IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Mammogram image segmentation using rough clusteringeSAT Journals
This document discusses using rough clustering algorithms for mammogram image segmentation. It proposes using Rough K-Means clustering on Haralick texture features extracted from mammogram images. The Rough K-Means algorithm is compared to traditional K-Means and Fuzzy C-Means using metrics like mean square error and root mean square error. Preliminary results found that Rough K-Means produced better segmentation results than the other methods. The document provides background on rough set theory, image segmentation, feature extraction, and different clustering algorithms that can be used.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Development and Comparison of Image Fusion Techniques for CT&MRI ImagesIJERA Editor
Image processing techniques primarily focus upon enhancing the quality of an image or a set ofimages to derive
the maximum information from them. Image Fusion is a technique of producing a superior quality image from a
set of available images. It is the process of combining relevant information from two or more images into a
single image wherein the resulting image will be more informative and complete than any of the input images. A
lot of research is being done in this field encompassing areas of Computer Vision, Automatic object detection,
Image processing, parallel and distributed processing, Robotics and remote sensing. This project paves way to
explain the theoretical and implementation issues of seven image fusion algorithms and the experimental results
of the same. The fusion algorithms would be assessed based on the study and development of some image
quality metrics
An artificial neural network approach for detecting skin cancerTELKOMNIKA JOURNAL
This study aims to present diagnose of melanoma skin cancer at an early stage. It applies feature
extraction method of the first order for feature extraction based on texture in order to get high degree of
accuracy with method of classification using artificial neural network (ANN). The method used is training
and testing phases with classification of Multilayer Perceptron (MLP) neural network. The results showed
that the accuracy of test image with 4 sets of training for image not suspected of melanoma and melanoma
with the lowest accuracy of 80% and the highest accuracy of 88.88%, respectively. The 4 sets of training
used consisted of 23 images. Of the 23 images used as a training consisted of 6 as not suspected of
melanoma images and 17 as suspected melanoma images.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Credal Fusion of Classifications for Noisy and Uncertain DataIJECEIAES
This paper reports on an investigation in classification technique employed to classify noised and uncertain data. However, classification is not an easy task. It is a significant challenge to discover knowledge from uncertain data. In fact, we can find many problems. More time we don’t have a good or a big learning database for supervised classification. Also, when training data contains noise or missing values, classification accuracy will be affected dramatically. So to extract groups from data is not easy to do. They are overlapped and not very separated from each other. Another problem which can be cited here is the uncertainty due to measuring devices. Consequentially classification model is not so robust and strong to classify new objects. In this work, we present a novel classification algorithm to cover these problems. We materialize our main idea by using belief function theory to do combination between classification and clustering. This theory treats very well imprecision and uncertainty linked to classification. Experimental results show that our approach has ability to significantly improve the quality of classification of generic database.
During seizures, different types of communication between different parts of the brain are characterized by many state of the art connectivity measures. We propose to employ a set of undirected (spectral matrix, the inverse of the spectral matrix, coherence, partial coherence, and phase-locking value) and directed features (directed coherence, the partial directed coherence) to detect seizures using a deep neural network. Taking our data as a sequence of ten sub-windows, an optimal deep sequence learning architecture using attention, CNN, BiLstm, and fully connected neural networks is designed to output the detection label and the relevance of the features. The relevance is computed using the weights of the model in the activation values of the receptive fields at a particular layer. The best model resulted in 97.03% accuracy using balanced MIT-BIH data subset. Finally, an analysis of the relevance of the features is reported.
Geometric Correction for Braille Document Images csandit
Image processing is an important research area in computer vision. clustering is an unsupervised
study. clustering can also be used for image segmentation. there exist so many methods for image
segmentation. image segmentation plays an important role in image analysis.it is one of the first
and the most important tasks in image analysis and computer vision. this proposed system
presents a variation of fuzzy c-means algorithm that provides image clustering. the kernel fuzzy
c-means clustering algorithm (kfcm) is derived from the fuzzy c-means clustering
algorithm(fcm).the kfcm algorithm that provides image clustering and improves accuracy
significantly compared with classical fuzzy c-means algorithm. the new algorithm is called
gaussian kernel based fuzzy c-means clustering algorithm (gkfcm)the major characteristic of
gkfcm is the use of a fuzzy clustering approach ,aiming to guarantee noise insensitiveness and
image detail preservation.. the objective of the work is to cluster the low intensity in homogeneity
area from the noisy images, using the clustering method, segmenting that portion separately using
content level set approach. the purpose of designing this system is to produce better segmentation
results for images corrupted by noise, so that it can be useful in various fields like medical image
analysis, such as tumor detection, study of anatomical structure, and treatment planning.
This summary provides the key details from the document in 3 sentences:
The document discusses optimizing the parameters of an artificial neural network (ANN) model for predicting schizophrenia. It explores different numbers of hidden layers, epochs, and fold units to determine the configuration that results in the highest training accuracy and lowest error. The optimal parameters were found to be 8 hidden layers, 2 fold units, and up to 1000 epochs, achieving a peak training accuracy of 71.34% and prediction accuracy of 74.53%.
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENTpharmaindexing
The document discusses several methods for image enhancement using histogram equalization. It begins with an introduction to histogram equalization and its use in increasing image quality and local contrast. It then reviews three existing histogram equalization methods - Bi-Histogram Equalization with Neighborhood Metrics, Class-Based Parametric Approximation to Histogram Equalization, and Texture Enhanced Histogram Equalization Using TV-L1 Image Decomposition. Each aimed to improve on traditional histogram equalization by addressing issues like maintaining brightness, preserving local information, and avoiding intensity saturation artifacts. The document concludes that variational approaches like TV-L1 decomposition have potential to outperform conventional histogram equalization methods for contrast enhancement.
