Search results for: nodule detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3372

Search results for: nodule detection

3372 Enabling Non-invasive Diagnosis of Thyroid Nodules with High Specificity and Sensitivity

Authors: Sai Maniveer Adapa, Sai Guptha Perla, Adithya Reddy P.

Abstract:

Thyroid nodules can often be diagnosed with ultrasound imaging, although differentiating between benign and malignant nodules can be challenging for medical professionals. This work suggests a novel approach to increase the precision of thyroid nodule identification by combining machine learning and deep learning. The new approach first extracts information from the ultrasound pictures using a deep learning method known as a convolutional autoencoder. A support vector machine, a type of machine learning model, is then trained using these features. With an accuracy of 92.52%, the support vector machine can differentiate between benign and malignant nodules. This innovative technique may decrease the need for pointless biopsies and increase the accuracy of thyroid nodule detection.

Keywords: thyroid tumor diagnosis, ultrasound images, deep learning, machine learning, convolutional auto-encoder, support vector machine

Procedia PDF Downloads 20
3371 Current Applications of Artificial Intelligence (AI) in Chest Radiology

Authors: Angelis P. Barlampas

Abstract:

Learning Objectives: The purpose of this study is to inform briefly the reader about the applications of AI in chest radiology. Background: Currently, there are 190 FDA-approved radiology AI applications, with 42 (22%) pertaining specifically to thoracic radiology. Imaging findings OR Procedure details Aids of AI in chest radiology1: Detects and segments pulmonary nodules. Subtracts bone to provide an unobstructed view of the underlying lung parenchyma and provides further information on nodule characteristics, such as nodule location, nodule two-dimensional size or three dimensional (3D) volume, change in nodule size over time, attenuation data (i.e., mean, minimum, and/or maximum Hounsfield units [HU]), morphological assessments, or combinations of the above. Reclassifies indeterminate pulmonary nodules into low or high risk with higher accuracy than conventional risk models. Detects pleural effusion . Differentiates tension pneumothorax from nontension pneumothorax. Detects cardiomegaly, calcification, consolidation, mediastinal widening, atelectasis, fibrosis and pneumoperitoneum. Localises automatically vertebrae segments, labels ribs and detects rib fractures. Measures the distance from the tube tip to the carina and localizes both endotracheal tubes and central vascular lines. Detects consolidation and progression of parenchymal diseases such as pulmonary fibrosis or chronic obstructive pulmonary disease (COPD).Can evaluate lobar volumes. Identifies and labels pulmonary bronchi and vasculature and quantifies air-trapping. Offers emphysema evaluation. Provides functional respiratory imaging, whereby high-resolution CT images are post-processed to quantify airflow by lung region and may be used to quantify key biomarkers such as airway resistance, air-trapping, ventilation mapping, lung and lobar volume, and blood vessel and airway volume. Assesses the lung parenchyma by way of density evaluation. Provides percentages of tissues within defined attenuation (HU) ranges besides furnishing automated lung segmentation and lung volume information. Improves image quality for noisy images with built-in denoising function. Detects emphysema, a common condition seen in patients with history of smoking and hyperdense or opacified regions, thereby aiding in the diagnosis of certain pathologies, such as COVID-19 pneumonia. It aids in cardiac segmentation and calcium detection, aorta segmentation and diameter measurements, and vertebral body segmentation and density measurements. Conclusion: The future is yet to come, but AI already is a helpful tool for the daily practice in radiology. It is assumed, that the continuing progression of the computerized systems and the improvements in software algorithms , will redder AI into the second hand of the radiologist.

Keywords: artificial intelligence, chest imaging, nodule detection, automated diagnoses

Procedia PDF Downloads 41
3370 Clinical Implication of Hyper-Intense Signal Thyroid Incidentaloma on Time of Flight Magnetic Resonance Angiography

Authors: Inseon Ryoo, Soo Chin Kim, Hyena Jung, Sangil Suh

Abstract:

