首页 > 最新文献

Journal of Computational and Theoretical Nanoscience最新文献

英文 中文
Pupil Detection System Using Intensity Labeling Algorithm in Field Programmable Gate Array 基于强度标记算法的现场可编程门阵列瞳孔检测系统
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9429
S. Baskaran, L. Ali, A. Anitharani, E. Rani, N. Nandhagopal
Pupil detection techniques are an essential diagnostic technique in medical applications. Pupil detection becomes more complex because of the dynamic movement of the pupil region and it’s size. Eye-tracking is either the method of assessing the point of focus (where one sees) or the orientation of an eye relative to the head. An instrument used to control eye positions and eye activity is the eye tracker. As an input tool for human-computer interaction, eye trackers are used in research on the visual system, in psychology, psycholinguistics, marketing, and product design. Eye detection is one in all the applications in the image process. This is very important in human identification and it will improve today’s identification technique that solely involves the eye detection to spot individuals. This technology is still new, only a few domains are applying this technology as their medical system. The proposed work is developing an eye pupil detection method in real-time, stable, using an intensity labeling algorithm. The proposed hardware architecture is designed using the median filter, segmentation using the threshold process, and morphology to detect pupil shape. Finally, an intensity Labeling algorithm is done to locate an exact eye pupil region. A Real-time FPGA implementation is done by Altera Quartus II software with cyclone IV FPGA.
瞳孔检测技术是一项重要的医学诊断技术。由于瞳孔区域的动态运动和瞳孔的大小,瞳孔检测变得更加复杂。眼球追踪是一种评估焦点(一个人看到的地方)或眼睛相对于头部的方向的方法。眼球追踪仪是一种用来控制眼球位置和眼球活动的仪器。眼动仪作为人机交互的输入工具,广泛应用于视觉系统、心理学、心理语言学、市场营销和产品设计等领域的研究。眼睛检测是图像处理中的一种应用。这在人类识别中是非常重要的,它将改进目前仅通过眼睛检测来识别个体的识别技术。该技术尚属新兴技术,目前只有少数领域将其应用于医疗系统。提出的工作是开发一种实时,稳定的眼睛瞳孔检测方法,使用强度标记算法。硬件结构采用中值滤波、阈值分割和形态学检测瞳孔形状。最后,利用强度标记算法对瞳孔区域进行精确定位。采用Altera Quartus II软件和cyclone IV FPGA实现实时FPGA。
{"title":"Pupil Detection System Using Intensity Labeling Algorithm in Field Programmable Gate Array","authors":"S. Baskaran, L. Ali, A. Anitharani, E. Rani, N. Nandhagopal","doi":"10.1166/JCTN.2020.9429","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9429","url":null,"abstract":"Pupil detection techniques are an essential diagnostic technique in medical applications. Pupil detection becomes more complex because of the dynamic movement of the pupil region and it’s size. Eye-tracking is either the method of assessing the point of focus (where one sees)\u0000 or the orientation of an eye relative to the head. An instrument used to control eye positions and eye activity is the eye tracker. As an input tool for human-computer interaction, eye trackers are used in research on the visual system, in psychology, psycholinguistics, marketing, and product\u0000 design. Eye detection is one in all the applications in the image process. This is very important in human identification and it will improve today’s identification technique that solely involves the eye detection to spot individuals. This technology is still new, only a few domains\u0000 are applying this technology as their medical system. The proposed work is developing an eye pupil detection method in real-time, stable, using an intensity labeling algorithm. The proposed hardware architecture is designed using the median filter, segmentation using the threshold process,\u0000 and morphology to detect pupil shape. Finally, an intensity Labeling algorithm is done to locate an exact eye pupil region. A Real-time FPGA implementation is done by Altera Quartus II software with cyclone IV FPGA.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5364-5367"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41900363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Multifold Secured System by Combining Multimodal Mask Steganography and Naive Based Random Visual Cryptography System for Digital Communication 结合多模态掩模隐写和基于朴素的随机视觉密码系统的数字通信多重安全系统
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9420
S. Jahnavi, C. Nandini
With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image (magic sheet) is used along with cover image that reveals the secret data in the receiving end.