A review deep learning for medical image segmentation using multi modality fu...Aykut DİKER
This paper reviews deep learning approaches for medical image segmentation using multi-modality fusion. It finds that the number of papers on this topic has increased significantly in recent years, as deep learning methods have achieved superior performance over traditional methods. The paper categorizes fusion strategies as early fusion, where modalities are combined before network processing, and late fusion, where each modality is processed separately before fusion. While early fusion is simpler, late fusion can achieve more accurate results by learning complex relationships between modalities. Overall, the paper aims to provide an overview of deep learning fusion methods for multi-modal medical image segmentation.
This document summarizes a research paper on using a k-means clustering method to detect brain tumors in MRI images. The paper introduces brain tumors and MRI imaging. It then describes using k-means clustering for tumor segmentation, which groups similar image patterns into clusters to identify the tumor region. The paper presents results of applying k-means to two MRI images, including statistical measures of segmentation accuracy, tumor area comparison, and timing. The k-means method achieved average rand index of 0.8358, low average errors, and tumor areas close to manual segmentation in under 3 seconds, demonstrating potential for accurate and efficient brain tumor detection.
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...idescitation
This paper introduces a comparison of two popular
clustering algorithms for breast DCE-MRI segmentation
purpose. Magnetic resonance imaging (MRI) is an advanced
medical imaging technique providing rich information about
the human soft tissue anatomy. The goal of breast magnetic
resonance image segmentation is to accurately identify the
principal mass or lesion structures in these image volumes.
There are many methods that exist to segment the breast
DCE-MR images. One of these, K-means clustering procedure
provides effective solutions in many science and engineering
fields. They are especially popular in the pattern classification
and signal processing areas and can segment the breast DCE-
MRI with high precision. The artificial bee colony (ABC)
algorithm is a new, very simple and robust population based
optimization algorithm that is inspired by the intelligent
behavior of honey bee swarms. This paper compares the
performance of two image segmentation techniques in the
subject of breast DCE-MR image. In the experiments, the
real dynamic contrast enhanced magnetic resonance images
(DCE- MRI) are used. Results show that artificial bee colony
algorithm performs better in terms of segmentation accuracy,
robustness and speed of computation.
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...csandit
This document summarizes an experiment that used n-gram features extracted from mammographic images and classified the images using a neural network. Regions of interest from mammograms in the miniMIAS database were represented using n-gram models by treating pixel intensities like words. Three-gram and four-gram features were extracted and normalized. The features were input to an artificial neural network classifier to classify regions as normal or abnormal. Experiments varying n, grey levels, and background tissue showed the highest accuracy of 83.33% for classifying fatty background tissue using three-gram features reduced to 8 grey levels.
The document summarizes research on medical image segmentation algorithms. It discusses k-means clustering, fuzzy c-means clustering, and proposes enhancements to these algorithms. Specifically, it introduces an enhanced k-means algorithm that improves initial cluster center selection. It also presents a kernelized fuzzy c-means approach that maps data points into a feature space to perform clustering. The algorithms are tested on MRI brain images and evaluated based on segmentation accuracy. The enhanced methods aim to produce more precise segmentations for medical applications such as diagnosis and treatment planning.
A comparative study of clustering and biclustering of microarray dataijcsit
There are subsets of genes that have similar behavior under subsets of conditions, so we say that they
coexpress, but behave independently under other subsets of conditions. Discovering such coexpressions can
be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of
utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes
that are coexpressed under clusters of conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate
this problem by finding suboptimal solutions. In this paper, we make a new survey on clustering and
biclustering of gene expression data, also called microarray data.
Image segmentation by modified map ml estimationsijesajournal
Though numerous algorithms exist to perform image segmentation there are several issues
related to execution time of these algorithm. Image Segmentation is nothing but label relabeling
problem under probability framework. To estimate the label configuration, an iterative
optimization scheme is implemented to alternately carry out the maximum a posteriori (MAP)
estimation and the maximum likelihood (ML) estimations. In this paper this technique is
modified in such a way so that it performs segmentation within stipulated time period. The
extensive experiments shows that the results obtained are comparable with existing algorithms.
This algorithm performs faster execution than the existing algorithm to give automatic
segmentation without any human intervention. Its result match image edges very closer to
human perception.
This document discusses using particle swarm optimization (PSO) to design optimal close-range photogrammetry networks. PSO is introduced as a heuristic optimization algorithm inspired by bird flocking behavior that can be used to solve complex optimization problems. The document then provides an overview of close-range photogrammetry network design and the four design stages. It explains that PSO will be used to optimize the first stage of determining optimal camera station positions. Mathematical models of PSO for close-range photogrammetry network design are developed. Experimental tests are carried out to develop a PSO algorithm that can determine optimum camera positions and evaluate the accuracy of the developed network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Local machine learning focuses on analyzing subsets of available training data rather than the complete dataset. It seeks to find solutions tailored to specific data points rather than universal functions. This allows it to better handle issues like uneven data distribution. Local learning methods include k-nearest neighbors and support vector machines, which select nearby training examples or "support vectors" to make predictions. They can solve problems global models cannot by focusing training locally where data is linearly separable.