Objectives: The purpose of this study is to evaluate the clinical significance of hyper-intense signal thyroid incidentalomas on the time of flight magnetic resonance angiography (TOF-MRA) using correlation study with ultrasound (US). Methods: We retrospectively reviewed 3,505 non-contrast TOF-MRA performed at an institution between September 2014 and May 2017. Two radiologists correlated the thyroid incidentalomas detected on TOF-MRA with US features which was obtained within three months interval between MRA and US examinations in consensus method. Results: The prevalence of hyper-intense signal thyroid nodules incidentally detected on TOF-MRA was 1.2% (43/3505). Among them, 35 people (81.4%) underwent US examinations, and total 45 hyper-intense signal thyroid nodules were detected on US exams. Of these 45 nodules, 35 nodules (72.9%) were categorized as benign (K-TIRADS category 2) on US exams. Fine needle aspiration was performed on 9 nodules according to the indications recommended by Korean Society of Thyroid Radiology. All except one high-suspicious thyroid nodule were confirmed as benign (Bethesda 2) on cytologic exams. One high-suspicious nodule on US showed a non-diagnostic result (Bethesda 1) on cytologic exam. However, this nodule collapsed after aspiration of thick colloid material. Conclusions: Our study showed that the most hyper-intense signal thyroid nodules detected on TOF-MRA were benign. Therefore, if a hyper-intense signal incidentaloma is found on TOF-MRA, further evaluation, especially invasive biopsy of the nodules could be suspended unless the patient had other symptoms or clinical factors suggesting the need for further evaluation.

Keywords: incidentaloma, thyroid nodule, TOF MR angiography, ultrasound

Procedia PDF Downloads 138
3369 The Impact of Hormone Suppressive Therapy on Quality of Life of Patients with Nodular Goiter

Authors: Emil Iskandarov, Nazrin Agayeva

Abstract:

Background: The effectiveness of hormone suppressive therapy (HST) in patients with nodular goiter (NG) is controversial. The aim of this study was to identify the impact of long-time HST on the Quality of Life (QoL) of patients with NG. Material and Methods: A retrospective analysis of 146 patients with NG showed treated with HST showed that in 38,4% of cases, HST was not effective. Nodules were increased in size and moreover, and new nodules were developed. Statistical procedure identified the predictors of resistant nodules: only one nodule in the left lobe; nodule size >17mm; calcinate within the nodule. 174 patients with NG, by whom predictors of resistant nodules were established, were informed about the results of previous research and surgery was suggested. Eighty-eight patients (the basic group) agreed with surgery and thyroidectomy was led. 86 patients (control group) ignored the suggestion and wished to receive HST. 3, 6 and 12 months after starting HST; control group patients were examined. HST was non-effective and patients, due to developing symptoms, were operated on. Patients in both groups were followed up 3, 6 and 12 months after thyroidectomy. Quality of Life was checked with the SF-36 survey form and compared between groups. The statistical analysis was performed with the non-parametric Mann–Whitney U test and with the Student t-test. P values <0.05 were considered statistically significant. Results and Discussions: QoL of patients in the basic and control groups 3 months after surgery was almost the same. However, Emotional problems severely interfered with patients in a control group with normal social activities with family, friends, and neighbors. The causes were related to the non-effective HST treatment before surgery: stress for forgetting to take drugs timely every day for a long time; blood tests for thyroid hormone level; needle biopsies of nodules for cancer screening and regular ultrasound investigations, which showed that nodules not diminished in size. Changing the treatment method after 1-year non-effective HST and delayed surgery negatively impacted patient's QoL. Social role functioning and mental health in the control group were also impaired and the difference between the results in the basic group was statistically significant (p <0.05). Conclusion: Predictors, such as only one nodule, the width of nodules more than 17mm, and the existence of calcinate within the nodule, are able to forecast the resistant nodules. HST in patients with resistant nodules is non-effective and surgery is suggested in patients with resistant nodules in the thyroid gland. Long time HST has a negative impact on the QoL patient after surgery.

Keywords: thyroid gland, nodule, hormone suppressive therapy, quality of life

Procedia PDF Downloads 101
3368 Integrating Natural Language Processing (NLP) and Machine Learning in Lung Cancer Diagnosis

Authors: Mehrnaz Mostafavi

Abstract:

