首页 > 最新文献

2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)最新文献

英文 中文
Age Detection from Brain MRI Images Using the Deep Learning 基于深度学习的脑MRI图像年龄检测
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964911
Masoumeh Siar, M. Teshnehlab
Estimating the age of the brains of individuals from brain images can be very useful in many applications. The brain’s age has greatly contributed to predicting and preventing early deaths in the medical community. It can also be very useful for diagnosing diseases, such as Alzheimer’s. According to the authors knowledge, this paper is one of the first researches that have been done in age detection by brain images using Deep Learning (DL). In this paper, the convolution neural network (CNN), used for age detection from brain magnetic resonance images (MRI). The images used in this paper are from the imaging centers and collected by the author of the paper. In this paper 1290 images have been collected, 941 images for train data and 349 images for test images. Images collected at the centers were labeled age. In this paper, the Alexnet model is used in CNN architecture. The used architecture of the architecture has 5 Convolutional layers and 3 Sub-sampling layers that the last layer has been used to categorize the image. The CNN that the last layer has been used to categorize the images into five age classes.The accuracy of the CNN is obtained by the Softmax classifier 79%, Support Vector Machine (SVM) classifier 75% and the Decision Tree (DT) classifier, 49%. In addition to the accuracy criterion, we use the benchmarks of Recall, Precision and F1-Score to evaluate network performance.
从大脑图像中估计个体大脑的年龄在许多应用中都是非常有用的。在医学界,大脑的年龄对预测和预防过早死亡有很大的帮助。它对诊断疾病也非常有用,比如阿尔茨海默氏症。据作者所知,这篇论文是利用深度学习(Deep Learning, DL)进行脑图像年龄检测的首批研究之一。本文采用卷积神经网络(CNN),从脑磁共振图像(MRI)中进行年龄检测。本文使用的图像来自影像中心,由作者自行收集。本文共收集了1290张图像,其中941张为训练数据图像,349张为测试图像。在中心收集的图像被标记为年龄。本文将Alexnet模型应用于CNN架构中。该架构使用的架构有5个卷积层和3个子采样层,最后一层已经被用来对图像进行分类。CNN表示,最后一层已经被用来将图像分为五个年龄类。Softmax分类器的准确率为79%,支持向量机(SVM)分类器为75%,决策树(DT)分类器为49%。除了准确性标准外,我们还使用召回率,精度和F1-Score的基准来评估网络性能。
{"title":"Age Detection from Brain MRI Images Using the Deep Learning","authors":"Masoumeh Siar, M. Teshnehlab","doi":"10.1109/ICCKE48569.2019.8964911","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964911","url":null,"abstract":"Estimating the age of the brains of individuals from brain images can be very useful in many applications. The brain’s age has greatly contributed to predicting and preventing early deaths in the medical community. It can also be very useful for diagnosing diseases, such as Alzheimer’s. According to the authors knowledge, this paper is one of the first researches that have been done in age detection by brain images using Deep Learning (DL). In this paper, the convolution neural network (CNN), used for age detection from brain magnetic resonance images (MRI). The images used in this paper are from the imaging centers and collected by the author of the paper. In this paper 1290 images have been collected, 941 images for train data and 349 images for test images. Images collected at the centers were labeled age. In this paper, the Alexnet model is used in CNN architecture. The used architecture of the architecture has 5 Convolutional layers and 3 Sub-sampling layers that the last layer has been used to categorize the image. The CNN that the last layer has been used to categorize the images into five age classes.The accuracy of the CNN is obtained by the Softmax classifier 79%, Support Vector Machine (SVM) classifier 75% and the Decision Tree (DT) classifier, 49%. In addition to the accuracy criterion, we use the benchmarks of Recall, Precision and F1-Score to evaluate network performance.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"34 1","pages":"369-374"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89204174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication-Critical Task Duplication for Cloud Workflow Scheduling with Time and Budget Concerns 通信关键任务复制的云工作流程调度与时间和预算问题
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965163
Mohammad Kamyar Arbab, Mahmoud Naghibzadeh, S. R. Kamel Tabbakh