随着数据和数字威胁的增加,保护互联网上通信的数据的需求是数字世界中必不可少的。在数字化服务与下一代安全的愿景下,通过隐藏数据的存在,利用下一代加密技术融合加密技术是在互联网上传输的敏感数据采用的主要技术之一。因此,传统的最低有效位(LSB)是目前应用最广泛的技术之一。其中秘密信息或图像被放置在封面图像的RGB通道的最低有效位,从而产生隐写图像。但其缺点是,一旦怀疑嵌入的秘密数据中原始图像和隐写图像的像素存在差异,攻击者就会猜测并提取出来。提出的视觉隐写方法克服了这一缺点,并通过嵌入生物特征的多模态方法支持良好的有效载荷容量,从而获得∞PSNR。利用所提出的隐写技术和随机视觉加密技术相结合,将被认证人的面部和指纹信息以封面图像和掩模图像(魔术片)的形式传输。这导致了增强和先进的视觉密码隐写安全模型,在互联网上传输敏感(生物特征)信息。仅使用封面图像无法提取完整的信息。掩模图像(魔法表)与封面图像一起使用,在接收端显示秘密数据。
{"title":"Novel Multifold Secured System by Combining Multimodal Mask Steganography and Naive Based Random Visual Cryptography System for Digital Communication","authors":"S. Jahnavi, C. Nandini","doi":"10.1166/JCTN.2020.9420","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9420","url":null,"abstract":"With increase in growth of data and digital threat, demand of securing the data communicated over the internet is an essential play in the digital world. In the vision of digitalizing services with the next generation of security to the sensitive data transmitted over the internet by\u0000 hiding the existence of the data using next generation cryptography by fusing cryptography techniques is one the major technique adopted. With this the aim in traditional Least Significant Bit (LSB) is one of the widely used technique. Where the secret message or image are placed in the cover\u0000 image in the least significant bits of RGB Channels resulting in a stego image. But the drawback is, on suspecting the differences in the pixels of original and stegoimage in the secret data embedded can be guessed and extracted by attacker. The Proposed visual crypto-mask steganography method\u0000 overcomes this drawback and support good payload capacity with multi modal approach of embedding biometrics, resulting in ∞ PSNR. The authenticated person face and fingerprint information is transmitted in a cover image and mask image (magic sheet) using proposed steganography and is\u0000 combined with Random Visual Crypto Technique. Which results in enhanced and advance visual crypto steganography secured model in communicating sensitive (biometric features) information over the internet. Where the complete information cannot be extracted using only cover image. Mask image\u0000 (magic sheet) is used along with cover image that reveals the secret data in the receiving end.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5279-5295"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44079784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automated Detection and Classification of COVID-19 from Chest X-ray Images Using Deep Learning 利用深度学习从胸部X射线图像中自动检测和分类新冠肺炎
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9439
K. Shankar, E. Perumal
In recent times, COVID-19 has appeared as a major threat to healthcare professionals, governments, and research communities over the world from its diagnosis to medication. Several research works have been carried out for obtaining the possible solutions for controlling the epidemic proficiently. An effective diagnosis of COVID-19 has been carried out using computed tomography (CT) scans and X-rays to examine the lung image. But it necessitates diverse radiologists and time to examine every report, which is a tedious task. Therefore, this paper presents an automated deep learning (DL) based COVID-19 detection and classification model. The presented model performs preprocessing, feature extraction and classification. In the earlier stage, median filtering (MF) technique is applied to preprocess the input image. Next, convolutional neural network (CNN) based VGGNet-19 model is applied as a feature extractor. At last, artificial neural network (ANN) is employed as a classification model to identify and classify the existence of COVID-19. An extensive set of simulation analysis takes place to ensure the superior performance of the applied model. The outcome of the experiments showcased the betterment interms of different measures.