The assessment and categorization of incidental lung nodules present a considerable challenge in healthcare, often necessitating resource-intensive multiple computed tomography (CT) scans for growth confirmation. This research addresses this issue by introducing a distinct computational approach leveraging radiomics and deep-learning methods. However, understanding local services is essential before implementing these advancements. With diverse tracking methods in place, there is a need for efficient and accurate identification approaches, especially in the context of managing lung nodules alongside pre-existing cancer scenarios. This study explores the integration of text-based algorithms in medical data curation, indicating their efficacy in conjunction with machine learning and deep-learning models for identifying lung nodules. Combining medical images with text data has demonstrated superior data retrieval compared to using each modality independently. While deep learning and text analysis show potential in detecting previously missed nodules, challenges persist, such as increased false positives. The presented research introduces a Structured-Query-Language (SQL) algorithm designed for identifying pulmonary nodules in a tertiary cancer center, externally validated at another hospital. Leveraging natural language processing (NLP) and machine learning, the algorithm categorizes lung nodule reports based on sentence features, aiming to facilitate research and assess clinical pathways. The hypothesis posits that the algorithm can accurately identify lung nodule CT scans and predict concerning nodule features using machine-learning classifiers. Through a retrospective observational study spanning a decade, CT scan reports were collected, and an algorithm was developed to extract and classify data. Results underscore the complexity of lung nodule cohorts in cancer centers, emphasizing the importance of careful evaluation before assuming a metastatic origin. The SQL and NLP algorithms demonstrated high accuracy in identifying lung nodule sentences, indicating potential for local service evaluation and research dataset creation. Machine-learning models exhibited strong accuracy in predicting concerning changes in lung nodule scan reports. While limitations include variability in disease group attribution, the potential for correlation rather than causality in clinical findings, and the need for further external validation, the algorithm's accuracy and potential to support clinical decision-making and healthcare automation represent a significant stride in lung nodule management and research.

Keywords: lung cancer diagnosis, structured-query-language (SQL), natural language processing (NLP), machine learning, CT scans

Procedia PDF Downloads 36
3367 Nitrogen Fixation of Soybean Approaches for Enhancing under Saline and Water Stress Conditions

Authors: Ayman El Sabagh, AbdElhamid Omar, Dekoum Assaha, Khair Mohammad Youldash, Akihiro Ueda, Celaleddin Barutçular, Hirofumi Saneoka

Abstract:

Drought and salinity stress are a worldwide problem, constraining global crop production seriously. Hence, soybean is susceptible to yield loss from water deficit and salinity stress. Therefore, different approaches have been suggested to solve these issues. Osmoprotectants play an important role in protection the plants from various environmental stresses. Moreover, organic fertilization has several beneficial effects on agricultural fields. Presently, efforts to maximize nitrogen fixation in soybean are critical because of widespread increase in soil degradation in Egypt. Therefore, a greenhouse research was conducted at plant nutritional physiology laboratory, Hiroshima University, Japan for assessing the impact of exogenous osmoregulators and compost application in alleviating the adverse effects of salinity and water stress on soybean. Treatments was included (i) water stress treatments (different soil moisture levels consisting of (100%, 75%, and 50% of field water holding capacity), (ii) salinity concentrations (0 and 15 mM) were applied in fully developed trifoliolate leaf node (V1), (iii) compost treatments (0 and 24 t ha-1) and (iv) the exogenous, proline and glycine betaine concentrations (0 mM and 25 mM) for each, was applied at two growth stages (V1 and R1). The seeds of soybean cultivar Giza 111, was sown into basin from wood (length10 meter, width 50cm, height 50cm and depth 350cm) containing a soil mixture of granite regosol soil and perlite (2:1 v/v). The nitrogen-fixing activity was estimated by using gas chromatography and all measurements were made in three replicates. The results showed that water deficit and salinity stress reduced biological nitrogen fixation and specific nodule activity than normal irrigation conditions. Exogenous osmoprotectants were improved biological nitrogen fixation and specific nodule activity as well as, applying of compost led to improving many of biological nitrogen fixation and specific nodule activity with superiority than stress conditions. The combined application compost fertilizer and exogenous osmoprotectants were more effective in alleviating the adverse effect of stress to improve biological nitrogen fixation and specific nodule activity of Soybean.

