首页 > 最新文献

Nuclear Engineering International最新文献

英文 中文
A Review of Cybersecurity and Biometric Authentication in Cloud Network 云网络中的网络安全和生物特征认证研究综述
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2022-05-30 DOI: 10.18034/ei.v10i1.652
M. Reddy, Nur Mohammad Ali Chisty, Anusha Bodepudi
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal access. This study addresses cloud security and privacy via biometric face recognition. Cloud users' security and privacy are protected via biometrics recognition. This article discusses CPS and its applications, technologies, and standards. SIGNIFICANT DIFFICULTIES AND CHALLENGES ARE FOUND IN reviewing CPS security weaknesses, threats, and attacks. Presenting and analyzing current security measures and their key drawbacks. Finally, this extensive examination yields various recommendations.
云计算使用很少的资源,通过互联网为客户提供完整的远程服务。数据隐私、安全性和可靠性是云计算的主要问题。安全是最大的问题。本研究探讨生物辨识架构与安全云端计算身分管理方法。本文讨论了云计算的安全挑战,并回顾了云访问框架的方法。提出了一种新的基于指纹访问的认证系统,以保护云服务免受DOS和DDoS攻击。这种基于生物特征的系统可以防止非法访问云服务。本研究通过生物特征面部识别解决云安全和隐私问题。云用户的安全和隐私通过生物识别得到保护。本文讨论了CPS及其应用程序、技术和标准。在审查CPS安全弱点、威胁和攻击时发现了重大的困难和挑战。介绍和分析当前的安全措施及其主要缺点。最后,这种广泛的审查产生了各种建议。
{"title":"A Review of Cybersecurity and Biometric Authentication in Cloud Network","authors":"M. Reddy, Nur Mohammad Ali Chisty, Anusha Bodepudi","doi":"10.18034/ei.v10i1.652","DOIUrl":"https://doi.org/10.18034/ei.v10i1.652","url":null,"abstract":"Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal access. This study addresses cloud security and privacy via biometric face recognition. Cloud users' security and privacy are protected via biometrics recognition. This article discusses CPS and its applications, technologies, and standards. SIGNIFICANT DIFFICULTIES AND CHALLENGES ARE FOUND IN reviewing CPS security weaknesses, threats, and attacks. Presenting and analyzing current security measures and their key drawbacks. Finally, this extensive examination yields various recommendations.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76127853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Security Framework, Techniques, and Design for Hybrid Cloud 混合云的网络安全框架、技术和设计
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2021-12-31 DOI: 10.18034/ei.v9i2.642
Sandesh Achar
Network security is a framework that deals with issuing procedures and policies that will be used to establish and maintain security protocols in a particular organization. The functions related to the network security framework are oriented toward insulating the specific organization from external cyber threats and adversaries. On the other hand, a hybrid cloud is a type of cloud whose function is to allow the running and operating of different applications in various and different environments. The primary technique associated with developing hybrid clouds is the conjunctions between private and public clouds that will allow application portability and management for better and more efficient working of the clouds.  
网络安全是处理发布程序和策略的框架,这些程序和策略将用于在特定组织中建立和维护安全协议。与网络安全框架相关的功能是将特定组织与外部网络威胁和对手隔离开来。另一方面,混合云是一种云,其功能是允许在各种不同的环境中运行和操作不同的应用程序。与开发混合云相关的主要技术是私有云和公共云之间的结合,这将允许应用程序可移植性和管理,从而更好、更有效地运行云。
{"title":"Network Security Framework, Techniques, and Design for Hybrid Cloud","authors":"Sandesh Achar","doi":"10.18034/ei.v9i2.642","DOIUrl":"https://doi.org/10.18034/ei.v9i2.642","url":null,"abstract":"Network security is a framework that deals with issuing procedures and policies that will be used to establish and maintain security protocols in a particular organization. The functions related to the network security framework are oriented toward insulating the specific organization from external cyber threats and adversaries. On the other hand, a hybrid cloud is a type of cloud whose function is to allow the running and operating of different applications in various and different environments. The primary technique associated with developing hybrid clouds is the conjunctions between private and public clouds that will allow application portability and management for better and more efficient working of the clouds. \u0000 ","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80359389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wave Structures for Nonlinear Schrodinger Types Fractional Partial Differential Equations Arise in Physical Sciences 非线性薛定谔型分数阶偏微分方程的波结构在物理科学中出现
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2021-07-30 DOI: 10.18034/EI.V9I2.560
Mst. Nasrin Nahar, M. Islam, Diganta Broto Kar
