1
|
Zan H, Yildiz A. Multi-task learning for arousal and sleep stage detection using fully convolutional networks. J Neural Eng 2023; 20:056034. [PMID: 37769664 DOI: 10.1088/1741-2552/acfe3a] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/29/2023] [Accepted: 09/28/2023] [Indexed: 10/03/2023]
Abstract
Objective.Sleep is a critical physiological process that plays a vital role in maintaining physical and mental health. Accurate detection of arousals and sleep stages is essential for the diagnosis of sleep disorders, as frequent and excessive occurrences of arousals disrupt sleep stage patterns and lead to poor sleep quality, negatively impacting physical and mental health. Polysomnography is a traditional method for arousal and sleep stage detection that is time-consuming and prone to high variability among experts.Approach. In this paper, we propose a novel multi-task learning approach for arousal and sleep stage detection using fully convolutional neural networks. Our model, FullSleepNet, accepts a full-night single-channel EEG signal as input and produces segmentation masks for arousal and sleep stage labels. FullSleepNet comprises four modules: a convolutional module to extract local features, a recurrent module to capture long-range dependencies, an attention mechanism to focus on relevant parts of the input, and a segmentation module to output final predictions.Main results.By unifying the two interrelated tasks as segmentation problems and employing a multi-task learning approach, FullSleepNet achieves state-of-the-art performance for arousal detection with an area under the precision-recall curve of 0.70 on Sleep Heart Health Study and Multi-Ethnic Study of Atherosclerosis datasets. For sleep stage classification, FullSleepNet obtains comparable performance on both datasets, achieving an accuracy of 0.88 and an F1-score of 0.80 on the former and an accuracy of 0.83 and an F1-score of 0.76 on the latter.Significance. Our results demonstrate that FullSleepNet offers improved practicality, efficiency, and accuracy for the detection of arousal and classification of sleep stages using raw EEG signals as input.
Collapse
Affiliation(s)
- Hasan Zan
- Vocational School, Mardin Artuklu University, Mardin, Turkey
| | - Abdulnasır Yildiz
- Department of Electrical and Electronics Engineering, Dicle University, Diyarbakir, Turkey
| |
Collapse
|
2
|
Yıldız A. Towards Environment-Aware Fall Risk Assessment: Classifying Walking Surface Conditions Using IMU-Based Gait Data and Deep Learning. Brain Sci 2023; 13:1428. [PMID: 37891797 PMCID: PMC10605788 DOI: 10.3390/brainsci13101428] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/30/2023] [Revised: 09/17/2023] [Accepted: 10/07/2023] [Indexed: 10/29/2023] Open
Abstract
Fall risk assessment (FRA) helps clinicians make decisions about the best preventative measures to lower the risk of falls by identifying the different risks that are specific to an individual. With the development of wearable technologies such as inertial measurement units (IMUs), several free-living FRA methods based on fall predictors derived from IMU-based data have been introduced. The performance of such methods could be improved by increasing awareness of the individuals' walking environment. This study aims to introduce and analyze a 25-layer convolutional neural network model for classifying nine walking surface conditions using IMU-based gait data, providing a basis for environment-aware FRAs. A database containing data collected from thirty participants who wore six IMU sensors while walking on nine surface conditions was employed. A systematic analysis was conducted to determine the effects of gait signals (acceleration, magnetic field, and rate of turn), sensor placement, and signal segment size on the method's performance. Accuracies of 0.935 and 0.969 were achieved using a single and dual sensor, respectively, reaching an accuracy of 0.971 in the best-case scenario with optimal settings. The findings and analysis can help to develop more reliable and interpretable fall predictors, eventually leading to environment-aware FRA methods.