Keywords: a biotic stress, biological nitrogen fixation, compost, osmoprotectants, specific nodule activity, soybean

Procedia PDF Downloads 277
3366 Data Augmentation for Early-Stage Lung Nodules Using Deep Image Prior and Pix2pix

Authors: Qasim Munye, Juned Islam, Haseeb Qureshi, Syed Jung

Abstract:

Lung nodules are commonly identified in computed tomography (CT) scans by experienced radiologists at a relatively late stage. Early diagnosis can greatly increase survival. We propose using a pix2pix conditional generative adversarial network to generate realistic images simulating early-stage lung nodule growth. We have applied deep images prior to 2341 slices from 895 computed tomography (CT) scans from the Lung Image Database Consortium (LIDC) dataset to generate pseudo-healthy medical images. From these images, 819 were chosen to train a pix2pix network. We observed that for most of the images, the pix2pix network was able to generate images where the nodule increased in size and intensity across epochs. To evaluate the images, 400 generated images were chosen at random and shown to a medical student beside their corresponding original image. Of these 400 generated images, 384 were defined as satisfactory - meaning they resembled a nodule and were visually similar to the corresponding image. We believe that this generated dataset could be used as training data for neural networks to detect lung nodules at an early stage or to improve the accuracy of such networks. This is particularly significant as datasets containing the growth of early-stage nodules are scarce. This project shows that the combination of deep image prior and generative models could potentially open the door to creating larger datasets than currently possible and has the potential to increase the accuracy of medical classification tasks.

Keywords: medical technology, artificial intelligence, radiology, lung cancer

Procedia PDF Downloads 39
3365 Studies on Tolerance of Chickpea to Some Pre and Post Emergence Herbicides

Authors: Rahamdad Khan, Ijaz Ahmad Khan

Abstract:

In modern agriculture the herbicides application are considered the most effective and fast in action against all types of weeds. But it’s a fact that the herbicide applicator cannot totally secure the crop plants from the possible herbicide injuries that further leads to several destructive changes in plant biochemistry. For the purpose pots studies were undertaken to test the tolerance order of chickpea against pre- emergence herbicides (Stomp 330 EC- Dual Gold 960 EC) and post- emergence herbicides (Topik 15 WP- Puma Super 75 EW- Isoproturon 500 EW) during 2012-13 and 2013-14. The experimental design was CRD with three replications. Plant height, number of branches plant-1, number of seeds plant-1, nodulation, seed protein contents and other growth related parameters in chickpea were examined during the investigations. The results indicate that all the enquire herbicides gave a significant variation to all recorded parameter of chick pea except nodule fresh and dray weight. Moreover the toxic effect of pre-emergence herbicide on chickpea was found higher as compared to post-emergence herbicides. Minimum chickpea plant height (50.50 cm), number of nodule plant-1 (17.83) and lowest seed protein (14.13 %) was recorded in Stomp 330 EC. Similarly the outmost seeds plant-1 (29.66) and number of nodule plant-1 (21) were found for Puma Super 75 EW. The results further showed that the highest seed protein content (21.75 and 21.15 %) was recorded for control/ untreated and Puma Super 75EW. Taking under concentration the possible negative impact of the herbicides the chemical application must be minimized up to certain extent at which the crop is mostly secure. However chemical weed control has many advantages so we should train our farmer regarding the proper use of agro chemical to minimize the loses in crops while using herbicides.

Keywords: chickpea, herbicides, protein, stomp 330 EC, weed

Procedia PDF Downloads 463
3364 Efficient Signal Detection Using QRD-M Based on Channel Condition in MIMO-OFDM System

Authors: Jae-Jeong Kim, Ki-Ro Kim, Hyoung-Kyu Song

Abstract:

In this paper, we propose an efficient signal detector that switches M parameter of QRD-M detection scheme is proposed for MIMO-OFDM system. The proposed detection scheme calculates the threshold by 1-norm condition number and then switches M parameter of QRD-M detection scheme according to channel information. If channel condition is bad, the parameter M is set to high value to increase the accuracy of detection. If channel condition is good, the parameter M is set to low value to reduce complexity of detection. Therefore, the proposed detection scheme has better trade off between BER performance and complexity than the conventional detection scheme. The simulation result shows that the complexity of proposed detection scheme is lower than QRD-M detection scheme with similar BER performance.

Keywords: MIMO-OFDM, QRD-M, channel condition, BER

Procedia PDF Downloads 332
3363 Reduced Complexity of ML Detection Combined with DFE

Authors: Jae-Hyun Ro, Yong-Jun Kim, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

In multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems, many detection schemes have been developed to improve the error performance and to reduce the complexity. Maximum likelihood (ML) detection has optimal error performance but it has very high complexity. Thus, this paper proposes reduced complexity of ML detection combined with decision feedback equalizer (DFE). The error performance of the proposed detection scheme is higher than the conventional DFE. But the complexity of the proposed scheme is lower than the conventional ML detection.