Nonlinear partial differential equations are mostly renowned for depicting the underlying behavior of nonlinear phenomena relating to the nature of the real world. In this paper, we discuss analytic solutions of fractional-order nonlinear Schrodinger types equations such as the space-time fractional nonlinear Schrodinger equation and the (2+1)-dimensional time-fractional Schrodinger equation. The considered equations are converted into ordinary differential equations with the help of wave variable transformation and then the recently established rational ( )-expansion method is employed to construct the exact solutions. The obtained solutions have appeared in the forms of a trigonometric function, hyperbolic function, and rational function which are compared with those of literature and claimed to be different. The graphical representations of the solutions are finally brought out for their physical appearances. The applied method is seemed to be efficient, concise, and productive which might be used for further research. Mathematics Subject Classifications: 35C08, 35R11
非线性偏微分方程以描述与现实世界有关的非线性现象的潜在行为而闻名。本文讨论了分数阶非线性薛定谔型方程如时空分数阶非线性薛定谔方程和(2+1)维时间分数阶薛定谔方程的解析解。利用波动变量变换将所考虑的方程转化为常微分方程,然后利用最近建立的有理展开法构造精确解。得到的解以三角函数、双曲函数和有理函数的形式出现,并与文献中的解进行了比较,并声称有所不同。最后给出了解的图形表示,以表示其物理外观。所采用的方法简洁、高效,可为今后的研究提供参考。数学学科分类:35C08, 35R11
{"title":"Wave Structures for Nonlinear Schrodinger Types Fractional Partial Differential Equations Arise in Physical Sciences","authors":"Mst. Nasrin Nahar, M. Islam, Diganta Broto Kar","doi":"10.18034/EI.V9I2.560","DOIUrl":"https://doi.org/10.18034/EI.V9I2.560","url":null,"abstract":"Nonlinear partial differential equations are mostly renowned for depicting the underlying behavior of nonlinear phenomena relating to the nature of the real world. In this paper, we discuss analytic solutions of fractional-order nonlinear Schrodinger types equations such as the space-time fractional nonlinear Schrodinger equation and the (2+1)-dimensional time-fractional Schrodinger equation. The considered equations are converted into ordinary differential equations with the help of wave variable transformation and then the recently established rational ( )-expansion method is employed to construct the exact solutions. The obtained solutions have appeared in the forms of a trigonometric function, hyperbolic function, and rational function which are compared with those of literature and claimed to be different. The graphical representations of the solutions are finally brought out for their physical appearances. The applied method is seemed to be efficient, concise, and productive which might be used for further research. \u0000Mathematics Subject Classifications: 35C08, 35R11","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73266130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Significant of Gradient Boosting Algorithm in Data Management System 梯度增强算法在数据管理系统中的意义
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2021-07-20 DOI: 10.18034/EI.V9I2.559
S. Hosen, Ruhul Amin
Gradient boosting machines, the learning process successively fits fresh prototypes to offer a more precise approximation of the response parameter. The principle notion associated with this algorithm is that a fresh base-learner construct to be extremely correlated with the “negative gradient of the loss function” related to the entire ensemble. The loss function's usefulness can be random, nonetheless, for a clearer understanding of this subject, if the “error function is the model squared-error loss”, then the learning process would end up in sequential error-fitting. This study is aimed at delineating the significance of the gradient boosting algorithm in data management systems. The article will dwell much the significance of gradient boosting algorithm in text classification as well as the limitations of this model. The basic methodology as well as the basic-learning algorithm of the gradient boosting algorithms originally formulated by Friedman, is presented in this study. This may serve as an introduction to gradient boosting algorithms. This article has displayed the approach of gradient boosting algorithms. Both the hypothetical system and the plan choices were depicted and outlined. We have examined all the basic stages of planning a specific demonstration for one’s experimental needs. Elucidation issues have been tended to and displayed as a basic portion of the investigation. The capabilities of the gradient boosting algorithms were examined on a set of real-world down-to-earth applications such as text classification.