Collapse
Affiliation(s)
- Abdulnasır Yıldız
- Department of Electrical and Electronics Engineering, Dicle University, Diyarbakır 21280, Turkey
| |
Collapse
|
3
|
Ahmad MO, Tripathi G, Siddiqui F, Alam MA, Ahad MA, Akhtar MM, Casalino G. BAuth-ZKP-A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities. SENSORS (BASEL, SWITZERLAND) 2023; 23:2757. [PMID: 36904955 PMCID: PMC10007237 DOI: 10.3390/s23052757] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/03/2023] [Revised: 02/12/2023] [Accepted: 02/24/2023] [Indexed: 06/18/2023]
Abstract
The overwhelming popularity of technology-based solutions and innovations to address day-to-day processes has significantly contributed to the emergence of smart cities. where millions of interconnected devices and sensors generate and share huge volumes of data. The easy and high availability of rich personal and public data generated in these digitalized and automated ecosystems renders smart cities vulnerable to intrinsic and extrinsic security breaches. Today, with fast-developing technologies, the classical username and password approaches are no longer adequate to secure valuable data and information from cyberattacks. Multi-factor authentication (MFA) can provide an effective solution to minimize the security challenges associated with legacy single-factor authentication systems (both online and offline). This paper identifies and discusses the role and need of MFA for securing the smart city ecosystem. The paper begins by describing the notion of smart cities and the associated security threats and privacy issues. The paper further provides a detailed description of how MFA can be used for securing various smart city entities and services. A new concept of blockchain-based multi-factor authentication named "BAuth-ZKP" for securing smart city transactions is presented in the paper. The concept focuses on developing smart contracts between the participating entities within the smart city and performing the transactions with zero knowledge proof (ZKP)-based authentication in a secure and privacy-preserved manner. Finally, the future prospects, developments, and scope of using MFA in smart city ecosystem are discussed.
Collapse
Affiliation(s)
- Md. Onais Ahmad
- Department of Computer Science and Engineering, Jamia Hamdard, New Delhi 110062, India
| | - Gautami Tripathi
- Department of Computer Science and Engineering, Jamia Hamdard, New Delhi 110062, India
| | - Farheen Siddiqui
- Department of Computer Science and Engineering, Jamia Hamdard, New Delhi 110062, India
| | - Mohammad Afshar Alam
- Department of Computer Science and Engineering, Jamia Hamdard, New Delhi 110062, India
| | - Mohd Abdul Ahad
- Department of Computer Science and Engineering, Jamia Hamdard, New Delhi 110062, India
| | - Mohd Majid Akhtar
- Department of Computer Engineering, Jamia Millia Islamia, New Delhi 110025, India
| | - Gabriella Casalino
- Department of Computer Science, University of Bari Aldo Moro, 70125 Bari, Italy
| |
Collapse
|
4
|
Zan H, Yildiz A. Local Pattern Transformation-Based convolutional neural network for sleep stage scoring. Biomed Signal Process Control 2023. [DOI: 10.1016/j.bspc.2022.104275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
5
|
Zhu Y, Wang M, Yin X, Zhang J, Meijering E, Hu J. Deep Learning in Diverse Intelligent Sensor Based Systems. SENSORS (BASEL, SWITZERLAND) 2022; 23:62. [PMID: 36616657 PMCID: PMC9823653 DOI: 10.3390/s23010062] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/02/2022] [Revised: 12/06/2022] [Accepted: 12/14/2022] [Indexed: 05/27/2023]
Abstract
Deep learning has become a predominant method for solving data analysis problems in virtually all fields of science and engineering. The increasing complexity and the large volume of data collected by diverse sensor systems have spurred the development of deep learning methods and have fundamentally transformed the way the data are acquired, processed, analyzed, and interpreted. With the rapid development of deep learning technology and its ever-increasing range of successful applications across diverse sensor systems, there is an urgent need to provide a comprehensive investigation of deep learning in this domain from a holistic view. This survey paper aims to contribute to this by systematically investigating deep learning models/methods and their applications across diverse sensor systems. It also provides a comprehensive summary of deep learning implementation tips and links to tutorials, open-source codes, and pretrained models, which can serve as an excellent self-contained reference for deep learning practitioners and those seeking to innovate deep learning in this space. In addition, this paper provides insights into research topics in diverse sensor systems where deep learning has not yet been well-developed, and highlights challenges and future opportunities. This survey serves as a catalyst to accelerate the application and transformation of deep learning in diverse sensor systems.