最近,从诊断到药物治疗,COVID-19已成为世界各地医疗保健专业人员、政府和研究界的主要威胁。为获得有效控制疫情的可能解决方案,开展了多项研究工作。通过计算机断层扫描(CT)和x射线检查肺部图像,可以有效诊断COVID-19。但它需要不同的放射科医生和时间来检查每一份报告,这是一项乏味的任务。因此,本文提出了一种基于自动深度学习(DL)的COVID-19检测和分类模型。该模型进行预处理、特征提取和分类。在前期,采用中值滤波技术对输入图像进行预处理。其次,采用基于卷积神经网络(CNN)的VGGNet-19模型作为特征提取器。最后,采用人工神经网络(ANN)作为分类模型对COVID-19的存在性进行识别和分类。为了确保应用模型的优异性能,进行了广泛的仿真分析。实验结果显示了不同措施的改善条件。
{"title":"Automated Detection and Classification of COVID-19 from Chest X-ray Images Using Deep Learning","authors":"K. Shankar, E. Perumal","doi":"10.1166/JCTN.2020.9439","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9439","url":null,"abstract":"In recent times, COVID-19 has appeared as a major threat to healthcare professionals, governments, and research communities over the world from its diagnosis to medication. Several research works have been carried out for obtaining the possible solutions for controlling the epidemic\u0000 proficiently. An effective diagnosis of COVID-19 has been carried out using computed tomography (CT) scans and X-rays to examine the lung image. But it necessitates diverse radiologists and time to examine every report, which is a tedious task. Therefore, this paper presents an automated deep\u0000 learning (DL) based COVID-19 detection and classification model. The presented model performs preprocessing, feature extraction and classification. In the earlier stage, median filtering (MF) technique is applied to preprocess the input image. Next, convolutional neural network (CNN) based\u0000 VGGNet-19 model is applied as a feature extractor. At last, artificial neural network (ANN) is employed as a classification model to identify and classify the existence of COVID-19. An extensive set of simulation analysis takes place to ensure the superior performance of the applied model.\u0000 The outcome of the experiments showcased the betterment interms of different measures.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5457-5463"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46083860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Ensemble of Feature Extraction with Whale Optimization Algorithm for Content Based Image Retrieval System 基于内容的图像检索系统中特征提取与Whale优化算法的集成
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9432
P. Sasikumar, K. Venkatachalapathy
In recent days, content based image retrieval (CBIR) becomes a hot research area, which aims to determine the relevant images to the query image (QI) from the available large sized database. This paper presents an optimal hybrid feature extraction with similarity measure (OHFE-SM) for CBIR. Initially, histogram equalization of images takes place as a preprocessing step. Then, texture, shape and color features are extracted. The texture features include Gray Level Co-Occurrence Matrix (GLCM) and Gray Level Run Length Matrix (GLRLM) is extracted, where the optimal number of features will be chosen by whale optimization algorithm (WOA). Afterwards, the shape feature extraction takes place by Crest lines and color feature extraction process will be carried out using Quaternion moments. Finally, Euclidean distance will be applied as a similarity measure to determine the distance among the feature vectors exist in the database and QI. The images with higher similarity index will be considered as relevant images and is retrieved from the database. A detailed experimental validation takes place against Corel10K dataset. The simulation results showed that the proposed OHFE-SM model has outperformed the existing methods with the higher average precision of 0.915 and recall of 0.780.