梯度增强机器,学习过程中不断拟合新的原型,以提供更精确的近似响应参数。与该算法相关的主要概念是,一个新的基础学习器结构与与整个集合相关的“损失函数的负梯度”高度相关。损失函数的有用性可以是随机的,然而,为了更清楚地理解这个主题,如果“误差函数是模型误差损失的平方”,那么学习过程将以顺序误差拟合结束。本研究旨在描述梯度增强算法在数据管理系统中的重要性。本文将详细讨论梯度增强算法在文本分类中的意义以及该模型的局限性。本文提出了Friedman最初提出的梯度增强算法的基本方法和基本学习算法。这可以作为梯度增强算法的介绍。本文展示了梯度增强算法的方法。假设系统和计划选择都被描述和概述。我们已经检查了为满足实验需要而计划具体演示的所有基本阶段。阐明问题已被倾向并显示为调查的基本部分。在一组实际应用程序(如文本分类)上测试了梯度增强算法的能力。
{"title":"Significant of Gradient Boosting Algorithm in Data Management System","authors":"S. Hosen, Ruhul Amin","doi":"10.18034/EI.V9I2.559","DOIUrl":"https://doi.org/10.18034/EI.V9I2.559","url":null,"abstract":"Gradient boosting machines, the learning process successively fits fresh prototypes to offer a more precise approximation of the response parameter. The principle notion associated with this algorithm is that a fresh base-learner construct to be extremely correlated with the “negative gradient of the loss function” related to the entire ensemble. The loss function's usefulness can be random, nonetheless, for a clearer understanding of this subject, if the “error function is the model squared-error loss”, then the learning process would end up in sequential error-fitting. This study is aimed at delineating the significance of the gradient boosting algorithm in data management systems. The article will dwell much the significance of gradient boosting algorithm in text classification as well as the limitations of this model. The basic methodology as well as the basic-learning algorithm of the gradient boosting algorithms originally formulated by Friedman, is presented in this study. This may serve as an introduction to gradient boosting algorithms. This article has displayed the approach of gradient boosting algorithms. Both the hypothetical system and the plan choices were depicted and outlined. We have examined all the basic stages of planning a specific demonstration for one’s experimental needs. Elucidation issues have been tended to and displayed as a basic portion of the investigation. The capabilities of the gradient boosting algorithms were examined on a set of real-world down-to-earth applications such as text classification.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87742899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handwritten Bangla Numerical Digit Recognition Using Fine Regulated Deep Neural Network 基于精细调节深度神经网络的手写体孟加拉数字识别
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2021-07-01 DOI: 10.18034/EI.V9I2.551
Md. Shahadat Hossain, Md Anwar Hossain, A. Abadin, M. Ahmed
The recognition of handwritten Bangla digit is providing significant progress on optical character recognition (OCR). It is a very critical task due to the similar pattern and alignment of handwriting digits. With the progress of modern research on optical character recognition, it is reducing the complexity of the classification task by several methods, a few problems encounter during recognition and wait to be solved with simpler methods. The modern emerging field of artificial intelligence is the Deep Neural Network, which promises a solid solution to these few handwritten recognition problems. This paper proposed a fine regulated deep neural network (FRDNN) for the handwritten numeric character recognition problem that uses convolutional neural network (CNN) models with regularization parameters which makes the model generalized by preventing the overfitting. This paper applied Traditional Deep Neural Network (TDNN) and Fine regulated deep neural network (FRDNN) models with a similar layer experienced on BanglaLekha-Isolated databases and the classification accuracies for the two models were 96.25% and 96.99%, respectively over 100 epochs. The network performance of the FRDNN model on the BanglaLekha-Isolated digit dataset was more robust and accurate than the TDNN model and depend on experimentation. Our proposed method is obtained a good recognition accuracy compared with other existing available methods.
