, we study acceleration methods for on-line stream mining of all frequent closed itemsets under a minimal-size restriction. The algorithm LC-K-CloStream [3] can perform an 6-approximation on-line mining b...
详细信息
ISBN:
(数字)9781728108582
ISBN:
(纸本)9781728108599
In this paper, we study acceleration methods for on-line stream mining of all frequent closed itemsets under a minimal-size restriction. The algorithm LC-K-CloStream [3] can perform an 6-approximation on-line mining based on incremental intersection of transactions. We first integrate LC-K-CloStream with an extended FP-tree with skipping in order to effectively compress a huge number of mined closed itemsets. Next, we introduce novel pruning methods for rejecting a hopeless intersection computation by using look-ahead maximal-size estimation. We show, through experimental evaluations, that the proposed methods have a great performance for mining a large set of closed itemsets in dense data sets.
Fuzzy C-means (FCM) is one of the image segmentation algorithms that has been widely used and proven to have good performance in image segmentation. This study aims to examine the effect of pre-processing stages on th...
详细信息
This research was conducted to classify the pathogen bacteria at the level of the genus of the bacterial image derived from the optical sensor system. The study focused on exploring bacterial patterns and classifying ...
详细信息
The main problem in using various watermarking methods to secure digital images is how to optimize the trade-off between robustness watermarked image against the effect of distortion and imperceptibility on watermark ...
详细信息
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic images. This method is widely used and continues to be developed to date, because of its advantages in steganographic image ...
详细信息
We introduce a goal-aware extension of responsibility-sensitive safety (RSS), a recent methodology for rule-based safety guarantee for automated driving systems (ADS). Making RSS rules guarantee goal achievement—in a...
详细信息
Static analyses aspire to explore all possible executions in order to achieve soundness. Yet, in practice, they fail to capture common dynamic behavior. Enhancing static analyses with dynamic information is a common p...
详细信息
Recently, researches on the intelligence of electric power facilities have been trying to apply artificial intelligence techniques as computer platforms have improved. In particular, faults occurring in substation sho...
详细信息
X-ray baggage security screening is widely used to maintain aviation and transport secure. Of particular interest is the focus on automated security X-ray analysis for particular classes of object such as electronics,...
详细信息
X-ray baggage security screening is widely used to maintain aviation and transport secure. Of particular interest is the focus on automated security X-ray analysis for particular classes of object such as electronics, electrical items and liquids. However, manual inspection of such items is challenging when dealing with potentially anomalous items. Here we present a dual convolutional neural network (CNN) architecture for automatic anomaly detection within complex security X-ray imagery. We leverage recent advances in region-based (R-CNN), mask-based CNN (Mask R-CNN) and detection architectures such as RetinaNet to provide object localisation variants for specific object classes of interest. Subsequently, leveraging a range of established CNN object and fine-grained category classification approaches we formulate within object anomaly detection as a two-class problem (anomalous or benign). Whilst the best performing object localisation method is able to perform with 97.9% mean average precision (mAP) over a six-class X-ray object detection problem, subsequent two-class anomaly/benign classification is able to achieve 66% performance for within object anomaly detection. Overall, this performance illustrates both the challenge and promise of object-wise anomaly detection within the context of cluttered X-ray security imagery.
暂无评论