基于内容的图像检索(CBIR)是近年来研究的热点,其目的是从现有的大型数据库中确定与查询图像(QI)相关的图像。提出了一种基于相似性度量的混合特征提取方法。首先,图像的直方图均衡化作为预处理步骤进行。然后,提取纹理、形状和颜色特征。提取纹理特征包括灰度共生矩阵(GLCM)和灰度运行长度矩阵(GLRLM),通过鲸鱼优化算法(WOA)选择纹理特征的最优数量。然后,利用Crest线进行形状特征提取,利用四元数矩进行颜色特征提取。最后,将欧几里得距离作为相似度度量来确定数据库中存在的特征向量与QI之间的距离。相似度较高的图像将被视为相关图像,并从数据库中检索。针对Corel10K数据集进行了详细的实验验证。仿真结果表明,所提出的OHFE-SM模型平均精度为0.915,召回率为0.780,优于现有方法。
{"title":"An Ensemble of Feature Extraction with Whale Optimization Algorithm for Content Based Image Retrieval System","authors":"P. Sasikumar, K. Venkatachalapathy","doi":"10.1166/JCTN.2020.9432","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9432","url":null,"abstract":"In recent days, content based image retrieval (CBIR) becomes a hot research area, which aims to determine the relevant images to the query image (QI) from the available large sized database. This paper presents an optimal hybrid feature extraction with similarity measure (OHFE-SM) for\u0000 CBIR. Initially, histogram equalization of images takes place as a preprocessing step. Then, texture, shape and color features are extracted. The texture features include Gray Level Co-Occurrence Matrix (GLCM) and Gray Level Run Length Matrix (GLRLM) is extracted, where the optimal number\u0000 of features will be chosen by whale optimization algorithm (WOA). Afterwards, the shape feature extraction takes place by Crest lines and color feature extraction process will be carried out using Quaternion moments. Finally, Euclidean distance will be applied as a similarity measure to determine\u0000 the distance among the feature vectors exist in the database and QI. The images with higher similarity index will be considered as relevant images and is retrieved from the database. A detailed experimental validation takes place against Corel10K dataset. The simulation results showed that\u0000 the proposed OHFE-SM model has outperformed the existing methods with the higher average precision of 0.915 and recall of 0.780.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5386-5398"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45769328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Cryptosystem Based on Optimized Chaos-Based Image Encryption 基于混沌优化图像加密的公钥密码系统
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9411
Supriya Khaitan, Shrddha Sagar, Rashi Agarwal
Now is the era of online data and transaction, all this happens on an unsecured channel. With this huge data transfer, comes the need of protecting this data. Thus, to achieve security during transmission, several symmetric key encryption algorithms have been proposed. Inspired from researchers, we propose an asymmetric key image security algorithm based on chaotic tent map integrated with Optimized Salp Swarm Algorithm (SSA) for key generation and encryption for gray scale images. Diffusion and confusion are carried out in each round to mix plain text and key to it more secure. Experimental analysis shown by SSA are encouraging and is secure enough to resist brute force, differential cryptoanalysis and key sensitivity analysis attack and is suitable for practical application.
现在是在线数据和交易的时代,所有这些都发生在一个不安全的渠道上。随着这种巨大的数据传输,就需要保护这些数据。因此,为了实现传输过程中的安全性,已经提出了几种对称密钥加密算法。受研究人员的启发,我们提出了一种基于混沌帐篷图的非对称密钥图像安全算法,该算法与优化萨尔普群算法(SSA)相结合,用于灰度图像的密钥生成和加密。每一轮都会进行扩散和混淆,以使纯文本和密钥更安全。SSA的实验分析结果令人鼓舞,具有足够的安全性,可以抵抗暴力攻击、差分密码分析和密钥敏感性分析攻击,适合实际应用。
{"title":"Public Key Cryptosystem Based on Optimized Chaos-Based Image Encryption","authors":"Supriya Khaitan, Shrddha Sagar, Rashi Agarwal","doi":"10.1166/JCTN.2020.9411","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9411","url":null,"abstract":"Now is the era of online data and transaction, all this happens on an unsecured channel. With this huge data transfer, comes the need of protecting this data. Thus, to achieve security during transmission, several symmetric key encryption algorithms have been proposed. Inspired from\u0000 researchers, we propose an asymmetric key image security algorithm based on chaotic tent map integrated with Optimized Salp Swarm Algorithm (SSA) for key generation and encryption for gray scale images. Diffusion and confusion are carried out in each round to mix plain text and key to it more\u0000 secure. Experimental analysis shown by SSA are encouraging and is secure enough to resist brute force, differential cryptoanalysis and key sensitivity analysis attack and is suitable for practical application.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5217-5223"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46245103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content Based Medical Image Retrieval Using Multilevel Hybrid Clustering Segmentation with Feed Forward Neural Network 基于前馈神经网络的多层次混合聚类分割医学图像检索
