首页 > 最新文献

Journal on Internet of Things最新文献

英文 中文
An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks 车辆边缘网络中任务卸载与资源分配的优化方案
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2020.011792
Yuxin Xu, Zilong Jin, Xiaorui Zhang, Lejun Zhang
The vehicle edge network (VEN) has become a new research hotspot in the Internet of Things (IOT). However, many new delays are generated during the vehicle offloading the task to the edge server, which will greatly reduce the quality of service (QOS) provided by the vehicle edge network. To solve this problem, this paper proposes an evolutionary algorithm-based (EA) task offloading and resource allocation scheme. First, the delay of offloading task to the edge server is generally defined, then the mathematical model of problem is given. Finally, the objective function is optimized by evolutionary algorithm, and the optimal solution is obtained by iteration and averaging. To verify the performance of this method, contrast experiments are conducted. The experimental results show that our purposed method reduces delay and improves QOS, which is superior to other schemes.
车辆边缘网络(VEN)已成为物联网领域的一个新的研究热点。然而,在车辆将任务卸载到边缘服务器的过程中会产生许多新的延迟,这将大大降低车辆边缘网络提供的服务质量(QOS)。为了解决这一问题,本文提出了一种基于进化算法的任务卸载和资源分配方案。首先对任务卸载到边缘服务器的延迟进行了一般定义,然后给出了问题的数学模型。最后,采用进化算法对目标函数进行优化,并通过迭代求平均得到最优解。为了验证该方法的性能,进行了对比实验。实验结果表明,该方法降低了时延,提高了服务质量,优于其他方案。
{"title":"An Optimization Scheme for Task Offloading and Resource Allocation in Vehicle Edge Networks","authors":"Yuxin Xu, Zilong Jin, Xiaorui Zhang, Lejun Zhang","doi":"10.32604/jiot.2020.011792","DOIUrl":"https://doi.org/10.32604/jiot.2020.011792","url":null,"abstract":"The vehicle edge network (VEN) has become a new research hotspot in the Internet of Things (IOT). However, many new delays are generated during the vehicle offloading the task to the edge server, which will greatly reduce the quality of service (QOS) provided by the vehicle edge network. To solve this problem, this paper proposes an evolutionary algorithm-based (EA) task offloading and resource allocation scheme. First, the delay of offloading task to the edge server is generally defined, then the mathematical model of problem is given. Finally, the objective function is optimized by evolutionary algorithm, and the optimal solution is obtained by iteration and averaging. To verify the performance of this method, contrast experiments are conducted. The experimental results show that our purposed method reduces delay and improves QOS, which is superior to other schemes.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126646391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tibetan Multi-Dialect Speech Recognition Using Latent Regression Bayesian Network and End-To-End Mode 基于潜在回归贝叶斯网络和端到端模式的藏语多方言语音识别
Pub Date : 1900-01-01 DOI: 10.32604/JIOT.2019.05866
Yue Zhao, Jianjian Yue, Wei Song, Xiaona Xu, Xiali Li, Licheng Wu, Q. Ji
We proposed a method using latent regression Bayesian network (LRBN) to extract the shared speech feature for the input of end-to-end speech recognition model. The structure of LRBN is compact and its parameter learning is fast. Compared with Convolutional Neural Network, it has a simpler and understood structure and less parameters to learn. Experimental results show that the advantage of hybrid LRBN/Bidirectional Long Short-Term Memory-Connectionist Temporal Classification architecture for Tibetan multi-dialect speech recognition, and demonstrate the LRBN is helpful to differentiate among multiple language speech sets.