This document summarizes a research paper about privacy preserving data mining using implicit function theorem. The paper proposes a new approach for transforming sensitive data obtained from data mining systems into secure values. First, original data values are transformed into partial derivatives of vector-valued functions to perturb the data. Second, a symmetric key is generated from the Jacobian matrix eigenvalues for secure computation. The approach is intended to allow sharing of sensitive knowledge extracted from data mining in a private manner. An example using academic data is provided to illustrate converting data into vector functions. Results demonstrating the new approach are also presented.
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationTELKOMNIKA JOURNAL
A brain tumor is one of a deadly disease that needs high accuracy in its medical surgery. Brain tumor detection can be done through magnetic resonance imaging (MRI). Image segmentation for the MRI brain tumor aims to separate the tumor area (as the region of interest or ROI) with a healthy brain and provide a clear boundary of the tumor. This study classifies the ROI and non-ROI using fully convolutional network with new architecture, namely UNet-VGG16. This model or architecture is a hybrid of U-Net and VGG16 with transfer Learning to simplify the U-Net architecture. This method has a high accuracy of about 96.1% in the learning dataset. The validation is done by calculating the correct classification ratio (CCR) to comparing the segmentation result with the ground truth. The CCR value shows that this UNet-VGG16 could recognize the brain tumor area with a mean of CCR value is about 95.69%.
Comparison between the genetic algorithms optimization and particle swarm opt...IAEME Publication
The document compares the genetic algorithms optimization and particle swarm optimization methods for designing close range photogrammetry networks. It presents the genetic algorithm and particle swarm optimization as two popular meta-heuristic algorithms inspired by natural evolution and collective animal behavior, respectively. The document develops mathematical models representing the genetic algorithm and particle swarm optimization for close range photogrammetry network design and evaluates them in a test field to reinforce the theoretical aspects.
Adversarial attack driven data augmentation for medical imagesIJECEIAES
An important stage in medical image analysis is segmentation, which aids in focusing on the required area of an image and speeds up findings. Fortunately, deep learning models have taken over with their high-performing capabilities, making this process simpler. The deep learning model’s reliance on vast data, however, makes it difficult to utilize for medical image analysis due to the scarcity of data samples. Too far, a number of data augmentations techniques have been employed to address the issue of data unavailability. Here, we present a novel method of augmentation that enabled the UNet model to segment the input dataset with about 90% accuracy in just 30 epochs. We describe the us- age of fast gradient sign method (FGSM) as an augmentation tool for adversarial machine learning attack methods. Besides, we have developed the method of Inverse FGSM, which im- proves performance by operating in the opposite way from FGSM adversarial attacks. In comparison to the conventional FGSM methodology, our strategy boosted performance up to 6% to 7% on average. The model became more resilient to hostile attacks because to these two strategies. An innovative implementation of adversarial machine learning and resilience augmentation is revealed by the overall analysis of this study.
This document summarizes IBM's Adversarial Robustness Toolbox (ART), an open source library for defending deep learning models against adversarial attacks. ART includes methods for attacking models, such as the Fast Gradient Method, and defending them with approaches like adversarial training. It supports frameworks like TensorFlow and PyTorch. The document outlines the types of attacks and defenses in ART, provides an example use case in a Jupyter notebook, and notes that ART is used in IBM's Watson Studio platform. It concludes by listing some key references on adversarial machine learning.
Generative Adversarial Networks for Robust Medical Image Analysis.pdfDaniel983829
This document presents two approaches for improving robustness in medical image segmentation using generative adversarial networks (GANs). The first approach, UltraGAN, uses a GAN to enhance the quality of ultrasound images and improve robustness to low image quality. The second approach, MedRobGAN, generates adversarial medical image examples to improve robustness against adversarial attacks. Both methods are evaluated on medical segmentation tasks to validate their effectiveness in improving robustness.
The document summarizes papers presented at MICCAI 2018 that caught the author's attention. It discusses papers on deep learning, new representations, network architectures, semi-supervised learning, weakly supervised learning, deep reinforcement learning, and the author's own papers. The author provides concise summaries of several papers to illustrate the different topics and techniques.
Dr Murari Mandal from NUS presented as part of 3 days OpenPOWER Industry summit about Robustness in Deep learning where he talked about AI Breakthroughs , Performance improments in AI models , Adversarial attacks , Attacks on semantic segmentation , Attacs on object detector , Defending Against adversarial attacks and many other areas.
The document discusses several challenges in applying deep learning to medical imaging tasks including the scarcity of labeled data, lack of interpretability, uncertainty in predictions, and difficulties with multi-center studies. It proposes and reviews various techniques to address these challenges such as data augmentation using generative models, visualization methods to interpret models, leveraging prediction uncertainty, and distributed training approaches to combine data from multiple centers. The goal is to develop artificial intelligence systems that can provide augmented intelligence to assist doctors in clinical decision making.
Geometric Correction for Braille Document Images csandit
Image processing is an important research area in computer vision. clustering is an unsupervised
study. clustering can also be used for image segmentation. there exist so many methods for image
segmentation. image segmentation plays an important role in image analysis.it is one of the first
and the most important tasks in image analysis and computer vision. this proposed system
presents a variation of fuzzy c-means algorithm that provides image clustering. the kernel fuzzy
c-means clustering algorithm (kfcm) is derived from the fuzzy c-means clustering
algorithm(fcm).the kfcm algorithm that provides image clustering and improves accuracy
significantly compared with classical fuzzy c-means algorithm. the new algorithm is called
gaussian kernel based fuzzy c-means clustering algorithm (gkfcm)the major characteristic of
gkfcm is the use of a fuzzy clustering approach ,aiming to guarantee noise insensitiveness and
image detail preservation.. the objective of the work is to cluster the low intensity in homogeneity
area from the noisy images, using the clustering method, segmenting that portion separately using
content level set approach. the purpose of designing this system is to produce better segmentation
results for images corrupted by noise, so that it can be useful in various fields like medical image
analysis, such as tumor detection, study of anatomical structure, and treatment planning.