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9452
R. Inbaraj, G. Ravi
Content-Based Image Retrieval (CBIR) is another yet broadly recognized method for distinguishing images from monstrous and unannotated image databases. With the improvement of network and mixed media headways ending up being increasingly famous, customers are not content with the regular information retrieval progresses. So nowadays, Content-Based Image Retrieval (CBIR) is the perfect and fast recovery source. Lately, various strategies have been created to improve CBIR execution. Data clustering is an overlooked method of hiding formatting extraction from large data blocks. With large data sets, there is a possibility of high dimensionality Models are a challenging domain with both massive numerical accuracy and efficiency for multidimensional data sets. The calibration and rich information dataset contain the problem of recovery and handling of medical images. Every day, more medical images were converted to digital format. Therefore, this work has applied these data to manage and file a novel approach, the “Clustering (MHC) Approach Using Content-Based Medical Image Retrieval Hybrid.” This work is implemented as four levels. With each level, the effectiveness of job retention is improved. Compared to some of the existing works that are being done in the analysis of this work’s literature, the results of this work are compared. The classification and learning features are used to retrieve medical images in a database. The proposed recovery system performs better than the traditional approach; with precision, recall, F-measure, and accuracy of proposed method are 97.29%, 95.023%, 4.36%, and 98.55% respectively. The recommended approach is most appropriate for recuperating clinical images for various parts of the body.
基于内容的图像检索(CBIR)是另一种被广泛认可的方法,用于将图像与可怕的和未标记的图像数据库区分开来。随着网络的不断完善和混合媒体的日益普及,客户对常规的信息检索过程并不满意。因此,基于内容的图像检索(CBIR)是目前最理想、最快速的恢复源。最近,已经制定了各种策略来改进CBIR的执行。数据聚类是一种被忽视的从大数据块中隐藏格式提取的方法。对于大数据集,存在高维的可能性。对于多维数据集,模型是一个具有巨大数值精度和效率的具有挑战性的领域。校准和丰富的信息数据集包含了医学图像的恢复和处理问题。每天都有更多的医学图像被转换成数字格式。因此,这项工作将这些数据应用于管理和归档一种新的方法,即“使用基于内容的医学图像检索混合的聚类(MHC)方法”。这项工作分为四个层次实现。每一个级别都能提高工作保留的有效性。在分析这部作品的文献时,将这部作品与现有的一些作品进行比较,并对其结果进行比较。分类和学习特征用于检索数据库中的医学图像。所提出的恢复系统比传统方法性能更好;方法的精密度、召回率、F-测度和准确度分别为97.29%、95.023%、4.36%和98.55%。推荐的方法最适合恢复身体各个部位的临床图像。
{"title":"Content Based Medical Image Retrieval Using Multilevel Hybrid Clustering Segmentation with Feed Forward Neural Network","authors":"R. Inbaraj, G. Ravi","doi":"10.1166/JCTN.2020.9452","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9452","url":null,"abstract":"Content-Based Image Retrieval (CBIR) is another yet broadly recognized method for distinguishing images from monstrous and unannotated image databases. With the improvement of network and mixed media headways ending up being increasingly famous, customers are not content with the regular\u0000 information retrieval progresses. So nowadays, Content-Based Image Retrieval (CBIR) is the perfect and fast recovery source. Lately, various strategies have been created to improve CBIR execution. Data clustering is an overlooked method of hiding formatting extraction from large data blocks.\u0000 With large data sets, there is a possibility of high dimensionality Models are a challenging domain with both massive numerical accuracy and efficiency for multidimensional data sets. The calibration and rich information dataset contain the problem of recovery and handling of medical images.