提出了一种基于潜在回归贝叶斯网络(LRBN)的共享语音特征提取方法,用于端到端语音识别模型的输入。LRBN结构紧凑,参数学习速度快。与卷积神经网络相比,它具有更简单易懂的结构和更少的学习参数。实验结果表明,混合LRBN/双向长短期记忆-连接主义时态分类架构在藏语多方言语音识别中的优势,并证明了LRBN对多语言语音集的区分有帮助。
{"title":"Tibetan Multi-Dialect Speech Recognition Using Latent Regression Bayesian Network and End-To-End Mode","authors":"Yue Zhao, Jianjian Yue, Wei Song, Xiaona Xu, Xiali Li, Licheng Wu, Q. Ji","doi":"10.32604/JIOT.2019.05866","DOIUrl":"https://doi.org/10.32604/JIOT.2019.05866","url":null,"abstract":"We proposed a method using latent regression Bayesian network (LRBN) to extract the shared speech feature for the input of end-to-end speech recognition model. The structure of LRBN is compact and its parameter learning is fast. Compared with Convolutional Neural Network, it has a simpler and understood structure and less parameters to learn. Experimental results show that the advantage of hybrid LRBN/Bidirectional Long Short-Term Memory-Connectionist Temporal Classification architecture for Tibetan multi-dialect speech recognition, and demonstrate the LRBN is helpful to differentiate among multiple language speech sets.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of Things for in Home Health Based Monitoring System: Modern Advances, Challenges and Future Directions 物联网家庭健康监测系统:现代进展、挑战和未来方向
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2022.022256
Omer J. Iqbal, Tayyeba Iftakhar, Saleem Zubair Ahmad
{"title":"Internet of Things for in Home Health Based Monitoring System: Modern Advances, Challenges and Future Directions","authors":"Omer J. Iqbal, Tayyeba Iftakhar, Saleem Zubair Ahmad","doi":"10.32604/jiot.2022.022256","DOIUrl":"https://doi.org/10.32604/jiot.2022.022256","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"76 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Traveling Characteristics and Comparison of Bike Sharing in College Campus–A Case Study in Hangzhou 高校校园共享单车出行特征及对比研究——以杭州市为例
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2020.010107
Yang Tang, Weiwei Liu, Chennan Zhang, Y. He, Ning Ji, Xinyao Chen
{"title":"Research on the Traveling Characteristics and Comparison of Bike Sharing in College Campus–A Case Study in Hangzhou","authors":"Yang Tang, Weiwei Liu, Chennan Zhang, Y. He, Ning Ji, Xinyao Chen","doi":"10.32604/jiot.2020.010107","DOIUrl":"https://doi.org/10.32604/jiot.2020.010107","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121948327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Attacks on the IoT Network with 5G Wireless Communication 基于5G无线通信的物联网网络安全攻击
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2021.015900
Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani
The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by the five G technology, it is subject to many security challenges. In this paper, we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.
近年来,物联网一词越来越受欢迎,并已扩展到我们周围的许多应用中,例如医疗保健应用,智能家居和智能城市,物联网是一组配备传感器的智能设备,具有计算数据的能力,并在其所在的环境中执行动作。它们通过互联网相互连接,最近由于能够提供快速连接等诸多优势,5G技术已经成为支持物联网的技术,尽管5G技术支持的物联网效率很高,但它面临许多安全挑战。在本文中,我们对先前有关物联网安全需求和安全攻击的研究进行了全面的回顾。
{"title":"Security Attacks on the IoT Network with 5G Wireless Communication","authors":"Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani","doi":"10.32604/jiot.2021.015900","DOIUrl":"https://doi.org/10.32604/jiot.2021.015900","url":null,"abstract":"The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency of the IoT supported by the five G technology, it is subject to many security challenges. In this paper, we conducted a comprehensive review of previous research related to the security requirements of the IoT and security attacks.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication in Wireless Body Area Network: Taxonomy and Open Challenges 无线体域网络中的身份验证:分类和开放挑战
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2021.018088
Abdullah M. Almuhaideb, Kawther S. Alqudaihi
: Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related to user and data privacy, anonymity, repudiation, confidentiality, and integrity, but they lack performance efficiency. On the other hand, it is very hard to find the balance between security and efficiency in most of the authentication schemes, especially for the WBAN platform that consists of memory and processing constraint devices. Therefore, this paper surveys and discusses the latest authentication schemes types, techniques, and system features. Also, it highlights their strengths and weaknesses towards common knowingly attacks and provides a comparison between the popular scheme validation proofs and simulation tools. Thence, this paper draws a path for the new direction of the authentication technologies, the authentication schemes open issues, and the potential future evolution in this area.