scientific workflows are suitable models in many applications for recognition and execution of tasks in parallel, especially in the Cloud. Different aspects of resource provisioning and the resource pricing model in the cloud environment cause the scheduling problem of workflow very complex. One of the main aims of the scheduling algorithms is to satisfy the users’ different quality of service requirements. Communication delay between tasks is an important affecting factor in optimal scheduling of workflows. It can also highly increase the cost of workflow scheduling if proper actions are not taken. To solve this problem, we propose a tasks duplication-based list scheduling algorithm called Communication-Critical Task Duplication (CCTD). We first define the concept of communication critical task (CCT) for a workflow. Then, by presenting a ranking-based approach, we identify communication critical tasks in a workflow as well as duplicating candidates. Task duplication in idle time slots of leased virtual machines which their children tasks are mapped to. This idea, while eliminating the cost and time of data transfer between parent-child tasks, reduces the time of execution of tasks and effectively uses leased time intervals of resources. According to the proposed scheduling algorithm, a new heuristic method has been proposed for the budget distribution. This method distribute overall budget to tasks in proportional to the workload and duplication rank of each task. The proposed algorithm was evaluated and verified using four well-known scientific workflows. The simulation results show that the CCTD algorithm, while respecting the user budget constraint, reduces the workflow overall completion time.
在许多应用程序中,科学工作流是并行识别和执行任务的合适模型,特别是在云中。云环境中资源配置和资源定价模型的不同,使得工作流的调度问题非常复杂。调度算法的主要目的之一是满足用户对服务质量的不同要求。任务间通信延迟是影响工作流优化调度的重要因素。如果不采取适当的措施,它还会大大增加工作流调度的成本。为了解决这个问题,我们提出了一种基于任务重复的列表调度算法,称为通信关键任务复制(CCTD)。我们首先定义工作流的通信关键任务(CCT)的概念。然后,通过提出一种基于排名的方法,我们确定了工作流中的通信关键任务以及重复的候选任务。它们的子任务映射到租用虚拟机的空闲时隙中的任务重复。这种思想在消除父子任务之间数据传输的成本和时间的同时,减少了任务的执行时间,并有效地利用了资源的租用时间间隔。根据所提出的调度算法,提出了一种新的启发式预算分配方法。该方法根据每个任务的工作量和重复程度,将总预算按比例分配给任务。采用四种著名的科学工作流对该算法进行了评估和验证。仿真结果表明,CCTD算法在尊重用户预算约束的前提下,缩短了工作流的总体完成时间。
{"title":"Communication-Critical Task Duplication for Cloud Workflow Scheduling with Time and Budget Concerns","authors":"Mohammad Kamyar Arbab, Mahmoud Naghibzadeh, S. R. Kamel Tabbakh","doi":"10.1109/ICCKE48569.2019.8965163","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965163","url":null,"abstract":"scientific workflows are suitable models in many applications for recognition and execution of tasks in parallel, especially in the Cloud. Different aspects of resource provisioning and the resource pricing model in the cloud environment cause the scheduling problem of workflow very complex. One of the main aims of the scheduling algorithms is to satisfy the users’ different quality of service requirements. Communication delay between tasks is an important affecting factor in optimal scheduling of workflows. It can also highly increase the cost of workflow scheduling if proper actions are not taken. To solve this problem, we propose a tasks duplication-based list scheduling algorithm called Communication-Critical Task Duplication (CCTD). We first define the concept of communication critical task (CCT) for a workflow. Then, by presenting a ranking-based approach, we identify communication critical tasks in a workflow as well as duplicating candidates. Task duplication in idle time slots of leased virtual machines which their children tasks are mapped to. This idea, while eliminating the cost and time of data transfer between parent-child tasks, reduces the time of execution of tasks and effectively uses leased time intervals of resources. According to the proposed scheduling algorithm, a new heuristic method has been proposed for the budget distribution. This method distribute overall budget to tasks in proportional to the workload and duplication rank of each task. The proposed algorithm was evaluated and verified using four well-known scientific workflows. The simulation results show that the CCTD algorithm, while respecting the user budget constraint, reduces the workflow overall completion time.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"24 1","pages":"255-262"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87529148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Increasing The Network Control Ability and Flexibility In Incremental Switch Deployment for Hybrid Software-Defined Networks 在混合型软件定义网络中增加交换机部署的网络控制能力和灵活性