Collapse
Affiliation(s)
- Yanming Zhu
- School of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, Australia
| | - Min Wang
- School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2612, Australia
| | - Xuefei Yin
- School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2612, Australia
| | - Jue Zhang
- School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2612, Australia
| | - Erik Meijering
- School of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, Australia
| | - Jiankun Hu
- School of Engineering and Information Technology, University of New South Wales, Canberra, ACT 2612, Australia
| |
Collapse
|
6
|
Li Z, Liu F, Yang W, Peng S, Zhou J. A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2022; 33:6999-7019. [PMID: 34111009 DOI: 10.1109/tnnls.2021.3084827] [Citation(s) in RCA: 271] [Impact Index Per Article: 135.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
Abstract
A convolutional neural network (CNN) is one of the most significant networks in the deep learning field. Since CNN made impressive achievements in many areas, including but not limited to computer vision and natural language processing, it attracted much attention from both industry and academia in the past few years. The existing reviews mainly focus on CNN's applications in different scenarios without considering CNN from a general perspective, and some novel ideas proposed recently are not covered. In this review, we aim to provide some novel ideas and prospects in this fast-growing field. Besides, not only 2-D convolution but also 1-D and multidimensional ones are involved. First, this review introduces the history of CNN. Second, we provide an overview of various convolutions. Third, some classic and advanced CNN models are introduced; especially those key points making them reach state-of-the-art results. Fourth, through experimental analysis, we draw some conclusions and provide several rules of thumb for functions and hyperparameter selection. Fifth, the applications of 1-D, 2-D, and multidimensional convolution are covered. Finally, some open issues and promising directions for CNN are discussed as guidelines for future work.
Collapse
|
7
|
On error reduction by the symmetric rejection method in multi-stage biometric verification systems. Pattern Anal Appl 2022. [DOI: 10.1007/s10044-022-01118-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
8
|
Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT). SENSORS 2022; 22:s22155822. [PMID: 35957379 PMCID: PMC9371235 DOI: 10.3390/s22155822] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/20/2022] [Revised: 06/21/2022] [Accepted: 06/24/2022] [Indexed: 12/04/2022]
Abstract
As the range of security attacks increases across diverse network applications, intrusion detection systems are of central interest. Such detection systems are more crucial for the Internet of Things (IoT) due to the voluminous and sensitive data it produces. However, the real-world network produces imbalanced traffic including different and unknown attack types. Due to this imbalanced nature of network traffic, the traditional learning-based detection techniques suffer from lower overall detection performance, higher false-positive rate, and lower minority-class attack detection rates. To address the issue, we propose a novel deep generative-based model called Class-wise Focal Loss Variational AutoEncoder (CFLVAE) which overcomes the data imbalance problem by generating new samples for minority attack classes. Furthermore, we design an effective and cost-sensitive objective function called Class-wise Focal Loss (CFL) to train the traditional Variational AutoEncoder (VAE). The CFL objective function focuses on different minority class samples and scrutinizes high-level feature representation of observed data. This leads the VAE to generate more realistic, diverse, and quality intrusion data to create a well-balanced intrusion dataset. The balanced dataset results in improving the intrusion detection accuracy of learning-based classifiers. Therefore, a Deep Neural Network (DNN) classifier with a unique architecture is then trained using the balanced intrusion dataset to enhance the detection performance. Moreover, we utilize a challenging and highly imbalanced intrusion dataset called NSL-KDD to conduct an extensive experiment with the proposed model. The results demonstrate that the proposed CFLVAE with DNN (CFLVAE-DNN) model obtains promising performance in generating realistic new intrusion data samples and achieves superior intrusion detection performance. Additionally, the proposed CFLVAE-DNN model outperforms several state-of-the-art data generation and traditional intrusion detection methods. Specifically, the CFLVAE-DNN achieves 88.08% overall intrusion detection accuracy and 3.77% false positive rate. More significantly, it obtains the highest low-frequency attack detection rates for U2R (79.25%) and R2L (67.5%) against all the state-of-the-art algorithms.