\u0000 Every day, more medical images were converted to digital format. Therefore, this work has applied these data to manage and file a novel approach, the “Clustering (MHC) Approach Using Content-Based Medical Image Retrieval Hybrid.” This work is implemented as four levels. With each\u0000 level, the effectiveness of job retention is improved. Compared to some of the existing works that are being done in the analysis of this work’s literature, the results of this work are compared. The classification and learning features are used to retrieve medical images in a database.\u0000 The proposed recovery system performs better than the traditional approach; with precision, recall, F-measure, and accuracy of proposed method are 97.29%, 95.023%, 4.36%, and 98.55% respectively. The recommended approach is most appropriate for recuperating clinical images for various\u0000 parts of the body.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5550-5562"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47429339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Feature Extraction and Classification for Alzheimer’s Disease Detection 用于阿尔茨海默病检测的混合特征提取与分类
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9455
P. Sharmila, C. Rekha, D. Devi, K. Revathi, K. Sornalatha
Alzheimer’s disease (AD) is a serious neurological brain disease. It terminates brain cells, causing loss of memory, mental function and the capability to continue their daily actions. AD is incurable, but early detection can greatly improve symptoms. Machine learning can greatly develop the accurate analysis of AD. In this paper, we have implemented the two different hybrid algorithms for feature extraction and classification. Hybrid feature extraction algorithm is based on Empirical mode decomposition (EMD) and Gray-Level Co-Occurrence Matrix (GLCM), which is named as EMDGLCM. For classification purpose Support vector machine (SVM) and Convolution neural network (CNN) which is named as SVM-CNN. The proposed hybrid algorithm feature extraction and classification Improves the proposed system performance the proposed system has analysis with the help of OASIS dataset. The proposed results and comparative results shows that the proposed system provides the better results.
阿尔茨海默病(AD)是一种严重的神经性脑部疾病。它终止了脑细胞,导致记忆、心理功能和继续日常活动的能力丧失。AD是无法治愈的,但早期发现可以大大改善症状。机器学习可以极大地发展AD的精确分析。在本文中,我们实现了两种不同的混合算法来进行特征提取和分类。混合特征提取算法是基于经验模式分解(EMD)和灰度共生矩阵(GLCM)的,称为EMDLCM。出于分类目的,支持向量机(SVM)和卷积神经网络(CNN)被命名为SVM-CNN。所提出的混合算法特征提取和分类提高了所提出的系统性能。所提出的体系借助OASIS数据集进行了分析。所提出的结果和比较结果表明,所提出的系统提供了更好的结果。
{"title":"Hybrid Feature Extraction and Classification for Alzheimer’s Disease Detection","authors":"P. Sharmila, C. Rekha, D. Devi, K. Revathi, K. Sornalatha","doi":"10.1166/JCTN.2020.9455","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9455","url":null,"abstract":"Alzheimer’s disease (AD) is a serious neurological brain disease. It terminates brain cells, causing loss of memory, mental function and the capability to continue their daily actions. AD is incurable, but early detection can greatly improve symptoms. Machine learning can greatly\u0000 develop the accurate analysis of AD. In this paper, we have implemented the two different hybrid algorithms for feature extraction and classification. Hybrid feature extraction algorithm is based on Empirical mode decomposition (EMD) and Gray-Level Co-Occurrence Matrix (GLCM), which is named\u0000 as EMDGLCM. For classification purpose Support vector machine (SVM) and Convolution neural network (CNN) which is named as SVM-CNN. The proposed hybrid algorithm feature extraction and classification Improves the proposed system performance the proposed system has analysis with the help of\u0000 OASIS dataset. The proposed results and comparative results shows that the proposed system provides the better results.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5577-5581"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49378738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Plant Disease Detection and Classification Models: A Computer Vision Perspective 植物病害检测与分类模型分析:计算机视觉视角
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9435
K. Jayaprakash, S. Balamurugan