This summary provides the key details from the document in 3 sentences:
The document discusses optimizing the parameters of an artificial neural network (ANN) model for predicting schizophrenia. It explores different numbers of hidden layers, epochs, and fold units to determine the configuration that results in the highest training accuracy and lowest error. The optimal parameters were found to be 8 hidden layers, 2 fold units, and up to 1000 epochs, achieving a peak training accuracy of 71.34% and prediction accuracy of 74.53%.
A GENERAL STUDY ON HISTOGRAM EQUALIZATION FOR IMAGE ENHANCEMENTpharmaindexing
The document discusses several methods for image enhancement using histogram equalization. It begins with an introduction to histogram equalization and its use in increasing image quality and local contrast. It then reviews three existing histogram equalization methods - Bi-Histogram Equalization with Neighborhood Metrics, Class-Based Parametric Approximation to Histogram Equalization, and Texture Enhanced Histogram Equalization Using TV-L1 Image Decomposition. Each aimed to improve on traditional histogram equalization by addressing issues like maintaining brightness, preserving local information, and avoiding intensity saturation artifacts. The document concludes that variational approaches like TV-L1 decomposition have potential to outperform conventional histogram equalization methods for contrast enhancement.
A review deep learning for medical image segmentation using multi modality fu...Aykut DİKER
This paper reviews deep learning approaches for medical image segmentation using multi-modality fusion. It finds that the number of papers on this topic has increased significantly in recent years, as deep learning methods have achieved superior performance over traditional methods. The paper categorizes fusion strategies as early fusion, where modalities are combined before network processing, and late fusion, where each modality is processed separately before fusion. While early fusion is simpler, late fusion can achieve more accurate results by learning complex relationships between modalities. Overall, the paper aims to provide an overview of deep learning fusion methods for multi-modal medical image segmentation.
This document summarizes a research paper on using a k-means clustering method to detect brain tumors in MRI images. The paper introduces brain tumors and MRI imaging. It then describes using k-means clustering for tumor segmentation, which groups similar image patterns into clusters to identify the tumor region. The paper presents results of applying k-means to two MRI images, including statistical measures of segmentation accuracy, tumor area comparison, and timing. The k-means method achieved average rand index of 0.8358, low average errors, and tumor areas close to manual segmentation in under 3 seconds, demonstrating potential for accurate and efficient brain tumor detection.
Quantitative Comparison of Artificial Honey Bee Colony Clustering and Enhance...idescitation
This paper introduces a comparison of two popular
clustering algorithms for breast DCE-MRI segmentation
purpose. Magnetic resonance imaging (MRI) is an advanced
medical imaging technique providing rich information about
the human soft tissue anatomy. The goal of breast magnetic
resonance image segmentation is to accurately identify the
principal mass or lesion structures in these image volumes.
There are many methods that exist to segment the breast
DCE-MR images. One of these, K-means clustering procedure
provides effective solutions in many science and engineering
fields. They are especially popular in the pattern classification
and signal processing areas and can segment the breast DCE-
MRI with high precision. The artificial bee colony (ABC)
algorithm is a new, very simple and robust population based
optimization algorithm that is inspired by the intelligent
behavior of honey bee swarms. This paper compares the
performance of two image segmentation techniques in the
subject of breast DCE-MR image. In the experiments, the
real dynamic contrast enhanced magnetic resonance images
(DCE- MRI) are used. Results show that artificial bee colony
algorithm performs better in terms of segmentation accuracy,
robustness and speed of computation.
Hybrid Technique Based on N-GRAM and Neural Networks for Classification of Ma...csandit
This document summarizes an experiment that used n-gram features extracted from mammographic images and classified the images using a neural network. Regions of interest from mammograms in the miniMIAS database were represented using n-gram models by treating pixel intensities like words. Three-gram and four-gram features were extracted and normalized. The features were input to an artificial neural network classifier to classify regions as normal or abnormal. Experiments varying n, grey levels, and background tissue showed the highest accuracy of 83.33% for classifying fatty background tissue using three-gram features reduced to 8 grey levels.
The document summarizes research on medical image segmentation algorithms. It discusses k-means clustering, fuzzy c-means clustering, and proposes enhancements to these algorithms. Specifically, it introduces an enhanced k-means algorithm that improves initial cluster center selection. It also presents a kernelized fuzzy c-means approach that maps data points into a feature space to perform clustering. The algorithms are tested on MRI brain images and evaluated based on segmentation accuracy. The enhanced methods aim to produce more precise segmentations for medical applications such as diagnosis and treatment planning.
A comparative study of clustering and biclustering of microarray dataijcsit
There are subsets of genes that have similar behavior under subsets of conditions, so we say that they
coexpress, but behave independently under other subsets of conditions. Discovering such coexpressions can
be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of
utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes
that are coexpressed under clusters of conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate
this problem by finding suboptimal solutions. In this paper, we make a new survey on clustering and
biclustering of gene expression data, also called microarray data.
Image segmentation by modified map ml estimationsijesajournal
Though numerous algorithms exist to perform image segmentation there are several issues
related to execution time of these algorithm. Image Segmentation is nothing but label relabeling
problem under probability framework. To estimate the label configuration, an iterative
optimization scheme is implemented to alternately carry out the maximum a posteriori (MAP)
estimation and the maximum likelihood (ML) estimations. In this paper this technique is
modified in such a way so that it performs segmentation within stipulated time period. The
extensive experiments shows that the results obtained are comparable with existing algorithms.
