Search results for: lesion detection
3632 Change Detection Method Based on Scale-Invariant Feature Transformation Keypoints and Segmentation for Synthetic Aperture Radar Image
Authors: Lan Du, Yan Wang, Hui Dai
Abstract:
Synthetic aperture radar (SAR) image change detection has recently become a challenging problem owing to the existence of speckle noises. In this paper, an unsupervised distribution-free change detection for SAR image based on scale-invariant feature transform (SIFT) keypoints and segmentation is proposed. Firstly, the noise-robust SIFT keypoints which reveal the blob-like structures in an image are extracted in the log-ratio image to reduce the detection range. Then, different from the traditional change detection which directly obtains the change-detection map from the difference image, segmentation is made around the extracted keypoints in the two original multitemporal SAR images to obtain accurate changed region. At last, the change-detection map is generated by comparing the two segmentations. Experimental results on the real SAR image dataset demonstrate the effectiveness of the proposed method.Keywords: change detection, Synthetic Aperture Radar (SAR), Scale-Invariant Feature Transformation (SIFT), segmentation
Procedia PDF Downloads 3873631 Optimized Road Lane Detection Through a Combined Canny Edge Detection, Hough Transform, and Scaleable Region Masking Toward Autonomous Driving
Authors: Samane Sharifi Monfared, Lavdie Rada
Abstract:
Nowadays, autonomous vehicles are developing rapidly toward facilitating human car driving. One of the main issues is road lane detection for a suitable guidance direction and car accident prevention. This paper aims to improve and optimize road line detection based on a combination of camera calibration, the Hough transform, and Canny edge detection. The video processing is implemented using the Open CV library with the novelty of having a scale able region masking. The aim of the study is to introduce automatic road lane detection techniques with the user’s minimum manual intervention.Keywords: hough transform, canny edge detection, optimisation, scaleable masking, camera calibration, improving the quality of image, image processing, video processing
Procedia PDF Downloads 963630 Central Nervous System Lesion Differentiation in the Emergency Radiology Department
Authors: Angelis P. Barlampas
Abstract:
An 89 years old woman came to the emergency department complaining of long-lasting headaches and nausea. A CT examination was performed, and a homogeneous midline anterior cranial fossa lesion was revealed, which was situated near the base and measured 2,4 cm in diameter. The patient was allergic, and an i.v.c injection could not be done on the spot, and neither could an MRI exam because of metallic implants. How could someone narrow down the differential diagnosis? The interhemispheric meningioma is usually a silent midline lesion with no edema, and most often presents as a homogeneous, solid type, isodense, or slightly hyperdense mass ( usually the smallest lesions as this one ). Of them, 20-30% have some calcifications. Hyperostosis is typical for meningiomas that abut the base of the skull but is absent in the current case, presumably of a more cephalad location that is borderline away from the bone. Because further investigation could not be done, as the patient was allergic to the contrast media, some other differential options should be considered. Regarding the site of the lesion, the most common other entities to keep in mind are the following: Metastasis, tumor of skull base, abscess, primary brain tumors, meningioma, giant aneurysm of the anterior cerebral artery, olfactory neuroblastoma, interhemispheric meningioma, giant aneurysm of the anterior cerebral artery, midline lesion. Appearance will depend on whether the aneurysm is non-thrombosed, or partially, or completely thrombosed. Non-contrast: slightly hyperdense, well-defined round extra-axial mass, may demonstrate a peripheral calcified rim, olfactory neuroblastoma, midline lesion. The mass is of soft tissue attenuation and is relatively homogeneous. Focal calcifications are occasionally present. When an intracranial extension is present, peritumoral cysts between it and the overlying brain are often present. Final diagnosis interhemispheric meningioma (Known from the previous patient’s history). Meningiomas come from the meningocytes or the arachnoid cells of the meninges. They are usually found incidentally, have an indolent course, and their most common location is extra-axial, parasagittal, and supratentorial. Other locations include the sphenoid ridge, olfactory groove, juxtasellar, infratentorial, intraventricular, pineal gland area, and optic nerve meningioma. They are clinically silent entities, except for large ones, which can present with headaches, changes in personality status, paresis, or symptomatology according to their specific site and may cause edema of the surrounding brain tissue. Imaging findings