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965051
Amir Hossein Fakhteh, Vahid Sattari-Naeini, H. Naji
Software-Defined Network is a new networking generation to increase network flexibility and performance improvement. However, budget constraints, technical limitations and the risk of architectural changes that organizations are encountered with, are barriers to the full implementation of the SDN. For these reasons, Internet Service Providers (ISPs) should replace only a limited number of conventional switches with SDN switches at one time. Put both switches together in a topology, create hybrid SDN. In this paper, we first cluster the switches into two clusters, based on a graph concept which is called closeness-centrality. Afterward, we have one cluster with low closeness centrality and another with high; then, we propose a heuristic migration scheme for deploying SDN switches in hybrid SDNs. We first allocate all existing budget to a cluster at low closeness-centrality and then we upgrade the switches according to the proposed scheme. There are four main issues in this paper: (1) improving the network control ability with a given upgrading budget constraint, (2) minimizing the upgrading cost to achieve the best network control ability, (3) increasing hybrid SDN flexibility and (4) improving network fault tolerance by deploying a link fault recovery algorithm. Also, in order to perform controller placement, we propose a simple solution to provide an acceptable delay between controller and SDN switches. We evaluate our scheme in three real topologies and one synthetic topology. The results show that our scheme can achieve better network control ability and flexibility with the help of graph theory parameters compared to other related papers according to budget constraint.
软件定义网络是增加网络灵活性和提高网络性能的新一代网络。然而,预算限制、技术限制和组织所遇到的体系结构变更的风险是全面实现SDN的障碍。由于这些原因,互联网服务提供商(isp)一次只应该用SDN交换机替换有限数量的传统交换机。将两个交换机放在一个拓扑结构中,创建混合SDN。在本文中,我们首先基于一个被称为接近中心性的图概念将开关聚类成两个簇。然后,我们得到一个低接近中心性的集群和一个高接近中心性的集群;然后,我们提出了一种启发式迁移方案,用于在混合SDN中部署SDN交换机。我们首先将所有现有预算以低接近中心性分配到集群中,然后根据所提出的方案对交换机进行升级。本文主要研究四个问题:(1)在给定升级预算约束下提高网络控制能力;(2)最小化升级成本以获得最佳网络控制能力;(3)增加混合SDN灵活性;(4)通过部署链路故障恢复算法提高网络容错性。此外,为了执行控制器放置,我们提出了一个简单的解决方案,在控制器和SDN交换机之间提供可接受的延迟。我们在三个真实拓扑和一个合成拓扑中对我们的方案进行了评估。结果表明,在预算约束下,我们的方案在图论参数的帮助下,比其他相关论文具有更好的网络控制能力和灵活性。
{"title":"Increasing The Network Control Ability and Flexibility In Incremental Switch Deployment for Hybrid Software-Defined Networks","authors":"Amir Hossein Fakhteh, Vahid Sattari-Naeini, H. Naji","doi":"10.1109/ICCKE48569.2019.8965051","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965051","url":null,"abstract":"Software-Defined Network is a new networking generation to increase network flexibility and performance improvement. However, budget constraints, technical limitations and the risk of architectural changes that organizations are encountered with, are barriers to the full implementation of the SDN. For these reasons, Internet Service Providers (ISPs) should replace only a limited number of conventional switches with SDN switches at one time. Put both switches together in a topology, create hybrid SDN. In this paper, we first cluster the switches into two clusters, based on a graph concept which is called closeness-centrality. Afterward, we have one cluster with low closeness centrality and another with high; then, we propose a heuristic migration scheme for deploying SDN switches in hybrid SDNs. We first allocate all existing budget to a cluster at low closeness-centrality and then we upgrade the switches according to the proposed scheme. There are four main issues in this paper: (1) improving the network control ability with a given upgrading budget constraint, (2) minimizing the upgrading cost to achieve the best network control ability, (3) increasing hybrid SDN flexibility and (4) improving network fault tolerance by deploying a link fault recovery algorithm. Also, in order to perform controller placement, we propose a simple solution to provide an acceptable delay between controller and SDN switches. We evaluate our scheme in three real topologies and one synthetic topology. The results show that our scheme can achieve better network control ability and flexibility with the help of graph theory parameters compared to other related papers according to budget constraint.