手写体孟加拉数字的识别是光学字符识别(OCR)的重要进展。由于手写数字的相似模式和对齐,这是一项非常关键的任务。随着现代光学字符识别研究的进展,多种方法降低了分类任务的复杂性,识别过程中遇到的一些问题有待于用更简单的方法来解决。现代新兴的人工智能领域是深度神经网络,它有望为这几个手写识别问题提供坚实的解决方案。针对手写体数字字符识别问题,提出了一种精细调节深度神经网络(FRDNN),该网络采用带正则化参数的卷积神经网络(CNN)模型,通过防止过拟合使模型具有泛化性。本文采用传统深度神经网络(TDNN)和精细调节深度神经网络(FRDNN)模型,在banglalkha - isolated数据库上经历了相似的层,两种模型在100 epoch以上的分类准确率分别为96.25%和96.99%。在banglalkha - isolated digit数据集上,FRDNN模型的网络性能比TDNN模型更鲁棒和准确,并且取决于实验。与现有方法相比,该方法具有较好的识别精度。
{"title":"Handwritten Bangla Numerical Digit Recognition Using Fine Regulated Deep Neural Network","authors":"Md. Shahadat Hossain, Md Anwar Hossain, A. Abadin, M. Ahmed","doi":"10.18034/EI.V9I2.551","DOIUrl":"https://doi.org/10.18034/EI.V9I2.551","url":null,"abstract":"The recognition of handwritten Bangla digit is providing significant progress on optical character recognition (OCR). It is a very critical task due to the similar pattern and alignment of handwriting digits. With the progress of modern research on optical character recognition, it is reducing the complexity of the classification task by several methods, a few problems encounter during recognition and wait to be solved with simpler methods. The modern emerging field of artificial intelligence is the Deep Neural Network, which promises a solid solution to these few handwritten recognition problems. This paper proposed a fine regulated deep neural network (FRDNN) for the handwritten numeric character recognition problem that uses convolutional neural network (CNN) models with regularization parameters which makes the model generalized by preventing the overfitting. This paper applied Traditional Deep Neural Network (TDNN) and Fine regulated deep neural network (FRDNN) models with a similar layer experienced on BanglaLekha-Isolated databases and the classification accuracies for the two models were 96.25% and 96.99%, respectively over 100 epochs. The network performance of the FRDNN model on the BanglaLekha-Isolated digit dataset was more robust and accurate than the TDNN model and depend on experimentation. Our proposed method is obtained a good recognition accuracy compared with other existing available methods.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80876543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantum Computing in High Frequency Trading and Fraud Detection 量子计算在高频交易和欺诈检测中的应用
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2021-07-01 DOI: 10.18034/EI.V9I2.549
Apoorva Ganapathy
Quantum Computing in high-frequency trading and fraud detection is an analysis of quantum computing and how it can be used by the different industries especially finance. It is an evolution of computing from the traditional computing method. Quantum computing is a process that is concentrated on creating systems and technology based on quantum theory rules. Quantum theory describes the energy on atomic and subatomic levels. Quantum computing uses quantum bits (qubits) which are more advanced than the traditional bits used by traditional computers. This article focuses on deploying quantum computers in solving problems that cannot be efficiently solved using traditional computers. In the finance sector, such as banking, insurance, and high-frequency trading, quantum computers can help optimize service by providing targeting and predictive analytics to reduce risk, provide personalized customer service, and provide the needed security framework against fraud.
量子计算在高频交易和欺诈检测中的应用是对量子计算及其在不同行业特别是金融领域应用的分析。它是对传统计算方法的一种进化。量子计算是一个专注于基于量子理论规则创建系统和技术的过程。量子理论描述原子和亚原子水平上的能量。量子计算使用比传统计算机使用的传统比特更先进的量子比特(量子位)。本文的重点是利用量子计算机来解决传统计算机无法有效解决的问题。在金融领域,如银行、保险和高频交易,量子计算机可以通过提供目标和预测分析来帮助优化服务,以降低风险,提供个性化的客户服务,并提供所需的安全框架来防止欺诈。
{"title":"Quantum Computing in High Frequency Trading and Fraud Detection","authors":"Apoorva Ganapathy","doi":"10.18034/EI.V9I2.549","DOIUrl":"https://doi.org/10.18034/EI.V9I2.549","url":null,"abstract":"Quantum Computing in high-frequency trading and fraud detection is an analysis of quantum computing and how it can be used by the different industries especially finance. It is an evolution of computing from the traditional computing method. Quantum computing is a process that is concentrated on creating systems and technology based on quantum theory rules. Quantum theory describes the energy on atomic and subatomic levels. Quantum computing uses quantum bits (qubits) which are more advanced than the traditional bits used by traditional computers. This article focuses on deploying quantum computers in solving problems that cannot be efficiently solved using traditional computers. In the finance sector, such as banking, insurance, and high-frequency trading, quantum computers can help optimize service by providing targeting and predictive analytics to reduce risk, provide personalized customer service, and provide the needed security framework against fraud.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85261353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey of the Parameters of the Friction Stir Welding Process of Aluminum Alloys 6xxx Series 6xxx系列铝合金搅拌摩擦焊工艺参数研究
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2021-06-01 DOI: 10.18034/EI.V9I1.548
M. Essa, Fahad Salem Alhajri
Friction stir welding is a modern innovation in the welding processes technology, there are ‎several ways in which this technology has to be investigated in order to refine and make it ‎economically responsible. Aluminum alloys have strong mechanical properties when they are ‎welded by using the Friction Stir welding. Therefore, certain parameters of the welding ‎process need to be examined to achieve the required mechanical properties. In this project, a ‎literature survey has been performed about the friction stir welding process and its parameters ‎for 6xxx series aluminum alloys‎.  