Presently, rapid and precise disease identification process plays a vital role to increase agricultural productivity in a sustainable manner. Conventionally, human experts identify the existence of anomaly in plants occurred due to disease, pest, nutrient deficient, weather conditions. Since manual diagnosis process is a tedious and time consuming task, computer vision approaches have begun to automatically detect and classify the plant diseases. The general image processing tasks involved in plant disease detection are preprocessing, segmentation, feature extraction and classification. This paper performs a review of computer vision based plant disease detection and classification techniques. The existing plant disease detection approaches including segmentation and feature extraction techniques have been reviewed. Additionally, a brief survey of machine learning (ML) and deep learning (DL) models to identify plant diseases also takes place. Furthermore, a set of recently developed DL based tomato plant leaf disease detection and classification models are surveyed under diverse aspects. To further understand the reviewed methodologies, a detailed comparative study also takes place to recognize the unique characteristics of the reviewed models.
目前,快速准确的疾病识别过程对以可持续的方式提高农业生产力起着至关重要的作用。按照惯例,人类专家会确定植物中是否存在由疾病、害虫、营养缺乏和天气条件引起的异常。由于人工诊断过程是一项繁琐而耗时的任务,计算机视觉方法已经开始自动检测和分类植物疾病。植物病害检测涉及的一般图像处理任务是预处理、分割、特征提取和分类。本文对基于计算机视觉的植物病害检测和分类技术进行了综述。综述了现有的植物病害检测方法,包括分割和特征提取技术。此外,还对识别植物疾病的机器学习(ML)和深度学习(DL)模型进行了简要调查。此外,从多个方面对最近开发的一套基于DL的番茄植物叶病检测和分类模型进行了综述。为了进一步了解所审查的方法,还进行了详细的比较研究,以认识到所审查的模型的独特特征。
{"title":"Analysis of Plant Disease Detection and Classification Models: A Computer Vision Perspective","authors":"K. Jayaprakash, S. Balamurugan","doi":"10.1166/JCTN.2020.9435","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9435","url":null,"abstract":"Presently, rapid and precise disease identification process plays a vital role to increase agricultural productivity in a sustainable manner. Conventionally, human experts identify the existence of anomaly in plants occurred due to disease, pest, nutrient deficient, weather conditions.\u0000 Since manual diagnosis process is a tedious and time consuming task, computer vision approaches have begun to automatically detect and classify the plant diseases. The general image processing tasks involved in plant disease detection are preprocessing, segmentation, feature extraction and\u0000 classification. This paper performs a review of computer vision based plant disease detection and classification techniques. The existing plant disease detection approaches including segmentation and feature extraction techniques have been reviewed. Additionally, a brief survey of machine\u0000 learning (ML) and deep learning (DL) models to identify plant diseases also takes place. Furthermore, a set of recently developed DL based tomato plant leaf disease detection and classification models are surveyed under diverse aspects. To further understand the reviewed methodologies, a detailed\u0000 comparative study also takes place to recognize the unique characteristics of the reviewed models.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5422-5428"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43485106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Solution for Evidence Forgery Detection 区块链证据伪造检测解决方案
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9454
B. Kumar, K. R. Kumar
Rapidly improving video editing software tools have made video content manipulation feasible. Consequently malicious attackers are trying to manipulate the videos. Detecting video tampering is a major need for many applications. In this paper we propose a model called Evidence chain based on Blockchain to ensure the credibility of the video. Unlike bitcoin which is a digital currency the Proposed system documents video hash by using hash based technology and elliptic curve cryptography. Video segments are hashed and stored in chronological order as a chain of blocks which are detectable and non-altering guaranteeing the validity of the video information. This research is significant in establishing the trust between any two parties.