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"87 1","pages":"263-268"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83773948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[ICCKE 2019 Authors]
Pub Date : 2019-10-01 DOI: 10.1109/iccke48569.2019.8964957
{"title":"[ICCKE 2019 Authors]","authors":"","doi":"10.1109/iccke48569.2019.8964957","DOIUrl":"https://doi.org/10.1109/iccke48569.2019.8964957","url":null,"abstract":"","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82489942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Epileptic seizures detection in EEG signals using TQWT and ensemble learning 基于TQWT和集成学习的脑电信号癫痫发作检测
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964826
Navid Ghassemi, A. Shoeibi, M. Rouhani, Hossein Hosseini-Nejad
In this paper, a new scheme for diagnosis of epileptic seizures in EEG signals using Tunable-Q wavelet transform (TQWT) framework is proposed and benchmarked with Bonn dataset. First, a segmentation of the EEG signals into smaller windows is performed, then a high-pass Butterworth filter with a cutoff frequency of 0.5 Hz is applied to eliminate possible noise. After that, a TQWT with parameters J=8, r=3, Q=1 has been utilized for decomposing the segmented EEG Signals into nine sub-bands. Next, a combination of statistical, entropy-based, and fractal dimension features are extracted from each sub-band. Finally, different ensemble learning-based classifiers, specifically, Adaboost, Gradient Boosting (GB), Hist Gradient Boosting (HistGB), and Random Forest (RF) are employed to classify signals. Also, a feature ranking is driven from classifiers to further analyze the importance of each feature in this particular task. Comparing our method to previous ones, introduced scheme outperforms most of the state-of-the-art works in this field, indicating the effectiveness of the proposed epileptic seizures detection method.
本文提出了一种基于可调q小波变换(TQWT)框架的脑电信号癫痫发作诊断新方案,并利用波恩数据集进行了基准测试。首先,将EEG信号分割成较小的窗口,然后应用截止频率为0.5 Hz的高通巴特沃斯滤波器来消除可能的噪声。然后,利用参数J=8, r=3, Q=1的TQWT将分割后的脑电信号分解为9个子带。接下来,从每个子带中提取统计、基于熵和分形维数的组合特征。最后,采用不同的基于集成学习的分类器Adaboost、Gradient Boosting (GB)、Hist Gradient Boosting (HistGB)和Random Forest (RF)对信号进行分类。此外,从分类器中驱动特征排序,以进一步分析每个特征在该特定任务中的重要性。将我们的方法与之前的方法进行比较,所介绍的方案优于该领域的大多数最新工作,表明所提出的癫痫发作检测方法的有效性。
{"title":"Epileptic seizures detection in EEG signals using TQWT and ensemble learning","authors":"Navid Ghassemi, A. Shoeibi, M. Rouhani, Hossein Hosseini-Nejad","doi":"10.1109/ICCKE48569.2019.8964826","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964826","url":null,"abstract":"In this paper, a new scheme for diagnosis of epileptic seizures in EEG signals using Tunable-Q wavelet transform (TQWT) framework is proposed and benchmarked with Bonn dataset. First, a segmentation of the EEG signals into smaller windows is performed, then a high-pass Butterworth filter with a cutoff frequency of 0.5 Hz is applied to eliminate possible noise. After that, a TQWT with parameters J=8, r=3, Q=1 has been utilized for decomposing the segmented EEG Signals into nine sub-bands. Next, a combination of statistical, entropy-based, and fractal dimension features are extracted from each sub-band. Finally, different ensemble learning-based classifiers, specifically, Adaboost, Gradient Boosting (GB), Hist Gradient Boosting (HistGB), and Random Forest (RF) are employed to classify signals. Also, a feature ranking is driven from classifiers to further analyze the importance of each feature in this particular task. Comparing our method to previous ones, introduced scheme outperforms most of the state-of-the-art works in this field, indicating the effectiveness of the proposed epileptic seizures detection method.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"48 1","pages":"403-408"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91352687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Electronic voting through DE-PBFT consensus and DAG data structure 通过DE-PBFT共识和DAG数据结构进行电子投票