Collapse
|
9
|
El-Rahiem BA, El-Samie FEA, Amin M. Multimodal biometric authentication based on deep fusion of electrocardiogram (ECG) and finger vein. MULTIMEDIA SYSTEMS 2022; 28:1325-1337. [DOI: 10.1007/s00530-021-00810-9] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/09/2020] [Accepted: 05/13/2021] [Indexed: 09/01/2023]
|
10
|
Liu W, Wei X, Lei T, Wang X, Meng H, Nandi AK. Data-Fusion-Based Two-Stage Cascade Framework for Multimodality Face Anti-Spoofing. IEEE Trans Cogn Dev Syst 2022. [DOI: 10.1109/tcds.2021.3064679] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
Affiliation(s)
- Weihua Liu
- Shaanxi Joint Laboratory of Artificial Intelligence, Shaanxi University of Science and Technology, Xi’an, China
| | - Xiaokang Wei
- Laboratory of Intelligent Image Processing, Orbbec Company, Shenzhen, China
| | - Tao Lei
- Shaanxi Joint Laboratory of Artificial Intelligence and the School of Electronic Information and Artificial Intelligence, Shaanxi University of Science and Technology, Xi’an, China
| | - Xingwu Wang
- Shaanxi Joint Laboratory of Artificial Intelligence and the School of Electronic Information and Artificial Intelligence, Shaanxi University of Science and Technology, Xi’an, China
| | - Hongying Meng
- Department of Electronic and Electrical Engineering, Brunel University London, Uxbridge, U.K
| | - Asoke K. Nandi
- Department of Electronic and Electrical Engineering, Brunel University London, Uxbridge, U.K
| |
Collapse
|
11
|
Fatemifar S, Asadi S, Awais M, Akbari A, Kittler J. Face spoofing detection ensemble via multistage optimisation and pruning. Pattern Recognit Lett 2022. [DOI: 10.1016/j.patrec.2022.04.006] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
12
|
|
13
|
Li Q, Xu L, Yang X. 2D Multi-Person Pose Estimation Combined with Face Detection. INT J PATTERN RECOGN 2021. [DOI: 10.1142/s021800142256002x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Pose estimation is the basis and key of human motion recognition. In the two-dimensional human pose estimation based on image, in order to reduce the adverse effects of mutual occlusion among multiple people and improve the accuracy of motion recognition, a structurally symmetrical two-dimensional multi-person pose estimation model combined with face detection is proposed in this paper. First, transfer learning is used to initialize each sub-branch network model. Then, MTCNN is used for face detection to predict the number of people in the image. According to the number of people, the image is input into the improved two-branch OpenPose network. What is more, the double judgment algorithm is proposed to correct the false detection of MTCNN. The experimental results show that compared with TensorPose, which is the latest improved method based on OpenPose, the Average Precision (AP) (Intersection over Union [Formula: see text]) on the validation set is 8.8 higher. Furthermore, compared with OpenPose, the mean AP ([Formula: see text]) is 1.7 higher on the validation set and is 1.3 higher on the Test-dev test set.