This algorithm performs faster execution than the existing algorithm to give automatic
segmentation without any human intervention. Its result match image edges very closer to
human perception.
This document discusses using particle swarm optimization (PSO) to design optimal close-range photogrammetry networks. PSO is introduced as a heuristic optimization algorithm inspired by bird flocking behavior that can be used to solve complex optimization problems. The document then provides an overview of close-range photogrammetry network design and the four design stages. It explains that PSO will be used to optimize the first stage of determining optimal camera station positions. Mathematical models of PSO for close-range photogrammetry network design are developed. Experimental tests are carried out to develop a PSO algorithm that can determine optimum camera positions and evaluate the accuracy of the developed network.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Local machine learning focuses on analyzing subsets of available training data rather than the complete dataset. It seeks to find solutions tailored to specific data points rather than universal functions. This allows it to better handle issues like uneven data distribution. Local learning methods include k-nearest neighbors and support vector machines, which select nearby training examples or "support vectors" to make predictions. They can solve problems global models cannot by focusing training locally where data is linearly separable.
This document summarizes a research paper about privacy preserving data mining using implicit function theorem. The paper proposes a new approach for transforming sensitive data obtained from data mining systems into secure values. First, original data values are transformed into partial derivatives of vector-valued functions to perturb the data. Second, a symmetric key is generated from the Jacobian matrix eigenvalues for secure computation. The approach is intended to allow sharing of sensitive knowledge extracted from data mining in a private manner. An example using academic data is provided to illustrate converting data into vector functions. Results demonstrating the new approach are also presented.
UNet-VGG16 with transfer learning for MRI-based brain tumor segmentationTELKOMNIKA JOURNAL
A brain tumor is one of a deadly disease that needs high accuracy in its medical surgery. Brain tumor detection can be done through magnetic resonance imaging (MRI). Image segmentation for the MRI brain tumor aims to separate the tumor area (as the region of interest or ROI) with a healthy brain and provide a clear boundary of the tumor. This study classifies the ROI and non-ROI using fully convolutional network with new architecture, namely UNet-VGG16. This model or architecture is a hybrid of U-Net and VGG16 with transfer Learning to simplify the U-Net architecture. This method has a high accuracy of about 96.1% in the learning dataset. The validation is done by calculating the correct classification ratio (CCR) to comparing the segmentation result with the ground truth. The CCR value shows that this UNet-VGG16 could recognize the brain tumor area with a mean of CCR value is about 95.69%.
Comparison between the genetic algorithms optimization and particle swarm opt...IAEME Publication
The document compares the genetic algorithms optimization and particle swarm optimization methods for designing close range photogrammetry networks. It presents the genetic algorithm and particle swarm optimization as two popular meta-heuristic algorithms inspired by natural evolution and collective animal behavior, respectively. The document develops mathematical models representing the genetic algorithm and particle swarm optimization for close range photogrammetry network design and evaluates them in a test field to reinforce the theoretical aspects.
Adversarial attack driven data augmentation for medical imagesIJECEIAES
An important stage in medical image analysis is segmentation, which aids in focusing on the required area of an image and speeds up findings. Fortunately, deep learning models have taken over with their high-performing capabilities, making this process simpler. The deep learning model’s reliance on vast data, however, makes it difficult to utilize for medical image analysis due to the scarcity of data samples. Too far, a number of data augmentations techniques have been employed to address the issue of data unavailability. Here, we present a novel method of augmentation that enabled the UNet model to segment the input dataset with about 90% accuracy in just 30 epochs. We describe the us- age of fast gradient sign method (FGSM) as an augmentation tool for adversarial machine learning attack methods. Besides, we have developed the method of Inverse FGSM, which im- proves performance by operating in the opposite way from FGSM adversarial attacks. In comparison to the conventional FGSM methodology, our strategy boosted performance up to 6% to 7% on average. The model became more resilient to hostile attacks because to these two strategies. An innovative implementation of adversarial machine learning and resilience augmentation is revealed by the overall analysis of this study.
This document summarizes IBM's Adversarial Robustness Toolbox (ART), an open source library for defending deep learning models against adversarial attacks. ART includes methods for attacking models, such as the Fast Gradient Method, and defending them with approaches like adversarial training. It supports frameworks like TensorFlow and PyTorch. The document outlines the types of attacks and defenses in ART, provides an example use case in a Jupyter notebook, and notes that ART is used in IBM's Watson Studio platform. It concludes by listing some key references on adversarial machine learning.
Generative Adversarial Networks for Robust Medical Image Analysis.pdfDaniel983829
This document presents two approaches for improving robustness in medical image segmentation using generative adversarial networks (GANs). The first approach, UltraGAN, uses a GAN to enhance the quality of ultrasound images and improve robustness to low image quality. The second approach, MedRobGAN, generates adversarial medical image examples to improve robustness against adversarial attacks. Both methods are evaluated on medical segmentation tasks to validate their effectiveness in improving robustness.
The document summarizes papers presented at MICCAI 2018 that caught the author's attention. It discusses papers on deep learning, new representations, network architectures, semi-supervised learning, weakly supervised learning, deep reinforcement learning, and the author's own papers. The author provides concise summaries of several papers to illustrate the different topics and techniques.
Dr Murari Mandal from NUS presented as part of 3 days OpenPOWER Industry summit about Robustness in Deep learning where he talked about AI Breakthroughs , Performance improments in AI models , Adversarial attacks , Attacks on semantic segmentation , Attacs on object detector , Defending Against adversarial attacks and many other areas.