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8965093
J. Bahri, Hamid Reza Shayegh Borojeni
Electronic voting systems are one of the most important issues in today's world. At the present time, most systems are traditional and centralized, and the counting of votes is done by a central party, and security depends on cryptographic techniques. Therefore, the need to create decentralized voting systems is increasing day by day, so in this way, preservation and counting of votes are done directly with the help of a consensus algorithm. Having the difficulties mentioned above, this paper presents an unbiased electronic voting model in which the votes from ballot boxes are sent to the candidates, and the candidates should confirm the received votes, after candidates' confirmation, they agree on the received votes by running an DE-PBFT consensus, and then add votes in their DAG data structure . In this way, all candidates are responsible for maintaining, validating and counting votes, and the trust through consensus protocols is provided in a decentralized system. The voter's anonymity has also been preserved through ring signature.
电子投票系统是当今世界最重要的问题之一。目前,大多数系统都是传统的、集中式的,计票由一个中央政党完成,安全性依赖于加密技术。因此,创建去中心化投票系统的需求日益增加,因此通过这种方式,选票的保存和计数是在共识算法的帮助下直接完成的。针对上述困难,本文提出了一种无偏电子投票模型,该模型将投票箱中的选票发送给候选人,候选人对收到的选票进行确认,候选人确认后,通过运行DE-PBFT共识对收到的选票达成一致,然后将选票添加到他们的DAG数据结构中。通过这种方式,所有候选人都负责维护,验证和计数选票,并且通过共识协议在分散的系统中提供信任。选民的匿名性也通过戒指签名得以保留。
{"title":"Electronic voting through DE-PBFT consensus and DAG data structure","authors":"J. Bahri, Hamid Reza Shayegh Borojeni","doi":"10.1109/ICCKE48569.2019.8965093","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8965093","url":null,"abstract":"Electronic voting systems are one of the most important issues in today's world. At the present time, most systems are traditional and centralized, and the counting of votes is done by a central party, and security depends on cryptographic techniques. Therefore, the need to create decentralized voting systems is increasing day by day, so in this way, preservation and counting of votes are done directly with the help of a consensus algorithm. Having the difficulties mentioned above, this paper presents an unbiased electronic voting model in which the votes from ballot boxes are sent to the candidates, and the candidates should confirm the received votes, after candidates' confirmation, they agree on the received votes by running an DE-PBFT consensus, and then add votes in their DAG data structure . In this way, all candidates are responsible for maintaining, validating and counting votes, and the trust through consensus protocols is provided in a decentralized system. The voter's anonymity has also been preserved through ring signature.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"11 1","pages":"391-396"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78084993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Brief Review on Vessel Extraction and Tracking Methods 血管提取与跟踪方法综述
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964824
F. Z. Boroujeni, Simindokht Jahangard, R. Rahmat
Extracting an accurate skeletal representation of coronary arteries is an important step for subsequent analysis of angiography images such as image registration and 3D reconstruction of the arterial tree. This step is usually performed by enhancing vessel-like objects in the image, in order to differentiate between blood vessels and background, followed by applying the thinning algorithm to obtain the final output. Another approach is direct extraction of centerline points using exploratory tracing algorithm preceded by a seed point detection schema to provide a set of reliable starting points for the tracing algorithm. A large number of methods fall in these two approaches and this paper aims to contrast them through a brief review of their innate characteristics, associated limitations and current challenges and issues.