可穿戴身体区域网络(WBAN)通过支持健康监测服务,帮助医疗服务提供者和患者之间的通信。它通过收集身体信号并将其传输给进一步的处理测量来帮助用户维护他们的健康状态记录。然而,传感器数据是通过不安全的网络公开传输的,这为攻击者进行伪装攻击、中间人攻击和窥探等恶意行为提供了便利。提出了几种验证技术来提高通信通道的安全性,以保护用户数据不被泄露。此外,身份验证方案有助于解决大量与用户和数据隐私性、匿名性、可否认性、机密性和完整性相关的安全问题,但它们缺乏性能效率。另一方面,大多数认证方案很难在安全性和效率之间找到平衡,特别是对于由内存和处理约束设备组成的WBAN平台。因此,本文对最新的认证方案类型、技术和系统特性进行了综述和讨论。此外,它还强调了它们面对常见故意攻击的优缺点,并提供了流行的方案验证证明和仿真工具之间的比较。在此基础上,对认证技术的新方向、认证方案存在的问题以及未来可能的发展方向进行了展望。
{"title":"Authentication in Wireless Body Area Network: Taxonomy and Open Challenges","authors":"Abdullah M. Almuhaideb, Kawther S. Alqudaihi","doi":"10.32604/jiot.2021.018088","DOIUrl":"https://doi.org/10.32604/jiot.2021.018088","url":null,"abstract":": Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related to user and data privacy, anonymity, repudiation, confidentiality, and integrity, but they lack performance efficiency. On the other hand, it is very hard to find the balance between security and efficiency in most of the authentication schemes, especially for the WBAN platform that consists of memory and processing constraint devices. Therefore, this paper surveys and discusses the latest authentication schemes types, techniques, and system features. Also, it highlights their strengths and weaknesses towards common knowingly attacks and provides a comparison between the popular scheme validation proofs and simulation tools. Thence, this paper draws a path for the new direction of the authentication technologies, the authentication schemes open issues, and the potential future evolution in this area.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Development of Generalized Public Bicycles in China and Its Role in the Urban Transportation System 通用公共自行车在中国的发展及其在城市交通系统中的作用
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2020.010108
Yang Tang, Weiwei Liu, Y. He, Yuelin Zhang, Fulong Zhang
{"title":"The Development of Generalized Public Bicycles in China and Its Role in the Urban Transportation System","authors":"Yang Tang, Weiwei Liu, Y. He, Yuelin Zhang, Fulong Zhang","doi":"10.32604/jiot.2020.010108","DOIUrl":"https://doi.org/10.32604/jiot.2020.010108","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133890759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Radiation Cross Calibration Based on GF-1 Side Swing Angle 基于GF-1侧摆角的辐射交叉标定
Pub Date : 1900-01-01 DOI: 10.32604/JIOT.2019.05859
Yong Xie, Z. Tao, Shao Wen, J. Qu, Huan Hai, Tian Chuanyang
Radiation cross-calibration is an effective method to check and verify the accuracy and stability of sensor measurements. Satellites with high radiation accuracy are used to calibrate satellites with low radiation accuracy. In order to ensure the reliability of the radiation cross-calibration method, we propose to obtain the gain and offset of the GaoFen-1 satellite by linear regression after the radiation cross-calibration of the satellite with low precision and compare with the official coefficient. Finally, we get the relationship between the error in radiation cross-calibration results and side swing angle. The linear correction coefficients of each band are: 0.618, 0.625, 0.512 and 0.474. The results show that after the method is corrected by the linear correction coefficient, the error caused by the side swing angle during the cross-calibration of the orbital radiation is reduced. The accuracy of radiation cross-calibration is improved, the frequency of calibration is improved and the requirements of remote sensing applications in the new era are adapted.
辐射交叉校准是检测和验证传感器测量精度和稳定性的有效方法。利用辐射精度高的卫星对辐射精度低的卫星进行标定。为了保证辐射交叉定标方法的可靠性,我们提出对低精度卫星进行辐射交叉定标后,采用线性回归的方法获得高分一号卫星的增益和偏移量,并与官方系数进行比较。最后,得到了辐射交叉标定结果误差与侧摆角的关系。各波段的线性校正系数分别为:0.618、0.625、0.512和0.474。结果表明,采用线性校正系数对方法进行校正后,轨道辐射交叉标定时由于侧摆角引起的误差减小。提高了辐射交叉定标精度,提高了定标频率,适应了新时期遥感应用的要求。
{"title":"Radiation Cross Calibration Based on GF-1 Side Swing Angle","authors":"Yong Xie, Z. Tao, Shao Wen, J. Qu, Huan Hai, Tian Chuanyang","doi":"10.32604/JIOT.2019.05859","DOIUrl":"https://doi.org/10.32604/JIOT.2019.05859","url":null,"abstract":"Radiation cross-calibration is an effective method to check and verify the accuracy and stability of sensor measurements. Satellites with high radiation accuracy are used to calibrate satellites with low radiation accuracy. In order to ensure the reliability of the radiation cross-calibration method, we propose to obtain the gain and offset of the GaoFen-1 satellite by linear regression after the radiation cross-calibration of the satellite with low precision and compare with the official coefficient. Finally, we get the relationship between the error in radiation cross-calibration results and side swing angle. The linear correction coefficients of each band are: 0.618, 0.625, 0.512 and 0.474. The results show that after the method is corrected by the linear correction coefficient, the error caused by the side swing angle during the cross-calibration of the orbital radiation is reduced. The accuracy of radiation cross-calibration is improved, the frequency of calibration is improved and the requirements of remote sensing applications in the new era are adapted.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Automation of a Moving Vehicle at Real Time Along with Position and Condition Tracking 基于位置和状态跟踪的移动车辆实时动态自动化