include the presence of calcifications, the CSF cleft sign, hyperostosis of adjacent bone, dural tail, and white matter buckling sign. After i.v.c. injection, they enhance brightly and homogenously, except for large ones, which may exhibit necrotic areas or may be heavily calcified. Malignant or cystic variants demonstrate more heterogeneity and less intense enhancement. Sometimes, it is inevitable that the needed CT protocol cannot be performed, especially in the emergency department. In these cases, the radiologist must focus on the characteristic imaging features of the unenhanced lesion, as well as in previous examinations or a known lesion history, in order to come to the right report conclusion.Keywords: computed tomography, emergency radiology, metastasis, tumor of skull base, abscess, primary brain tumors, meningioma, giant aneurysm of the anterior cerebral artery, olfactory neuroblastoma, interhemispheric meningioma
Procedia PDF Downloads 693629 Diagnosis and Analysis of Automated Liver and Tumor Segmentation on CT
Authors: R. R. Ramsheeja, R. Sreeraj
Abstract:
For view the internal structures of the human body such as liver, brain, kidney etc have a wide range of different modalities for medical images are provided nowadays. Computer Tomography is one of the most significant medical image modalities. In this paper use CT liver images for study the use of automatic computer aided techniques to calculate the volume of the liver tumor. Segmentation method is used for the detection of tumor from the CT scan is proposed. Gaussian filter is used for denoising the liver image and Adaptive Thresholding algorithm is used for segmentation. Multiple Region Of Interest(ROI) based method that may help to characteristic the feature different. It provides a significant impact on classification performance. Due to the characteristic of liver tumor lesion, inherent difficulties appear selective. For a better performance, a novel proposed system is introduced. Multiple ROI based feature selection and classification are performed. In order to obtain of relevant features for Support Vector Machine(SVM) classifier is important for better generalization performance. The proposed system helps to improve the better classification performance, reason in which we can see a significant reduction of features is used. The diagnosis of liver cancer from the computer tomography images is very difficult in nature. Early detection of liver tumor is very helpful to save the human life.Keywords: computed tomography (CT), multiple region of interest(ROI), feature values, segmentation, SVM classification
Procedia PDF Downloads 5093628 A Framework for Review Spam Detection Research
Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim
Abstract:
With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.Keywords: fake reviews, feature collection, opinion spam, spam detection
Procedia PDF Downloads 4133627 Automatic Differentiation of Ultrasonic Images of Cystic and Solid Breast Lesions
Authors: Dmitry V. Pasynkov, Ivan A. Egoshin, Alexey A. Kolchev, Ivan V. Kliouchkin
Abstract:
In most cases, typical cysts are easily recognized at ultrasonography. The specificity of this method for typical cysts reaches 98%, and it is usually considered as gold standard for typical cyst diagnosis. However, it is necessary to have all the following features to conclude the typical cyst: clear margin, the absence of internal echoes and dorsal acoustic enhancement. At the same time, not every breast cyst is typical. It is especially characteristic for protein-contained cysts that may have significant internal echoes. On the other hand, some solid lesions (predominantly malignant) may have cystic appearance and may be falsely accepted as cysts. Therefore we tried to develop the automatic method of cystic and solid breast lesions differentiation. Materials and methods. The input data were the ultrasonography digital images with the 256-gradations of gray color (Medison SA8000SE, Siemens X150, Esaote MyLab C). Identification of the lesion on these images was performed in two steps. On the first one, the region of interest (or contour of lesion) was searched and selected. Selection of such region is carried out using the sigmoid filter where the threshold is calculated according to the empirical distribution function of the image brightness and, if necessary, it was corrected according to the average brightness of the image points which have the highest gradient of brightness. At the second step, the identification of the selected region to one of lesion groups by its statistical characteristics of brightness distribution was made. The following characteristics were used: entropy, coefficients of the linear and polynomial regression, quantiles of different orders, an average gradient of brightness, etc. For determination of decisive criterion of belonging to one of lesion groups (cystic or solid) the training set of these characteristics of brightness distribution separately for benign and