提取准确的冠状动脉骨架表示是后续血管造影图像分析的重要步骤,如图像配准和动脉树的三维重建。这一步通常是通过增强图像中的血管样物体来区分血管和背景,然后应用细化算法来获得最终输出。另一种方法是使用探索性跟踪算法直接提取中心线点,然后使用种子点检测模式为跟踪算法提供一组可靠的起始点。大量的方法落在这两种方法,本文旨在通过他们的先天特点,相关的局限性和当前的挑战和问题的简要回顾,对比他们。
{"title":"A Brief Review on Vessel Extraction and Tracking Methods","authors":"F. Z. Boroujeni, Simindokht Jahangard, R. Rahmat","doi":"10.1109/ICCKE48569.2019.8964824","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964824","url":null,"abstract":"Extracting an accurate skeletal representation of coronary arteries is an important step for subsequent analysis of angiography images such as image registration and 3D reconstruction of the arterial tree. This step is usually performed by enhancing vessel-like objects in the image, in order to differentiate between blood vessels and background, followed by applying the thinning algorithm to obtain the final output. Another approach is direct extraction of centerline points using exploratory tracing algorithm preceded by a seed point detection schema to provide a set of reliable starting points for the tracing algorithm. A large number of methods fall in these two approaches and this paper aims to contrast them through a brief review of their innate characteristics, associated limitations and current challenges and issues.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"8 1","pages":"46-52"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85360074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain Tumor Detection Using Deep Neural Network and Machine Learning Algorithm 基于深度神经网络和机器学习算法的脑肿瘤检测
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964846
Masoumeh Siar, M. Teshnehlab
Brain tumor can be classified into two types: benign and malignant. Timely and prompt disease detection and treatment plan leads to improved quality of life and increased life expectancy in these patients. One of the most practical and important methods is to use Deep Neural Network (DNN). In this paper, a Convolutional Neural Network (CNN) has been used to detect a tumor through brain Magnetic Resonance Imaging (MRI) images. Images were first applied to the CNN. The accuracy of Softmax Fully Connected layer used to classify images obtained 98.67%. Also, the accuracy of the CNN is obtained with the Radial Basis Function (RBF) classifier 97.34% and the Decision Tree (DT) classifier, is 94.24%. In addition to the accuracy criterion, we use the benchmarks of Sensitivity, Specificity and Precision evaluate network performance. According to the results obtained from the categorizers, the Softmax classifier has the best accuracy in the CNN according to the results obtained from network accuracy on the image testing. This is a new method based on the combination of feature extraction techniques with the CNN for tumor detection from brain images. The method proposed accuracy 99.12% on the test data. Due to the importance of the diagnosis given by the physician, the accuracy of the doctors help in diagnosing the tumor and treating the patient increased.