Collapse
Affiliation(s)
- Qiming Li
- Department of Computer Science and Technology, Shanghai Maritime University, Shanghai 201306, P. R. China
| | - Lu Xu
- Department of Computer Science and Technology, Shanghai Maritime University, Shanghai 201306, P. R. China
| | - Xiaoyan Yang
- State Key Laboratory of Functional Materials for Informatics, Shanghai Institute of Micro System and Information Technology and the Center for Excellence in Superconducting Electronics, Chinese Academy of Sciences, Shanghai 200050, P. R. China
| |
Collapse
|
14
|
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system. Pattern Anal Appl 2021. [DOI: 10.1007/s10044-020-00899-0] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
15
|
Muhammad K, Khan S, Ser JD, Albuquerque VHCD. Deep Learning for Multigrade Brain Tumor Classification in Smart Healthcare Systems: A Prospective Survey. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2021; 32:507-522. [PMID: 32603291 DOI: 10.1109/tnnls.2020.2995800] [Citation(s) in RCA: 81] [Impact Index Per Article: 27.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/20/2023]
Abstract
Brain tumor is one of the most dangerous cancers in people of all ages, and its grade recognition is a challenging problem for radiologists in health monitoring and automated diagnosis. Recently, numerous methods based on deep learning have been presented in the literature for brain tumor classification (BTC) in order to assist radiologists for a better diagnostic analysis. In this overview, we present an in-depth review of the surveys published so far and recent deep learning-based methods for BTC. Our survey covers the main steps of deep learning-based BTC methods, including preprocessing, features extraction, and classification, along with their achievements and limitations. We also investigate the state-of-the-art convolutional neural network models for BTC by performing extensive experiments using transfer learning with and without data augmentation. Furthermore, this overview describes available benchmark data sets used for the evaluation of BTC. Finally, this survey does not only look into the past literature on the topic but also steps on it to delve into the future of this area and enumerates some research directions that should be followed in the future, especially for personalized and smart healthcare.
Collapse
|
16
|
Convolutional neural network-based feature extraction using multimodal for high security application. EVOLUTIONARY INTELLIGENCE 2020. [DOI: 10.1007/s12065-020-00522-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
17
|
Tu X, Ma Z, Zhao J, Du G, Xie M, Feng J. Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing. ACM T INTEL SYST TEC 2020. [DOI: 10.1145/3402446] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Abstract
Face anti-spoofing aims to detect presentation attack to face recognition--based authentication systems. It has drawn growing attention due to the high security demand. The widely adopted CNN-based methods usually well recognize the spoofing faces when training and testing spoofing samples display similar patterns, but their performance would drop drastically on testing spoofing faces of novel patterns or unseen scenes, leading to poor generalization performance. Furthermore, almost all current methods treat face anti-spoofing as a prior step to face recognition, which prolongs the response time and makes face authentication inefficient. In this article, we try to boost the generalizability and applicability of face anti-spoofing methods by designing a new generalizable face authentication CNN (GFA-CNN) model with three novelties. First, GFA-CNN introduces a simple yet effective total pairwise confusion loss for CNN training that properly balances contributions of all spoofing patterns for recognizing the spoofing faces. Second, it incorporate a fast domain adaptation component to alleviate negative effects brought by domain variation. Third, it deploys filter diversification learning to make the learned representations more adaptable to new scenes. In addition, the proposed GFA-CNN works in a multi-task manner—it performs face anti-spoofing and face recognition simultaneously. Experimental results on five popular face anti-spoofing and face recognition benchmarks show that GFA-CNN outperforms previous face anti-spoofing methods on cross-test protocols significantly and also well preserves the identity information of input face images.
Collapse
Affiliation(s)
- Xiaoguang Tu
- University of Electronic Science and Technology of China, Chengdu, China
| | - Zheng Ma
- University of Electronic Science and Technology of China, Chengdu, China
| | - Jian Zhao
- Institute of North Electronic Equipment, Beijing, China
| | - Guodong Du
- National University of Singapore, Singapore
| | - Mei Xie
- University of Electronic Science and Technology of China, Chengdu, China
| | | |
Collapse
|
18
|
Contact-Free Multispectral Identity Verification System Using Palm Veins and Deep Neural Network. SENSORS 2020; 20:s20195695. [PMID: 33036259 PMCID: PMC7582870 DOI: 10.3390/s20195695] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/14/2020] [Revised: 09/18/2020] [Accepted: 09/26/2020] [Indexed: 12/30/2022]
Abstract
Devices and systems secured by biometric factors became a part of our lives because they are convenient, easy to use, reliable, and secure. They use information about unique features of our bodies in order to authenticate a user. It is possible to enhance the security of these devices by adding supplementary modality while keeping the user experience at the same level. Palm vein systems are based on infrared wavelengths used for capturing images of users’ veins. It is both convenient for the user, and it is one of the most secure biometric solutions. The proposed system uses IR and UV wavelengths; the images are then processed by a deep convolutional neural network for extraction of biometric features and authentication of users. We tested the system in a verification scenario that consisted of checking if the images collected from the user contained the same biometric features as those in the database. The True Positive Rate (TPR) achieved by the system when the information from the two modalities were combined was 99.5% by the threshold of acceptance set to the Equal Error Rate (EER).