搅拌摩擦焊是现代焊接工艺技术的一项创新,有几种方法来研究这种技术,以改进和使其经济可靠。采用搅拌摩擦焊焊接铝合金具有较强的力学性能。因此,需要检查焊接工艺的某些参数,以达到所需的机械性能。本课题对6xxx系列铝合金搅拌摩擦焊接工艺及其参数进行了文献综述。
{"title":"A Survey of the Parameters of the Friction Stir Welding Process of Aluminum Alloys 6xxx Series","authors":"M. Essa, Fahad Salem Alhajri","doi":"10.18034/EI.V9I1.548","DOIUrl":"https://doi.org/10.18034/EI.V9I1.548","url":null,"abstract":"Friction stir welding is a modern innovation in the welding processes technology, there are ‎several ways in which this technology has to be investigated in order to refine and make it ‎economically responsible. Aluminum alloys have strong mechanical properties when they are ‎welded by using the Friction Stir welding. Therefore, certain parameters of the welding ‎process need to be examined to achieve the required mechanical properties. In this project, a ‎literature survey has been performed about the friction stir welding process and its parameters ‎for 6xxx series aluminum alloys‎. \u0000 ","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74296104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagnosing Epidermal basal Squamous Cell Carcinoma in High-resolution, and Poorly Labeled Histopathological Imaging 在高分辨率和低标记的组织病理成像中诊断表皮基底鳞状细胞癌
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2020-12-31 DOI: 10.18034/ei.v8i2.574
Mani Manavalan
The most appropriate method to uncover patterns from clinical records for each patient record is to create a bag with a variety of examples in the form of symptoms. The goal of medical diagnosis is to find useful ones first and then map them to one or more diseases. Patients are often represented as vectors in some aspect. Pathologists and dermatopathologists diagnose basal cell carcinomas (BCC), one of the most frequent cutaneous cancers in humans, on a regular basis. Improving histological diagnosis by producing diagnosis ideas, i.e. computer-assisted diagnoses, is a hotly debated research topic aimed at improving safety, quality, and efficiency. Due to their improved performance, machine learning approaches are rapidly being used. Typical images obtained by scanning histological sections, on the other hand, frequently have a resolution insufficient for today's state-of-the-art neural networks. Furthermore, weak labels hamper network training because just a small portion of the image signals the disease class, while the majority of the image is strikingly comparable to the non-disease class. The goal of this work is to see if attention-based deep learning models can detect basal cell carcinomas in histological sections and overcome the ultra-high resolution and poor labeling of full slide images. With an AUC of 0.99, we show that attention-based models can achieve nearly flawless classification performance.