The document discusses several challenges in applying deep learning to medical imaging tasks including the scarcity of labeled data, lack of interpretability, uncertainty in predictions, and difficulties with multi-center studies. It proposes and reviews various techniques to address these challenges such as data augmentation using generative models, visualization methods to interpret models, leveraging prediction uncertainty, and distributed training approaches to combine data from multiple centers. The goal is to develop artificial intelligence systems that can provide augmented intelligence to assist doctors in clinical decision making.
Robustness of Deep Neural Networks on White-box Attacks and Defense Strategie...AkhileshPandey104
Deep Neural Networks (DNNs) are extremely susceptible to small changes in the input (adversarial examples) that
are almost imperceptible to the human visual system. In order to deploy DNNs in security critical applications like
health, surveillance and self-driving cars, it must be robust to adversarial examples. In this project, we proposed
a novel defense strategy that reduces the effect of adversarial attacks and increases the accuracy from 7% to 97%
on recent powerful adversarial attacks.
PUBLICATION
Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adv...ijmitjournal
Magnetic Resonance Imaging (MRI) is a vital modality for gaining precise anatomical information, and it
plays a significant role in medical imaging for diagnosis and therapy planning. Image synthesis problems
have seen a revolution in recent years due to the introduction of deep learning techniques, specifically
Generative Adversarial Networks (GANs). This work investigates the use of Deep Convolutional
Generative Adversarial Networks (DCGAN) for producing high-fidelity and realistic MRI image slices.
The suggested approach uses a dataset with a variety of brain MRI scans to train a DCGAN architecture.
While the discriminator network discerns between created and real slices, the generator network learns to
synthesise realistic MRI image slices. The generator refines its capacity to generate slices that closely
mimic real MRI data through an adversarial training approach. The outcomes demonstrate that the
DCGAN promise for a range of uses in medical imaging research, since they show that it can effectively
produce MRI image slices if we train them for a consequent number of epochs. This work adds to the
expanding corpus of research on the application of deep learning techniques for medical image synthesis.
The slices that are could be produced possess the capability to enhance datasets, provide data
augmentation in the training of deep learning models, as well as a number of functions are made available
to make MRI data cleaning easier, and a three ready to use and clean dataset on the major anatomical
plans
This document summarizes an adversarial examples presentation. It discusses how adversarial examples are samples modified to cause misclassification, gradient descent optimization techniques, neural network training methods, and black-box and white-box adversarial attack methods like Fast Gradient Sign Method. It also covers adversarial example defenses, uses of adversarial examples in research, and targeted perturbation algorithms.
This document summarizes a seminar on universal adversarial perturbations. It begins with a quick introduction to adversarial attack methods like DeepFool. It then discusses the concept of universal adversarial perturbations - single perturbations that can fool neural networks into misclassifying most images. The document explains how universal perturbations are crafted to satisfy a fooling rate while being small. It shows that a single perturbation can achieve high fooling rates across different networks and models. It also discusses how universal perturbations capture the local geometry and correlations in the decision boundaries of neural networks.
AI systems have potential benefits but also risks in clinical applications. Adversarial attacks can intentionally cause models to make mistakes, and medical data is vulnerable due to limited authentication. Bias in algorithms can negatively impact patient care. Interpretability is important for trust, diagnosis, and safety issues. Frameworks are needed for developing AI with quality, safety, and accountability.
Generational Adversarial Neural Networks - Essential ReferenceGokul Alex
My presentation on Generational Adversarial Neural Networks and the Challenges of Adversarial Learning Conditions in Neural Networks presented during the National Symposium on Machine Intelligence organised by Kerala University in 2017 in Thiruvananthapuram.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Để xem full tài liệu Xin vui long liên hệ page để được hỗ trợ
: https://www.facebook.com/thuvienluanvan01
HOẶC
https://www.facebook.com/garmentspace/
https://www.facebook.com/thuvienluanvan01
https://www.facebook.com/thuvienluanvan01
tai lieu tong hop, thu vien luan van, luan van tong hop, do an chuyen nganh
Presentation about adversarial image attacksKoshinKhodiyar
This document discusses adversarial image attacks against machine learning models. It explains that adversarial attacks involve purposefully manipulating input data to cause machine learning models to make incorrect predictions. One example shown is adding imperceptible noise to an image of a panda to cause the model to misclassify it as a gibbon. The document also discusses Nightshade, a defensive technique that adds noise to training data to make models more robust against adversarial attacks. Real-world security issues from adversarial attacks are noted.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document discusses adversarial machine learning attacks. It begins by reminding the reader about evasion attacks, which aim to find model weaknesses at test time, and poisoning attacks, which compromise the training process. It then discusses evasion attacks in more detail, including the use of adversarial examples and real-world attacks. The document outlines different types of evasion attacks and formulations. It also discusses adversarial training as a potential mitigation technique, as well as universal adversarial perturbations. The document presents experimental results showing that perlin noise attacks can outperform other attacks and that adversarial training is not fully effective. It concludes by emphasizing the need to understand vulnerabilities in machine learning systems and develop effective defenses and testing methodologies.
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional ne...Wesley De Neve
Towards diagnosis of rotator cuff tears in 3-D MRI using 3-D convolutional neural networks. Paper presented at the Workshop on Computational Biology at the International Conference on Machine Learning, Long Beach, USA, 2019.
Investigating the biological relevance in trained embedding representations o...Wesley De Neve
Investigating the biological relevance in trained embedding representations of protein sequences. Paper presented at the Workshop on Computational Biology at the International Conference on Machine Learning, Long Beach, USA, 2019.