快速改进的视频编辑软件工具使视频内容操作成为可能。因此,恶意攻击者试图篡改视频。检测视频篡改是许多应用的主要需求。本文提出了一种基于区块链的证据链模型来保证视频的可信度。与数字货币比特币不同,该系统使用基于哈希的技术和椭圆曲线加密来记录视频哈希。视频片段被散列并按时间顺序存储为可检测和不可更改的块链,保证了视频信息的有效性。本研究对于建立双方之间的信任具有重要意义。
{"title":"Blockchain Solution for Evidence Forgery Detection","authors":"B. Kumar, K. R. Kumar","doi":"10.1166/JCTN.2020.9454","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9454","url":null,"abstract":"Rapidly improving video editing software tools have made video content manipulation feasible. Consequently malicious attackers are trying to manipulate the videos. Detecting video tampering is a major need for many applications. In this paper we propose a model called Evidence chain\u0000 based on Blockchain to ensure the credibility of the video. Unlike bitcoin which is a digital currency the Proposed system documents video hash by using hash based technology and elliptic curve cryptography. Video segments are hashed and stored in chronological order as a chain of blocks which\u0000 are detectable and non-altering guaranteeing the validity of the video information. This research is significant in establishing the trust between any two parties.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5570-5576"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43290743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Encryption Towards Data Security in Serverless Computing 无服务器计算中数据安全的改进加密
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9417
A. Arulprakash, K. Sampathkumar
Serverless computing is growing rapidly due to its rapid adoption by the cloud providers and tenants in terms of its scalability, elasticity, flexibility and ease of deployment. Such increase in deployment of serverless computing makes the research to rethink on its security aspects. Since, the serverless security computing may undergo problems due to malicious users or hackers. In this paper, a secure and an efficient access control system is designed for serverless security computing for both knowledge and resource sharing using attributed based encryption. Initially, the data is encrypted using user attributes; further the data is split into cipher text. It is finally decrypted using a decryption algorithm and then the shares of the cipher text are distributed in the network and the encapsulated texts are stored in the serverless system. The performance on security analysis shows that the proposed method achieves improved data security in serverless environment than the existing methods.
无服务器计算在可扩展性、弹性、灵活性和易部署性方面迅速被云提供商和租户采用,因此其发展迅速。无服务器计算部署的增加促使研究人员重新思考其安全方面。因此,无服务器安全计算可能会因恶意用户或黑客而出现问题。本文设计了一个安全高效的访问控制系统,用于基于属性加密的知识共享和资源共享的无服务器安全计算。最初,使用用户属性对数据进行加密;进一步地,数据被分割成密文。最后使用解密算法对其进行解密,然后在网络中分发密文的共享,并将封装的文本存储在无服务器系统中。安全分析性能表明,与现有方法相比,该方法在无服务器环境下实现了更高的数据安全性。
{"title":"Improved Encryption Towards Data Security in Serverless Computing","authors":"A. Arulprakash, K. Sampathkumar","doi":"10.1166/JCTN.2020.9417","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9417","url":null,"abstract":"Serverless computing is growing rapidly due to its rapid adoption by the cloud providers and tenants in terms of its scalability, elasticity, flexibility and ease of deployment. Such increase in deployment of serverless computing makes the research to rethink on its security aspects.\u0000 Since, the serverless security computing may undergo problems due to malicious users or hackers. In this paper, a secure and an efficient access control system is designed for serverless security computing for both knowledge and resource sharing using attributed based encryption. Initially,\u0000 the data is encrypted using user attributes; further the data is split into cipher text. It is finally decrypted using a decryption algorithm and then the shares of the cipher text are distributed in the network and the encapsulated texts are stored in the serverless system. The performance\u0000 on security analysis shows that the proposed method achieves improved data security in serverless environment than the existing methods.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5256-5260"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44741719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Computational and Theoretical Nanoscience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1