从每个患者的临床记录中发现模式的最合适方法是创建一个包,其中包含各种症状形式的示例。医学诊断的目标是首先找到有用的,然后将它们映射到一种或多种疾病上。在某些方面,患者通常被表示为载体。病理学家和皮肤病理学家经常诊断基底细胞癌(BCC),这是人类最常见的皮肤癌之一。通过产生诊断思想,即计算机辅助诊断来改善组织学诊断,是一个备受争议的研究课题,旨在提高安全性、质量和效率。由于其性能的提高,机器学习方法正在迅速得到应用。另一方面,通过扫描组织学切片获得的典型图像通常具有当今最先进的神经网络无法满足的分辨率。此外,弱标签阻碍了网络训练,因为只有一小部分图像标记了疾病类别,而大多数图像与非疾病类别惊人地相似。这项工作的目的是看看基于注意力的深度学习模型是否可以在组织学切片中检测基底细胞癌,并克服全幻灯片图像的超高分辨率和差标记。AUC为0.99,表明基于注意力的模型可以实现近乎完美的分类性能。
{"title":"Diagnosing Epidermal basal Squamous Cell Carcinoma in High-resolution, and Poorly Labeled Histopathological Imaging","authors":"Mani Manavalan","doi":"10.18034/ei.v8i2.574","DOIUrl":"https://doi.org/10.18034/ei.v8i2.574","url":null,"abstract":"The most appropriate method to uncover patterns from clinical records for each patient record is to create a bag with a variety of examples in the form of symptoms. The goal of medical diagnosis is to find useful ones first and then map them to one or more diseases. Patients are often represented as vectors in some aspect. Pathologists and dermatopathologists diagnose basal cell carcinomas (BCC), one of the most frequent cutaneous cancers in humans, on a regular basis. Improving histological diagnosis by producing diagnosis ideas, i.e. computer-assisted diagnoses, is a hotly debated research topic aimed at improving safety, quality, and efficiency. Due to their improved performance, machine learning approaches are rapidly being used. Typical images obtained by scanning histological sections, on the other hand, frequently have a resolution insufficient for today's state-of-the-art neural networks. Furthermore, weak labels hamper network training because just a small portion of the image signals the disease class, while the majority of the image is strikingly comparable to the non-disease class. The goal of this work is to see if attention-based deep learning models can detect basal cell carcinomas in histological sections and overcome the ultra-high resolution and poor labeling of full slide images. With an AUC of 0.99, we show that attention-based models can achieve nearly flawless classification performance.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75529868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Convolution Neural Network for Digital Image Processing 卷积神经网络在数字图像处理中的应用
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2020-12-31 DOI: 10.18034/ei.v8i2.592
Venkata Naga Satya Surendra Chimakurthi
In order to train neural network algorithms for multiple machine learning tasks, like the division of distinct categories of objects, various deep learning approaches employ data. Convolutional neural networks deep learning algorithms are quite strong when it comes to image processing. With the recent development of multi-layer convolutional neural networks for high-level tasks like object recognition, object acquisition, and recent semantic classification, the field has seen great success in this approach. The two-phase approach is frequently employed in semantic segregation. In the second step of becoming a standard global graphical model, communication networks are educated to deliver good local intelligence with a pixel. Convolutional Neural Networks (CNN or ConvNet) are complicated neural server networks in the field of artificial intelligence. Because of their great accuracy, convolutional neural networks (CNNs) are frequently utilized in picture categorization and recognition. In the late 1990s, Yann LeCun, a computer scientist, was based on the human notion of cognition and came up with the idea. When constructing a network, CNN uses a hierarchical model that eventually results in a convolution layer in which all neurons are linked and output is processed. Using an example of an image processing application, this article demonstrates how the CNN architecture is implemented in its entirety. You can utilize this to better comprehend the advantages of this current photography website.  
为了训练神经网络算法来完成多个机器学习任务,比如对不同类别的对象进行划分,各种深度学习方法都使用了数据。卷积神经网络深度学习算法在图像处理方面非常强大。随着最近多层卷积神经网络在高级任务(如对象识别、对象获取和最近的语义分类)中的发展,该领域在这种方法上取得了巨大的成功。语义分离通常采用两阶段方法。在成为标准的全球图形模型的第二步中,通信网络被训练为通过像素传递良好的局部情报。卷积神经网络(CNN或ConvNet)是人工智能领域中较为复杂的神经服务器网络。卷积神经网络(convolutional neural networks, cnn)由于其极高的准确率,被广泛应用于图像分类和识别。上世纪90年代末,计算机科学家扬·勒昆(Yann LeCun)基于人类的认知概念提出了这个想法。在构建网络时,CNN使用分层模型,最终形成一个卷积层,其中所有神经元都被连接起来并对输出进行处理。本文使用一个图像处理应用程序的示例,演示了如何完整地实现CNN架构。你可以利用这一点来更好地理解这个当前摄影网站的优势。