This document discusses Industry 4.0 use cases developed by researchers at Ghent University and IMEC. It introduces four use cases: 1) wind turbine condition monitoring using predictive models to detect anomalies, 2) incipient bearing fault detection using vibration and thermal data, 3) anomaly detection in steel coil production using metrics to predict faults, and 4) greenhouse condition monitoring using sensor data and imaging to optimize plant growth. The researchers develop machine learning models for predictive maintenance and performance monitoring across various industrial domains.
Wesley De Neve gives a presentation on Ghent University Global Campus (GUGC) in Songdo, South Korea. He provides background on his career and discusses the timeline of GUGC's establishment. GUGC offers professional biotech degree programs with a focus on data science. It has research centers in various biotech fields and aims to train students to extract knowledge from vast biotech data sets using mathematical and computational techniques.
Towards reading genomic data using deep learning-driven NLP techniquesWesley De Neve
Towards reading genomic data using deep learning-driven NLP techniques. Slides presented at BIOINFO 2016 – Precision Bioinformatics & Machine Learning.
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to...Wesley De Neve
Deep Machine Learning for Making Sense of Biotech Data - From Clean Energy to Smart Farming. Presentation given at the Korea-Europe International Conference on the 4th Industry Revolution.
GUGC Info Session - Informatics and BioinformaticsWesley De Neve
Wesley De Neve gave a presentation about informatics and bioinformatics courses at Ghent University Global Campus. He has a Master's and PhD from Ghent University and works at several research institutions including IDLab and KAIST. The informatics course teaches students to automate time-consuming tasks through programming. It focuses on Python and UNIX tools. The bioinformatics course introduces the field and teaches algorithms and programming for problems like motif finding and sequence alignment. Both courses involve theory lectures, hands-on sessions, assignments, and exams.
Ghent University and GUGC-K: Overview of Teaching and Research ActivitiesWesley De Neve
The document provides an overview of the teaching and research activities of the ELIS Multimedia Lab at Ghent University and Ghent University Global Campus. It discusses various research projects involving multimedia data analysis using techniques such as deep learning, neural networks, and computer vision. Specific projects summarized include terrain classification using convolutional neural networks, video content understanding using 3D CNNs and LSTMs, video event detection using reservoir computing networks, Twitter micropost modeling using word2vec and feedforward neural networks, humor detection on Twitter, and multimodal condition monitoring of wind turbines.
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Ta...Wesley De Neve
Biotech Data Science @ GUGC in Korea: Deep Learning for Prediction of Drug-Target Interaction and DNA Analysis.
Poster presented at the BIG N2N Symposium 2016.
Towards using multimedia technology for biological data processingWesley De Neve
Towards using multimedia technology for biological data processing.
Presentation given during the Ghent University Global Campus (GUGC) Research Seminar on 19/1/2014.
Multimedia Lab @ Ghent University - iMinds - Organizational Overview & Outlin...Wesley De Neve
The document provides an overview of the Multimedia Lab at Ghent University and iMinds research institute in Belgium. It discusses the organizational structure of Ghent University and iMinds and describes the research activities of the Multimedia Lab, including social media analysis, visual content understanding, and deep machine learning. It also outlines some specific projects on Twitter data involving hashtag recommendation, named entity recognition, and social television.
This presentation offers a brief idea about the cultivation, processing, storage and marketing of medicinal plants for the health care practices in sustainable health. The role of different factors has been assessed for the same.
Dr. James Farley Identifies the Key Root Causes You Must Address to Heal Natu...DrJamesFarley
Learn about Dr. James Farley’s unique healability approach to autoimmune disorders. Discover how his functional, personalized care model targets root causes for lasting recovery and better health.
Title: Abzymes mimickers in
catalytic reactions at nanoscales
Speaker: Orchidea Maria Lecian
Authors: Orchidea Maria Lecian, Sergey Suchkov
Talk presented at 4th International Conference on
Advanced Nanomaterials and Nanotechnology
12-13 June 2025, Rome, Italy on 12 June 2025.
Driving sustainability: AI adoption framework for the fast fashion industrySelcen Ozturkcan
Ozturkcan, S., & Bozdag, A.A. (2025). Driving sustainability: AI adoption framework for the fast fashion industry. Future of Sustainable Fashion: Responsible Consumption Special Interest Group Conference, 5-6 June 2025, Kingston University London, London, UK.
HOW TO FACE THREATS FROM THE FORCES OF NATURE EXISTING ON PLANET EARTH.pdfFaga1939
This article aims to present how to deal with localized or global threats to human beings caused by the forces of nature that exist on planet Earth. The threats to human beings caused by the forces of nature that exist on planet Earth include earthquakes and tsunamis that can affect specific areas of the planet, volcanic eruptions that can affect specific areas of the planet or have a global impact, the cooling of the Earth's core and the inversion of the Earth's magnetic poles, both of which have a global impact. Specific measures are proposed to deal with each of the threats, but in addition to these, it is necessary to create a global structure, a World Organization for Defense Against Natural Disasters with global scope linked to the UN (United Nations) that has the capacity to technically coordinate the actions of countries around the world in dealing with these threats. The creation of this body is absolutely necessary because most of the threats from the forces of nature that exist on planet Earth have a global impact. To carry out its functions, this body must have financial resources from a global fund against natural disasters of global scope to be maintained by all countries on the planet and administered by the UN.