malignant lesions were received. To test our approach we used a set of 217 ultrasonic images of 107 cystic (including 53 atypical, difficult for bare eye differentiation) and 110 solid lesions. All lesions were cytologically and/or histologically confirmed. Visual identification was performed by trained specialist in breast ultrasonography. Results. Our system correctly distinguished all (107, 100%) typical cysts, 107 of 110 (97.3%) solid lesions and 50 of 53 (94.3%) atypical cysts. On the contrary, with the bare eye it was possible to identify correctly all (107, 100%) typical cysts, 96 of 110 (87.3%) solid lesions and 32 of 53 (60.4%) atypical cysts. Conclusion. Automatic approach significantly surpasses the visual assessment performed by trained specialist. The difference is especially large for atypical cysts and hypoechoic solid lesions with the clear margin. This data may have a clinical significance.Keywords: breast cyst, breast solid lesion, differentiation, ultrasonography
Procedia PDF Downloads 2723626 Pattern of Valvular Involvement and Demographic Features of Patients on Benzathine Penicillin at Dhulikhel Hospital
Authors: Sanjaya Humagain, Rajendra Koju
Abstract:
Background: Rheumatic heart disease (RHD) is the most common cardiovascular disease in children and young adults. Though declined and almost non-existent in developed nations, RHD is still one of the leading cause for premature death and disability in developing countries. Prevalence of RHD is high in both rural as well as urban area of Nepal. Present study is designed to look at the pattern of valvular involvement and demographic features in RHD. Methods: 326 patients indicated for inj. Benzathine penicillin were selected and echocardiograph performed to see the pattern of vavular involvement. Data analysis was done using SPSS 17. Result: The most common type of lesion was mixed type with mitral valve involvement. MR was the most common isolated lesion. MS was more commonly seen in females whereas AS was more common in males. Secondary prophylaxis was more common than primary prophylaxis. Conclusion: RHD still being a major problem and a preventable disease so extensive screening program is required to identify them early and prevent the complication.Keywords: acute rheumatic fever, RHD, MS, MR, AS, AR, Inj benzathine penicillin
Procedia PDF Downloads 3203625 A Rare Case of Synchronous Colon Adenocarcinoma
Authors: Mohamed Shafi Bin Mahboob Ali
Abstract:
Introduction: Synchronous tumor is defined as the presence of more than one primary malignant lesion in the same patient at the indexed diagnosis. It is a rare occurrence, especially in the spectrum of colorectal cancer, which accounts for less than 4%. The underlying pathology of a synchronous tumor is thought to be due to a genomic factor, which is microsatellite instability (MIS) with the involvement of BRAF, KRAS, and the GSRM1 gene. There are no specific sites of occurrence for the synchronous colorectal tumor, but many studies have shown that a synchronous tumor has about 43% predominance in the ascending colon with rarity in the sigmoid colon. Case Report: We reported a case of a young lady in the middle of her 30's with no family history of colorectal cancer that was diagnosed with a synchronous adenocarcinoma at the descending colon and rectosigmoid region. The lady's presentation was quite perplexing as she presented to the district hospital initially with simple, uncomplicated hemorrhoids and constipation. She was then referred to our center for further management as she developed a 'football' sized right gluteal swelling with a complete intestinal obstruction and bilateral lower-limb paralysis. We performed a CT scan and biopsy of the lesion, which found that the tumor engulfed the sacrococcygeal region with more than one primary lesion in the colon as well as secondaries in the liver. The patient was operated on after a multidisciplinary meeting was held. Pelvic exenteration with tumor debulking and anterior resection were performed. Postoperatively, she was referred to the oncology team for chemotherapy. She had a tremendous recovery in eight months' time with a partial regain of her lower limb power. The patient is still under our follow-up with an improved quality of life post-intervention. Discussion: Synchronous colon cancer is rare, with an incidence of 2.4% to 12.4%. It has male predominance and is pathologically more advanced compared to a single colon lesion. Down staging the disease by means of chemoradiotherapy has shown to be effective in managing this tumor. It is seen commonly on the right colon, but in our case, we found it on the left colon and the rectosigmoid. Conclusion: Managing a synchronous colon tumor could be challenging to surgeons, especially in deciding the extent of resection and postoperative functional outcomes of the bowel; thus, individual treatment strategies are needed to tackle this pathology.Keywords: synchronous, colon, tumor, adenocarcinoma