Collapse
|
19
|
|
20
|
Gao Y, Zhu T, Xu X. Bone age assessment based on deep convolution neural network incorporated with segmentation. Int J Comput Assist Radiol Surg 2020; 15:1951-1962. [PMID: 32986142 DOI: 10.1007/s11548-020-02266-0] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/21/2020] [Accepted: 09/17/2020] [Indexed: 10/23/2022]
Abstract
PURPOSE Bone age assessment is not only an important means of assessing maturity of adolescents, but also plays an indispensable role in the fields of orthodontics, kinematics, pediatrics, forensic science, etc. Most studies, however, do not take into account the impact of background noise on the results of the assessment. In order to obtain accurate bone age, this paper presents an automatic assessment method, for bone age based on deep convolutional neural networks. METHOD Our method was divided into two phases. In the image segmentation stage, the segmentation network U-Net was used to acquire the mask image which was then compared with the original image to obtain the hand bone portion after removing the background interference. For the classification phase, in order to further improve the evaluation performance, an attention mechanism was added on the basis of Visual Geometry Group Network (VGGNet). Attention mechanisms can help the model invest more resources in important areas of the hand bone. RESULT The assessment model was tested on the RSNA2017 Pediatric Bone Age dataset. The results show that our adjusted model outperforms the VGGNet. The mean absolute error can reach 9.997 months, which outperforms other common methods for bone age assessment. CONCLUSION We explored the establishment of an automated bone age assessment method based on deep learning. This method can efficiently eliminate the influence of background interference on bone age evaluation, improve the accuracy of bone age evaluation, provide important reference value for bone age determination, and can aid in the prevention of adolescent growth and development diseases.
Collapse
Affiliation(s)
- Yunyuan Gao
- Intelligent Control and Robotics Institute, College of Automation, Hangzhou Dianzi University, Hangzhou, China. .,Key Laboratory of Brain Machine Collaborative Intelligence of Zhejiang Province, Hangzhou, China.
| | - Tao Zhu
- Intelligent Control and Robotics Institute, College of Automation, Hangzhou Dianzi University, Hangzhou, China
| | - Xiaohua Xu
- Kennesaw State University, Marietta, GA, 30060, USA
| |
Collapse
|
21
|
Hussain T, Muhammad K, Ser JD, Baik SW, de Albuquerque VHC. Intelligent Embedded Vision for Summarization of Multiview Videos in IIoT. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2020; 16:2592-2602. [DOI: 10.1109/tii.2019.2937905] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/30/2023]
|
22
|
Intelligent High-Resolution Geological Mapping Based on SLIC-CNN. ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION 2020. [DOI: 10.3390/ijgi9020099] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
High-resolution geological mapping is an important supporting condition for mineral and energy exploration. However, high-resolution geological mapping work still faces many problems. At present, high-resolution geological mapping is still generated by expert interpretation of survey lines, compasses, and field data. The work in the field is constrained by the weather, terrain, and personnel, and the working methods need to be improved. This paper proposes a new method for high-resolution mapping using Unmanned Aerial Vehicle (UAV) and deep learning algorithms. This method uses the UAV to collect high-resolution remote sensing images, cooperates with some groundwork to anchor the lithology, and then completes most of the mapping work on high-resolution remote sensing images. This method transfers a large amount of field work into the room and provides an automatic mapping process based on the Simple Linear Iterative Clustering-Convolutional Neural Network (SLIC-CNN) algorithm. It uses the convolutional neural network (CNN) to identify the image content and confirms the lithologic distribution, the simple linear iterative cluster (SLIC) algorithm can be used to outline the boundary of the rock mass and determine the contact interface of the rock mass, and the mode and expert decision method is used to clarify the results of the fusion and mapping. The mapping method was applied to the Taili waterfront in Xingcheng City, Liaoning Province, China. In this study, the Area Under the Curve (AUC) of the mapping method was 0.937. The Kappa test result was k = 0.8523, and a high-resolution geological map was obtained.