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2022.022200
Shruti, Soumen Santra, A. Deyasi
{"title":"Dynamic Automation of a Moving Vehicle at Real Time Along with Position and Condition Tracking","authors":"Shruti, Soumen Santra, A. Deyasi","doi":"10.32604/jiot.2022.022200","DOIUrl":"https://doi.org/10.32604/jiot.2022.022200","url":null,"abstract":"","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain MRI Patient Identification Based on Capsule Network 基于胶囊网络的脑MRI患者识别
Pub Date : 1900-01-01 DOI: 10.32604/jiot.2020.09797
Shuqiao Liu, Junliang Li, Xiaojie Li
: In the deep lea rning field, “Capsule” structur e aims to overcome the shortcomings of traditional Convolutional Neural Networks (CNN) which are difficult to mine the relationship between sibling features. Capsule Net (CapsNet) is a new type of classification network structure with “Capsule” as network elements. It uses the “Squashing” algorithm as an activation function and Dynamic Routing as a network optimization method to achieve better classification performance. The main problem of the Brain Magnetic Resonance Imaging (Brain MRI) recognition algorithm is that the di ff erence between Alzheimer’s disease (AD) image, the Mild Cognitive Impairment (MCI) image, and the normal image is not significant. It is di fficult to achieve excellent results using a multi-layer CNN. However, CapsNet can be in the case of a shallower network, which can accommodate more useful feature information for identifying brain MRI. In this paper, we designed a shallow CapsNet to identify patients with brain MRI by binary classification. Compared with VGG1 6, Resnet34, DenseNet121 and ResNeXt50. Experimental results illustrate that CapsNet is superior to CNN network in its accuracy and F1-score. The indicators were 86.67% and 83.33%, respectively. Furthermore, we show that the capsule network shows excellent performance in brain MRI recognition compared with those popular networks.
在深度学习领域,“胶囊”结构旨在克服传统卷积神经网络(CNN)难以挖掘兄弟特征之间关系的缺点。胶囊网(CapsNet)是以“胶囊”为网元的一种新型分类网络结构。采用“压扁”算法作为激活函数,采用动态路由作为网络优化方法,实现了更好的分类性能。脑磁共振成像(Brain MRI)识别算法的主要问题是阿尔茨海默病(AD)图像、轻度认知障碍(MCI)图像与正常图像之间的差异不显著。使用多层CNN很难达到很好的效果。然而,CapsNet可以在一个较浅的网络的情况下,它可以容纳更多有用的特征信息来识别大脑MRI。在本文中,我们设计了一个浅CapsNet,通过二值分类来识别脑MRI患者。与vgg16、Resnet34、DenseNet121、ResNeXt50比较。实验结果表明,CapsNet在准确率和f1分数上都优于CNN网络。指标分别为86.67%和83.33%。此外,我们还证明了胶囊网络在脑MRI识别中表现出了较好的性能。
{"title":"Brain MRI Patient Identification Based on Capsule Network","authors":"Shuqiao Liu, Junliang Li, Xiaojie Li","doi":"10.32604/jiot.2020.09797","DOIUrl":"https://doi.org/10.32604/jiot.2020.09797","url":null,"abstract":": In the deep lea rning field, “Capsule” structur e aims to overcome the shortcomings of traditional Convolutional Neural Networks (CNN) which are difficult to mine the relationship between sibling features. Capsule Net (CapsNet) is a new type of classification network structure with “Capsule” as network elements. It uses the “Squashing” algorithm as an activation function and Dynamic Routing as a network optimization method to achieve better classification performance. The main problem of the Brain Magnetic Resonance Imaging (Brain MRI) recognition algorithm is that the di ff erence between Alzheimer’s disease (AD) image, the Mild Cognitive Impairment (MCI) image, and the normal image is not significant. It is di fficult to achieve excellent results using a multi-layer CNN. However, CapsNet can be in the case of a shallower network, which can accommodate more useful feature information for identifying brain MRI. In this paper, we designed a shallow CapsNet to identify patients with brain MRI by binary classification. Compared with VGG1 6, Resnet34, DenseNet121 and ResNeXt50. Experimental results illustrate that CapsNet is superior to CNN network in its accuracy and F1-score. The indicators were 86.67% and 83.33%, respectively. Furthermore, we show that the capsule network shows excellent performance in brain MRI recognition compared with those popular networks.","PeriodicalId":345256,"journal":{"name":"Journal on Internet of Things","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126917154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1