{"title":"Application of Convolution Neural Network for Digital Image Processing","authors":"Venkata Naga Satya Surendra Chimakurthi","doi":"10.18034/ei.v8i2.592","DOIUrl":"https://doi.org/10.18034/ei.v8i2.592","url":null,"abstract":"In order to train neural network algorithms for multiple machine learning tasks, like the division of distinct categories of objects, various deep learning approaches employ data. Convolutional neural networks deep learning algorithms are quite strong when it comes to image processing. With the recent development of multi-layer convolutional neural networks for high-level tasks like object recognition, object acquisition, and recent semantic classification, the field has seen great success in this approach. The two-phase approach is frequently employed in semantic segregation. In the second step of becoming a standard global graphical model, communication networks are educated to deliver good local intelligence with a pixel. Convolutional Neural Networks (CNN or ConvNet) are complicated neural server networks in the field of artificial intelligence. Because of their great accuracy, convolutional neural networks (CNNs) are frequently utilized in picture categorization and recognition. In the late 1990s, Yann LeCun, a computer scientist, was based on the human notion of cognition and came up with the idea. When constructing a network, CNN uses a hierarchical model that eventually results in a convolution layer in which all neurons are linked and output is processed. Using an example of an image processing application, this article demonstrates how the CNN architecture is implemented in its entirety. You can utilize this to better comprehend the advantages of this current photography website. \u0000 ","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83396546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Maximizing the Potential of Artificial Intelligence to Perform Evaluations in Ungauged Washbowls 最大限度地发挥人工智能在未计量的洗衣机中进行评估的潜力
IF 0.6 4区 工程技术 Q4 Engineering Pub Date : 2020-12-31 DOI: 10.18034/ei.v8i2.636
Sandesh Achar
Long short-term memory networks (LSTM) offer precision in the prediction that has never been seen before in ungauged basins. Using k-fold validation, we trained and evaluated several LSTMs in this study on 531 basins from the CAMELS data set. This allowed us to make predictions in basins for which we did not have any training data. The implication is that there is usually sufficient information in available catchment attributes data about similarities and differences between catchment-level rainfall-runoff behaviors to generate out-of-sample simulations that are generally more accurate than current models when operating under ideal (i.e., calibrated) conditions, i.e., when using under idealized conditions. In other words, existing models are generally less accurate when working under idealized conditions than out-of-sample simulations. We found evidence that including physical limits in LSTM models improves simulations, which we believe should be the primary focus of future research on physics-guided artificial intelligence. Putting in place additional physical constraints on the LSTM models.
长短期记忆网络(LSTM)提供了在未测量的盆地中从未见过的预测精度。通过k-fold验证,我们对来自camel数据集的531个盆地的lstm进行了训练和评估。这使我们能够在没有任何训练数据的盆地中进行预测。这意味着,在可用的集水区属性数据中,通常有足够的关于集水区降雨径流行为之间的相似性和差异性的信息,从而产生样本外模拟,当在理想(即校准)条件下运行时,即在理想条件下使用时,通常比当前模型更准确。换句话说,在理想条件下工作时,现有模型通常不如样本外模拟准确。我们发现有证据表明,在LSTM模型中加入物理限制可以改善模拟,我们认为这应该是未来物理引导人工智能研究的主要焦点。在LSTM模型上添加额外的物理约束。
{"title":"Maximizing the Potential of Artificial Intelligence to Perform Evaluations in Ungauged Washbowls","authors":"Sandesh Achar","doi":"10.18034/ei.v8i2.636","DOIUrl":"https://doi.org/10.18034/ei.v8i2.636","url":null,"abstract":"Long short-term memory networks (LSTM) offer precision in the prediction that has never been seen before in ungauged basins. Using k-fold validation, we trained and evaluated several LSTMs in this study on 531 basins from the CAMELS data set. This allowed us to make predictions in basins for which we did not have any training data. The implication is that there is usually sufficient information in available catchment attributes data about similarities and differences between catchment-level rainfall-runoff behaviors to generate out-of-sample simulations that are generally more accurate than current models when operating under ideal (i.e., calibrated) conditions, i.e., when using under idealized conditions. In other words, existing models are generally less accurate when working under idealized conditions than out-of-sample simulations. We found evidence that including physical limits in LSTM models improves simulations, which we believe should be the primary focus of future research on physics-guided artificial intelligence. Putting in place additional physical constraints on the LSTM models.","PeriodicalId":49736,"journal":{"name":"Nuclear Engineering International","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73690302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Nuclear Engineering International
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1