脑肿瘤可分为良性和恶性两种。及时和迅速的疾病检测和治疗计划可以改善这些患者的生活质量和延长预期寿命。其中最实用和重要的方法之一是使用深度神经网络(DNN)。在本文中,卷积神经网络(CNN)已被用于通过脑磁共振成像(MRI)图像检测肿瘤。图像首先应用于CNN。Softmax full Connected layer用于图像分类的准确率达到了98.67%。采用径向基函数(RBF)分类器和决策树(DT)分类器分别获得了97.34%和94.24%的准确率。除了准确性标准外,我们还使用灵敏度,特异性和精度的基准来评估网络性能。从分类器得到的结果来看,在图像测试上从网络精度得到的结果来看,在CNN中Softmax分类器的准确率是最好的。这是一种基于特征提取技术与CNN相结合的脑图像肿瘤检测新方法。该方法在测试数据上的准确率为99.12%。由于医生诊断的重要性,医生帮助诊断肿瘤和治疗病人的准确性提高了。
{"title":"Brain Tumor Detection Using Deep Neural Network and Machine Learning Algorithm","authors":"Masoumeh Siar, M. Teshnehlab","doi":"10.1109/ICCKE48569.2019.8964846","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964846","url":null,"abstract":"Brain tumor can be classified into two types: benign and malignant. Timely and prompt disease detection and treatment plan leads to improved quality of life and increased life expectancy in these patients. One of the most practical and important methods is to use Deep Neural Network (DNN). In this paper, a Convolutional Neural Network (CNN) has been used to detect a tumor through brain Magnetic Resonance Imaging (MRI) images. Images were first applied to the CNN. The accuracy of Softmax Fully Connected layer used to classify images obtained 98.67%. Also, the accuracy of the CNN is obtained with the Radial Basis Function (RBF) classifier 97.34% and the Decision Tree (DT) classifier, is 94.24%. In addition to the accuracy criterion, we use the benchmarks of Sensitivity, Specificity and Precision evaluate network performance. According to the results obtained from the categorizers, the Softmax classifier has the best accuracy in the CNN according to the results obtained from network accuracy on the image testing. This is a new method based on the combination of feature extraction techniques with the CNN for tumor detection from brain images. The method proposed accuracy 99.12% on the test data. Due to the importance of the diagnosis given by the physician, the accuracy of the doctors help in diagnosing the tumor and treating the patient increased.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"1 1","pages":"363-368"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89761090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
A Ring Oscillator PUF Architecture With Enhanced Challenge-Response Set 一种具有增强挑战响应集的环形振荡器PUF结构
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964942
Mohammad Javad Parvardeh, Shahriar Baradaran Shokouhi
Physically Unclonable Functions (PUFs) are new hardware solution for low cost and secure communication primitives such as hardware authentication and secure key generation. PUFs use the random properties of a device to produce unique data. Ring Oscillator PUFs (RO PUF) are one of the most applicable PUFs because of its good reliability and easy implementation on FPGAs. One major problem of Ro PUFs is limited Challenge-Response pairs number. We consider this problem and introduce a new architecture of RO PUF that increases Challenge-Response pairs of a typical PUF with using minimum resources. In our architecture, we use an XOR gate to prevent direct response disclosure and increase our response unpredictability. In this manner, we increase Challenge-Response pairs up to $frac{{nleft( {n - 1} right)}}{2}$. We also show the result of the unity and uniqueness of our proposed PUF by implementing 110 PUFs on five XC3S400 FPGAs.