Procedia PDF Downloads 1083624 Computed Tomography Guided Bone Biopsies: Experience at an Australian Metropolitan Hospital
Authors: K. Hinde, R. Bookun, P. Tran
Abstract:
Percutaneous CT guided biopsies provide a fast, minimally invasive, cost effective and safe method for obtaining tissue for histopathology and culture. Standards for diagnostic yield vary depending on whether the tissue is being obtained for histopathology or culture. We present a retrospective audit from Western Health in Melbourne Australia over a 12-month period which aimed to determine the diagnostic yield, technical success and complication rate for CT guided bone biopsies and identify factors affecting these results. The digital imaging storage program (Synapse Picture Archiving and Communication System – Fujifilm Australia) was analysed with key word searches from October 2015 to October 2016. Nineteen CT guided bone biopsies were performed during this time. The most common referring unit was oncology, work up imaging included CT, MRI, bone scan and PET scan. The complication rate was 0%, overall diagnostic yield was 74% with a technical success of 95%. When performing biopsies for histologic analysis diagnostic yield was 85% and when performing biopsies for bacterial culture diagnostic yield was 60%. There was no significant relationship identified between size of lesion, distance of lesion to skin, lesion appearance on CT, the number of samples taken or gauge of needle to diagnostic yield or technical success. CT guided bone biopsy at Western Health meets the standard reported at other major clinical centres for technical success and safety. It is a useful investigation in identification of primary malignancy in distal bone metastases.Keywords: bone biopsy, computed tomography, core biopsy, histopathology
Procedia PDF Downloads 2013623 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges
Authors: M. Kowalski, M. Kastek, M. Szustakowski
Abstract:
Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertzKeywords: terahertz, infrared, object detection, screening camera, image processing
Procedia PDF Downloads 3583622 Design and Implementation of an Image Based System to Enhance the Security of ATM
Authors: Seyed Nima Tayarani Bathaie
Abstract:
In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.Keywords: face detection algorithm, Haar features, security of ATM
Procedia PDF Downloads 4203621 Treatment of NMSC with Traditional Medicine Method
Authors: Aferdita Stroka Koka, Laver Stroka, Juna Musa, Samanda Celaj
Abstract:
Non-melanoma skin cancers (NMSCs) are the most common human malignancies. About 5.4 million basal and squamous cell skin cancers are diagnosed each year in the US and new cases continue to grow. About eight out of ten of these are basal cell cancers. Squamous cell cancers occur less often. NMSC usually are treatable, but treatment is expensive and can leave scars. In 2019, 167 patients of both sexes suffering from NMSC were treated by traditional medicine. Patients who have been diagnosed with Basal Cell Carcinoma were 122 cases, Squamous Cell Carcinoma 32 cases and both of them 13 cases. Of these,122 cases were ulcerated lesions and 45 unulcerated lesions. All patients were treated with the herbal solution called NILS, which contains extracts of some Albanian plants such as Allium sativum, Jugulans regia and Laurus nobilis. The treatment is done locally, on the surface of the tumor, applying the solution until the tumor mass is destroyed and, after that, giving the necessary time to the wound to make the regeneration that coincides with the complete healing of the wound. We have prepared a collection of photos for each case. Since the first sessions, a shrinkage and reduction of the tumor mass were evident, up to the total disappearance of the lesion at the end of treatment. The normal period of treatment lasted 1 to 2 weeks, depending on the size of the tumor, then take care of it until the closure of the wound, taking the whole process from 1 to 3 months. In 7 patients, the lesion failed to be dominated by treatment and they underwent standard treatment with radiotherapy or surgery, while in 10 patients, the lesion recurred and was treated again. The aim of this survey was to put in evidence the good results obtained by treatment of NMSC with Albanian traditional medicine methods.Keywords: local treatment, nils, NMSC, traditional medicine
Procedia PDF Downloads 2113620 Comparative Study Between Oral and Intralesional Injection of Beta Blocker in the Treatment of Infantile Capillary Hemangioma
Authors: Nadeen Eltoukhy, Sahar S. Sheta, Walaa Elnaggar, Karim Bakr
Abstract:
Purpose: The aim of this study is to compare the clinical efficacy and side effects of oral versus intralesional propranolol treatment of infantile capillary hemangiomas in infants. Methods: The study enrolled 40 infants diagnosed with infantile capillary hemangiomas. Patients were divided into 2 groups: Group A (Non-invasive group) included 20 infants who received oral propranolol hydrochloride starting at a dose of 1 mg/kg/day BID, then increased to a max of 2 mg/kg/day BID gradually over 2 weeks for 3 months. Group B (Invasive group) included 20 infants who received intralesional propranolol injection at a dose of 1 mg/mL; the volume of the injected drug depended on the size of the lesion (0.2 mL injected per cm of lesion diameter), with a maximum volume of 1 mL for a lesion of 5 cm diameter under complete aseptic conditions in the operating theater. Results: At three months after initiating treatment, the circumferential size of the hemangioma showed a statistically significant decrease in both groups; in Group A from 3.66±2.89 cm to 1.56±1.26 cm with p-value <0.05 and in Group B from 2.99±2.73 cm to 1.32±1.18 cm with p-value <0.05. There is no statistically significant comparative difference between the two groups (p-value = 0.538 = insignificant). Regarding the complications of oral propranolol, one patient (5%) had bradycardia, and one patient (5%) had diarrhea. In the injection group, 20 patients (100%) had local edema, and one patient (5%) had a local infection. Conclusions: Both oral non-invasive and intralesional invasive propranolol are safely used to successfully treat and decrease the size of infantile hemangioma while showing no statistically comparative difference between both treatment techniques.Keywords: hemangioma, oral beta blocker, intralesional beta blocker, infants
Procedia PDF Downloads 523619 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 2313618 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).Keywords: intrusion detection, architectures, characteristic, tools, security
Procedia PDF Downloads 4623617 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)
Authors: Wafa' Slaibi Alsharafat
Abstract:
Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection
Procedia PDF Downloads 4743616 Crater Detection Using PCA from Captured CMOS Camera Data
Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata
Abstract:
We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.Keywords: crater detection, PCA, FPGA, image processing
Procedia PDF Downloads 5503615 On-Road Text Detection Platform for Driver Assistance Systems
Authors: Guezouli Larbi, Belkacem Soundes
Abstract:
The automation of the text detection process can help the human in his driving task. Its application can be very useful to help drivers to have more information about their environment by facilitating the reading of road signs such as directional signs, events, stores, etc. In this paper, a system consisting of two stages has been proposed. In the first one, we used pseudo-Zernike moments to pinpoint areas of the image that may contain text. The architecture of this part is based on three main steps, region of interest (ROI) detection, text localization, and non-text region filtering. Then, in the second step, we present a convolutional neural network architecture (On-Road Text Detection Network - ORTDN) which is considered a classification phase. The results show that the proposed framework achieved ≈ 35 fps and an mAP of ≈ 90%, thus a low computational time with competitive accuracy.Keywords: text detection, CNN, PZM, deep learning
Procedia PDF Downloads 843614 A Paper Based Sensor for Mercury Ion Detection
Authors: Emine G. Cansu Ergun
Abstract:
Conjugated system based sensors for selective detection of metal ions have been taking attention during last two decades. Fluorescent sensors are the promising candidates for ion detection due to their high selectivity towards metal ions, and rapid response times. Detection of mercury in an environmenet is important since mercury is a toxic element for human. Beyond the maximum allowable limit, mercury may cause serious problems in human health by spreading into the atmosphere, water and the food chain. In this study, a quinoxaline and 3,4-ethylenedioxy thiophene based donor-acceptor-donor type conjugated molecule used as a fluorescent sensor for detecting the mercury ion in aqueous medium. Among other various cations, existence of mercury resulted in a full quenching of the fluorescence signal. Then, a paper based sensor is constructed and used for mercury detection. As a result it is concluded that the offering sensor is a good candidate for selective mercury detection in aqueous media both in solution and paper based forms.Keywords: Conjugated molecules , fluorescence quenching, metal ion detection , sensors
Procedia PDF Downloads 1593613 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision
Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal
Abstract:
Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision
Procedia PDF Downloads 1393612 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research
Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding
Abstract:
Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.Keywords: XSS, no target attack platform, automatic detection,XSS detection
Procedia PDF Downloads 4053611 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection
Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim
Abstract:
As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).Keywords: intrusion detection, supervised learning, traffic classification, computer networks
Procedia PDF Downloads 3523610 Music Note Detection and Dictionary Generation from Music Sheet Using Image Processing Techniques
Authors: Muhammad Ammar, Talha Ali, Abdul Basit, Bakhtawar Rajput, Zobia Sohail
Abstract:
Music note detection is an area of study for the past few years and has its own influence in music file generation from sheet music. We proposed a method to detect music notes on sheet music using basic thresholding and blob detection. Subsequently, we created a notes dictionary using a semi-supervised learning approach. After notes detection, for each test image, the new symbols are added to the dictionary. This makes the notes detection semi-automatic. The experiments are done on images from a dataset and also on the captured images. The developed approach showed almost 100% accuracy on the dataset images, whereas varying results have been seen on captured images.Keywords: music note, sheet music, optical music recognition, blob detection, thresholding, dictionary generation
Procedia PDF Downloads 1823609 Efficient Iterative V-BLAST Detection Technique in Wireless Communication System
Authors: Hwan-Jun Choi, Sung-Bok Choi, Hyoung-Kyu Song
Abstract:
Recently, among the MIMO-OFDM detection techniques, a lot of papers suggested V-BLAST scheme which can achieve high data rate. Therefore, the signal detection of MIMOOFDM system is important issue. In this paper, efficient iterative VBLAST detection technique is proposed in wireless communication system. The proposed scheme adjusts the number of candidate symbol and iterative scheme based on channel state. According to the simulation result, the proposed scheme has better BER performance than conventional schemes and similar BER performance of the QRD-M with iterative scheme. Moreover complexity of proposed scheme has 50.6 % less than complexity of QRD-M detection with iterative scheme. Therefore the proposed detection scheme can be efficiently used in wireless communication.Keywords: MIMO-OFDM, V-BLAST, QR-decomposition, QRDM, DFE, iterative scheme, channel condition
Procedia PDF Downloads 5303608 Combination between Intrusion Systems and Honeypots
Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal
Abstract:
Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor
Procedia PDF Downloads 3833607 An AFM Approach of RBC Micro and Nanoscale Topographic Features During Storage
Authors: K. Santacruz-Gomez, E. Silva-Campa, S. Álvarez-García, V. Mata-Haro, D. Soto-Puebla, M. Pedroza-Montero
Abstract:
Blood gamma irradiation is the only available method to prevent transfusion-associated graft versus host disease (TA-GVHD). However, when blood is irradiated, determine blood shelf time is crucial. Non-irradiated blood has a self-time from 21 to 35 days when is preserved with an anticoagulated solution and stored at 4°C. During their storage, red blood cells (RBC) undergo a series of biochemical, biomechanical and molecular changes involving what is known as storage lesion (SL). SL include loss of structural integrity of RBC, a decrease of 2,3-diphosphatidylglyceric acid levels, and an increase of both ion potassium concentration and hemoglobin (Hb). On the other hand, Atomic force Microscopy (AFM) represents a versatile tool for a nano-scale high-resolution topographic analysis in biological systems. In order to evaluate SL in irradiated and non-irradiated blood, RBC topography and morphometric parameters were obtained from an AFM XE-BIO system. Cell viability was followed using flow cytometry. Our results showed that early markers as nanoscale roughness, allow us to evaluate blood quality since another perspective.Keywords: AFM, blood γ-irradiation, roughness, storage lesion
Procedia PDF Downloads 5333606 Mosaic Augmentation: Insights and Limitations
Authors: Olivia A. Kjorlien, Maryam Asghari, Farshid Alizadeh-Shabdiz
Abstract:
The goal of this paper is to investigate the impact of mosaic augmentation on the performance of object detection solutions. To carry out the study, YOLOv4 and YOLOv4-Tiny models have been selected, which are popular, advanced object detection models. These models are also representatives of two classes of complex and simple models. The study also has been carried out on two categories of objects, simple and complex. For this study, YOLOv4 and YOLOv4 Tiny are trained with and without mosaic augmentation for two sets of objects. While mosaic augmentation improves the performance of simple object detection, it deteriorates the performance of complex object detection, specifically having the largest negative impact on the false positive rate in a complex object detection case.Keywords: accuracy, false positives, mosaic augmentation, object detection, YOLOV4, YOLOV4-Tiny