Impact of adversarial examples on deep learning models for biomedical image segmentation
1. IMPACT OF ADVERSARIAL EXAMPLES ON DEEP LEARNING MODELS
FOR BIOMEDICAL IMAGE SEGMENTATION
Utku Ozbulak1,3
, Arnout Van Messem2,3
, Wesley De Neve1,3
1
Department of Electronics and Information Systems, Ghent University, Belgium
2
Department of Applied Mathematics, Computer Science and Statistics, Ghent University, Belgium
3
Center for Biotech Data Science,Ghent University Global Campus, South Korea
Abstract
Deep learning models, which are
increasingly being used in the field
of medical image analysis, come
with a major security risk, namely,
their vulnerability to adversarial
examples. Given that a large
portion of medical imaging prob-
lems are effectively segmentation
problems, we analyze the impact
of adversarial examples on deep
learning models for biomedical im-
age segmentation. We expose the
vulnerability of these models to
adversarial examples by propos-
ing a novel algorithm, namely,
the Adaptive Segmentation Mask
Attack (ASMA). This algorithm
makes it possible to craft targeted
adversarial examples that come
with high Intersection-over-Union
rates between the target adversar-
ial mask and the prediction, as well
as with perturbation that is mostly
invisible to the bare eye.
Motivation
Given that (1) labor expenses (i.e.,
salaries of nurses, doctors, and
other relevant personnel) are a key
driver of high costs in the medical
field and (2) that increasingly
super-human results are obtained
by machine learning systems, an
ongoing discussion is to replace
or augment manual labor with
automation for a number of medical
diagnosis tasks [1]. However, a
recent development called adver-
sarial examples showed that deep
learning models are vulnerable to
gradient-based attacks [2]. This
vulnerability, which is considered
a major security flaw, for instance
enables the creation of fraud
schemes (e.g., for insurance claims)
when deep learning models are
carrying out clinical tasks [1].
The above observations motivate
our effort to better understand the
impact of adversarial examples on
deep learning approaches towards
biomedical image segmentation, so
to facilitate the secure deployment
of deep learning models during
clinical tasks.
References
[1] Finlayson S.G., Chung H.W., Kohane I.S., Beam A.L.,
Adversarial Attacks Against Medical Deep Learning Systems
[2] Szegedy C., Zaremba W., Sutskever I., Bruna J., Erhan D., Goodfellow I., Fergus R.,
Intriguing Properties of Neural Networks
[3] Pena-Betancor C., Gonzalez-Hernandez M., Fumero-Batista F., Sigut J., Medina-Mesa E., Alayon S., de la Rosa M.,
Estimation of the Relative Amount of Hemoglobin in the Cup and Neuroretinal Rim using Stereoscopic Color Fundus Images
[4] Gutman D., Codella N., Celebi M., Helba B., Marchetti M., Mishra N., Halpern A.,
Skin Lesion Analysis toward Melanoma Detection
[5] Ronneberger O., Fischer P., Brox T.,
U-Net: Convolutional Networks for Biomedical Image Segmentation
Biotech Data Science
Center for
Adaptive Segmentation Mask Attack
Adversarial examples are malicious data points that force machine learning models to make mistakes during
testing time [2].
+ 0.01× =
Genuine Image
Prediction: Cancer
Confidence: 0.95
Perturbation
(Enhanced × 100 )
Adversarial Example
Prediction: Healthy
Confidence: 0.99
By introducing a novel algorithm for producing targeted adversarial examples for image segmentation problems,
we expose the vulnerability of deep learning models for biomedical image segmentation to malicious data points.
Our algorithm, named Adaptive Segmentation Mask Attack (ASMA), incorporates two techniques, namely, the
use of (1) adaptive segmentation masks and (2) dynamic perturbation multipliers. The proposed attack is defined
as follows:
X : Input image.
g(θ, X) : Forward pass from a neural
network g with parameters θ using input X.
YA
: Target (adversarial) mask.
Pn : Added perturbation at nth iteration.
minimize || X − (X + P) ||2 ,
such that arg max g(θ, (X + P)) = YA
, (X + P) ∈ [0, 1]z
,
Pn =
M−1
c=0
x g(θ, Xn)c 1{YA = c} 1{arg maxM (g(θ,Xn)) = c} .
ASMA is able to craft adversarial examples with 97% and 89% Intersection-over-Union (IoU) accuracy for the
Glaucoma Dataset [3] and the ISIC Skin Lesion Dataset [4], respectively, with IoU measured between the pre-
dicted segmentation for a given adversarial example and the corresponding target mask. While doing so, our
algorithm modifies the image so subtly that the perturbations, for the most part, are not visible to the bare eye.
+ =
Segmentation
Mask of (a)
(a) Source
Image
Generated
Perturbation
(Enhanced × 100)
Generated
Adversarial Example
L2 = 2.3, L∞ = 0.16
Segmentation
Mask of (b)
(Target Mask)
(b) Target
Image
Adaptive
Optimization
Masks
Predicted
Segmentation for the
Adversarial Example
IoU = 98%, PA = 99%
Using ASMA, results obtained for the two above-mentioned biomedical datasets (mean and standard deviation)
are provided in the table below (PA denotes Pixel Accuracy).
Glaucoma Dataset ISIC Skin Lesion Dataset
Modification Accuracy Modification Accuracy
Optimization L2 L∞ IoU PA L2 L∞ IoU PA
ASMA
2.47 0.17 97% 99% 3.88 0.16 89% 98%
±1.05 ±0.09 ±2% ±1% ±1.99 ±0.09 ±10% ±1%
* The experiments presented above are conducted in white-box settings, using the U-Net architecture [5].