Collapse
|
23
|
Abstract
Biometric systems are considered an efficient component for identification in the developing modern technologies. The aim of biometric systems is to verify or determine the identity of a user through his/her biological and behavioral characteristics. The threat of spoof attacks is always an important issue in biometric verification and authentication, which requires an updated and stronger protection system. In this article, we propose an anti-spoofing system based on auditory perception responses. To the best of our knowledge, this is the first time that an auditory perception based anti-spoofing system has been presented for age verification. The proposed auditory perception based anti-spoofing system was evaluated with 770 trials conducted by many subjects of each gender and age range (12–65 years of age). The results achieved are encouraging, as the auditory perception based system showed the lowest Equal Error Rate (EER) value of 5.5%.
Collapse
|
24
|
Arora S, Bhatia MPS. Fingerprint Spoofing Detection to Improve Customer Security in Mobile Financial Applications Using Deep Learning. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2019. [DOI: 10.1007/s13369-019-04190-1] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
25
|
Ullah FUM, Ullah A, Muhammad K, Haq IU, Baik SW. Violence Detection Using Spatiotemporal Features with 3D Convolutional Neural Network. SENSORS 2019; 19:s19112472. [PMID: 31151184 PMCID: PMC6603512 DOI: 10.3390/s19112472] [Citation(s) in RCA: 79] [Impact Index Per Article: 15.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/01/2019] [Revised: 05/23/2019] [Accepted: 05/24/2019] [Indexed: 11/18/2022]
Abstract
The worldwide utilization of surveillance cameras in smart cities has enabled researchers to analyze a gigantic volume of data to ensure automatic monitoring. An enhanced security system in smart cities, schools, hospitals, and other surveillance domains is mandatory for the detection of violent or abnormal activities to avoid any casualties which could cause social, economic, and ecological damages. Automatic detection of violence for quick actions is very significant and can efficiently assist the concerned departments. In this paper, we propose a triple-staged end-to-end deep learning violence detection framework. First, persons are detected in the surveillance video stream using a light-weight convolutional neural network (CNN) model to reduce and overcome the voluminous processing of useless frames. Second, a sequence of 16 frames with detected persons is passed to 3D CNN, where the spatiotemporal features of these sequences are extracted and fed to the Softmax classifier. Furthermore, we optimized the 3D CNN model using an open visual inference and neural networks optimization toolkit developed by Intel, which converts the trained model into intermediate representation and adjusts it for optimal execution at the end platform for the final prediction of violent activity. After detection of a violent activity, an alert is transmitted to the nearest police station or security department to take prompt preventive actions. We found that our proposed method outperforms the existing state-of-the-art methods for different benchmark datasets.
Collapse
Affiliation(s)
- Fath U Min Ullah
- Intelligent Media Laboratory, Digital Contents Research Institute, Sejong University, Seoul 143-747, Korea.
| | - Amin Ullah
- Intelligent Media Laboratory, Digital Contents Research Institute, Sejong University, Seoul 143-747, Korea.
| | - Khan Muhammad
- Department of Software, Sejong University, Seoul 143-747, Korea.
| | - Ijaz Ul Haq
- Intelligent Media Laboratory, Digital Contents Research Institute, Sejong University, Seoul 143-747, Korea.
| | - Sung Wook Baik
- Intelligent Media Laboratory, Digital Contents Research Institute, Sejong University, Seoul 143-747, Korea.
| |
Collapse
|