物理不可克隆功能(physical unclable Functions, puf)是一种针对低成本和安全通信原语(如硬件身份验证和安全密钥生成)的新型硬件解决方案。puf使用设备的随机属性来产生唯一的数据。环形振荡器PUF (RO PUF)因其良好的可靠性和易于在fpga上实现而成为应用最广泛的PUF之一。Ro puf的一个主要问题是挑战-响应对数量有限。考虑到这一问题,我们提出了一种新的RO PUF架构,该架构在使用最小资源的情况下增加了典型PUF的挑战响应对。在我们的架构中,我们使用异或门来防止直接响应泄露并增加响应的不可预测性。通过这种方式,我们将挑战-响应对增加到$frac{{nleft( {n - 1} right)}}{2}$。我们还通过在5个XC3S400 fpga上实现110个PUF,证明了所提出PUF的统一性和唯一性。
{"title":"A Ring Oscillator PUF Architecture With Enhanced Challenge-Response Set","authors":"Mohammad Javad Parvardeh, Shahriar Baradaran Shokouhi","doi":"10.1109/ICCKE48569.2019.8964942","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964942","url":null,"abstract":"Physically Unclonable Functions (PUFs) are new hardware solution for low cost and secure communication primitives such as hardware authentication and secure key generation. PUFs use the random properties of a device to produce unique data. Ring Oscillator PUFs (RO PUF) are one of the most applicable PUFs because of its good reliability and easy implementation on FPGAs. One major problem of Ro PUFs is limited Challenge-Response pairs number. We consider this problem and introduce a new architecture of RO PUF that increases Challenge-Response pairs of a typical PUF with using minimum resources. In our architecture, we use an XOR gate to prevent direct response disclosure and increase our response unpredictability. In this manner, we increase Challenge-Response pairs up to $frac{{nleft( {n - 1} right)}}{2}$. We also show the result of the unity and uniqueness of our proposed PUF by implementing 110 PUFs on five XC3S400 FPGAs.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"13 1","pages":"444-449"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88507333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Area-Delay Efficient Carry Select Adder Based on New Add-one Circuit 一种基于新型加一电路的区域延迟高效进位选择加法器
Pub Date : 2019-10-01 DOI: 10.1109/ICCKE48569.2019.8964968
Maytham Allahi Roodposhti, M. Valinataj
In this paper, a new carry select adder (CSLA) architecture is proposed with a lower area and a higher speed compared to previous CSLAs. The proposed CSLA is a low-area and high-speed design utilizing a new add-one circuit that is used instead of the second ripple carry adder (RCA) with the input carry equal to one (Cin=1) inside each group of the basic CSLA. Moreover, to expedite the add operation, a new grouping structure is proposed instead of the basic square-root (SQRT) grouping as well as utilizing a faster RCA in each group. Despite the fact that the proposed CSLA has not attained the lowest power consumption among all existing designs based on the PDK 45nm standard cell library, but it has achieved the lowest area and delay compared to previous CSLAs. Implementation results show that 8 to 33% area reduction and 12 to 44% speed improvement are achieved in the proposed CSLA compared to previous designs.
本文提出了一种新的进位选择加法器(CSLA)结构,与以前的CSLA相比,它具有更小的面积和更高的速度。所提出的CSLA是一种低面积和高速设计,利用新的加一电路来代替第二个纹波进位加法器(RCA),在每组基本CSLA中输入进位等于1 (Cin=1)。此外,为了提高加法运算的速度,提出了一种新的分组结构来代替基本的平方根(SQRT)分组,并在每组中使用更快的RCA。尽管在所有基于PDK 45nm标准单元库的现有设计中,所提出的CSLA并没有达到最低的功耗,但与以前的CSLA相比,它已经实现了最低的面积和延迟。实施结果表明,与以前的设计相比,所提出的CSLA的面积减少了8 ~ 33%,速度提高了12 ~ 44%。
{"title":"A Novel Area-Delay Efficient Carry Select Adder Based on New Add-one Circuit","authors":"Maytham Allahi Roodposhti, M. Valinataj","doi":"10.1109/ICCKE48569.2019.8964968","DOIUrl":"https://doi.org/10.1109/ICCKE48569.2019.8964968","url":null,"abstract":"In this paper, a new carry select adder (CSLA) architecture is proposed with a lower area and a higher speed compared to previous CSLAs. The proposed CSLA is a low-area and high-speed design utilizing a new add-one circuit that is used instead of the second ripple carry adder (RCA) with the input carry equal to one (Cin=1) inside each group of the basic CSLA. Moreover, to expedite the add operation, a new grouping structure is proposed instead of the basic square-root (SQRT) grouping as well as utilizing a faster RCA in each group. Despite the fact that the proposed CSLA has not attained the lowest power consumption among all existing designs based on the PDK 45nm standard cell library, but it has achieved the lowest area and delay compared to previous CSLAs. Implementation results show that 8 to 33% area reduction and 12 to 44% speed improvement are achieved in the proposed CSLA compared to previous designs.","PeriodicalId":6685,"journal":{"name":"2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"94 1","pages":"225-230"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91348687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1