Procedia PDF Downloads 1273605 Ribosomal Protein S4 Gene: Exploring the Presence in Syrian Strain of Leishmania Tropica Genome, Sequencing it and Evaluating Immune Response of pCI-S4 DNA Vaccine
Authors: Alyaa Abdlwahab
Abstract:
Cutaneous leishmaniasis represents a serious health problem in Syria; this problem has become noticeably aggravated after the civil war in the country. Leishmania tropica parasite is the main cause of cutaneous leishmaniasis in Syria. In order to control the disease, we need an effective vaccine against leishmania parasite. DNA vaccination remains one of the favorable approaches that have been used to face cutaneous leishmaniasis. Ribosomal protein S4 is responsible for important roles in Leishmania parasite life. DNA vaccine based on S4 gene has been used against infections by many species of Leishmania parasite but leishmania tropica parasite, so this gene represents a good candidate for DNA vaccine construction. After proving the existence of ribosomal protein S4 gene in a Syrian strain of Leishmania tropica (LCED Syrian 01), sequencing it and cloning it into pCI plasmid, BALB/C mice were inoculated with pCI-S4 DNA vaccine. The immune response was determined by monitoring the lesion progression in inoculated BALB/C mice for six weeks after challenging mice with Leishmania tropica (LCED Syrian 01) parasites. IL-12, IFN-γ, and IL-4 were quantified in draining lymph nodes (DLNa) of the immunized BALB/C mice by using the RT-qPCR technique. The parasite burden was calculated in the final week for the footpad lesion and the DLNs of the mice. This study proved the existence and the expression of the ribosomal protein S4 gene in Leishmania tropica (LCED Syrian 01) promastigotes. The sequence of ribosomal protein cDNA S4 gene was determined and published in Genbank; the gene size was 822 bp. Expression was also demonstrated at the level of cDNA. Also, this study revealed that pCI-S4 DNA vaccine induces TH1\TH2 response in immunized mice; this response prevents partially developing a dermal lesion of Leishmania.Keywords: ribosomal protein S4, DNA vaccine, Leishmania tropica, BALB\c
Procedia PDF Downloads 1373604 Adenoid Cystic Carcinoma of the Lacrimal Gland (About a Case)
Authors: H. Hadjeris, R. B. Ghoul, Lekhlaf, M. Nebbal
Abstract:
Introduction: Adenoid cystic carcinomas of the lacrimal gland or orbital cylindroma constitute the second cause of epithelial tumors of this gland. It is a malignant tumor usually developed at the expense of the salivary glands; its orbital location is exceptional. It is a rare clinical entity, formidable by its malignancy and local aggressiveness; the recurrence rate is high. Materials and methods: Clinical case: 63 years old woman who presents with irreducible no pulsatile painful left exophthalmos with inflammatory chemosis and a decrease in visual acuity with a moderate intracranial hypertension syndrome that has been evolving for 03 months. Antecedent; a biopsy of the tumor was made; the histological examination was in favor of an adenoid cystic carcinoma of the lacrimal gland. Lesion assessment: computed tomography and brain MRI: show an intra and extra-conical mass; with sinus (ethmoido-frontal) and cerebral (left frontal) extension strongly enhanced after injection of contrast product surrounded by edema around the lesion, associated with left frontal bone lysis extension assessment: unremarkable treatment: Patient operated by left frontotemporal approach, a total exenteration was performed with macroscopically complete excision of the frontal lesion and wide frontal craniectomy with craniofacial reconstruction, followed by complementary radiotherapy. Results: The patient was seen again after 3 months in consultation; she does not present any signs in favor of a recurrence. Conclusion: Adenoid cystic carcinomas of the lacrimal gland are rare malignant tumors; they are very infiltrating and invasive. The prognosis is strongly linked to the treatment time.Keywords: adenoid cystic, lacrimal gland, orbital location, fronto-temporal approac
Procedia PDF Downloads 713603 Real Time Video Based Smoke Detection Using Double Optical Flow Estimation
Authors: Anton Stadler, Thorsten Ike
Abstract:
In this paper, we present a video based smoke detection algorithm based on TVL1 optical flow estimation. The main part of the algorithm is an accumulating system for motion angles and upward motion speed of the flow field. We optimized the usage of TVL1 flow estimation for the detection of smoke with very low smoke density. Therefore, we use adapted flow parameters and estimate the flow field on difference images. We show in theory and in evaluation that this improves the performance of smoke detection significantly. We evaluate the smoke algorithm using videos with different smoke densities and different backgrounds. We show that smoke detection is very reliable in varying scenarios. Further we verify that our algorithm is very robust towards crowded scenes disturbance videos.Keywords: low density, optical flow, upward smoke motion, video based smoke detection
Procedia PDF Downloads 356