Keywords: detection, DFE, MIMO-OFDM, ML

Procedia PDF Downloads 577
3362 How Does Vicia faba-rhizobia Symbiosis Improve Its Performance under Low Phosphorus Availability?

Authors: B. Makoudi, R. Ghanimi, M. Mouradi, A. Kabbadj, M. Farissi, J. J. Drevon, C. Ghoulam

Abstract:

This work focuses on the responses of Vicia fabarhizobia symbiosis to phosphorus deficiency and their contribution to tolerate this constraint. The study was carried out on four faba bean varieties, Aguadulce, Alfia, Luz Otono, and Reina Mora submitted to two phosphorus treatments, deficient and sufficient and cultivated under field and greenhouse hydroaeroponic culture. Plants were harvested at flowering stage for growth, nodulation and phosphorus content assessment. Phosphatases in nodules and rhizospheric soil were analyzed. The impact of phosphorus deficiency on yield component was assessed at maturity stage. Under field conditions, phosphorus deficiency affected negatively nodule biomass and nodule phosphorus content with Alfia and Reina Mora showing the highest biomass reduction. The phosphatase activities in nodules and rhizospheric soil were increased under phosphorus deficiency. At maturity stage, under soil low available phosphorus, the pods number and 100 seeds weight were reduced. The genotypic variation was evident for almost all tested parameters.

Keywords: faba bean, phosphorus, rhizobia, yield

Procedia PDF Downloads 423
3361 Cigarette Smoke Detection Based on YOLOV3

Authors: Wei Li, Tuo Yang

Abstract:

In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color features of cigarette smoke, the suspicious cigarette smoke area in the image is extracted. Secondly, combined with the efficiency of cigarette smoke detection and the problem of network overfitting, a network model for cigarette smoke detection was designed according to YOLOV3 algorithm to reduce the false detection rate. The experimental results show that the method is feasible and effective, and the accuracy of cigarette smoke detection is up to 99.13%, which satisfies the requirements of real-time cigarette smoke detection in complex scenes.

Keywords: deep learning, computer vision, cigarette smoke detection, YOLOV3, color feature extraction

Procedia PDF Downloads 54
3360 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 547
3359 Video Based Ambient Smoke Detection By Detecting Directional Contrast Decrease

Authors: Omair Ghori, Anton Stadler, Stefan Wilk, Wolfgang Effelsberg

Abstract:

Fire-related incidents account for extensive loss of life and material damage. Quick and reliable detection of occurring fires has high real world implications. Whereas a major research focus lies on the detection of outdoor fires, indoor camera-based fire detection is still an open issue. Cameras in combination with computer vision helps to detect flames and smoke more quickly than conventional fire detectors. In this work, we present a computer vision-based smoke detection algorithm based on contrast changes and a multi-step classification. This work accelerates computer vision-based fire detection considerably in comparison with classical indoor-fire detection.

Keywords: contrast analysis, early fire detection, video smoke detection, video surveillance

Procedia PDF Downloads 405
3358 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 282
3357 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 384
3356 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 403
3355 Improved Skin Detection Using Colour Space and Texture

Authors: Medjram Sofiane, Babahenini Mohamed Chaouki, Mohamed Benali Yamina

Abstract:

Skin detection is an important task for computer vision systems. A good method for skin detection means a good and successful result of the system. The colour is a good descriptor that allows us to detect skin colour in the images, but because of lightings effects and objects that have a similar colour skin, skin detection becomes difficult. In this paper, we proposed a method using the YCbCr colour space for skin detection and lighting effects elimination, then we use the information of texture to eliminate the false regions detected by the YCbCr colour skin model.

Keywords: skin detection, YCbCr, GLCM, texture, human skin

Procedia PDF Downloads 419
3354 Real-Time Detection of Space Manipulator Self-Collision

Authors: Zhang Xiaodong, Tang Zixin, Liu Xin

Abstract:

In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.

Keywords: space manipulator, collision detection, self-collision, the real-time collision detection

Procedia PDF Downloads 429
3353 Computer Countenanced Diagnosis of Skin Nodule Detection and Histogram Augmentation: Extracting System for Skin Cancer

Authors: S. Zith Dey Babu, S. Kour, S. Verma, C. Verma, V. Pathania, A. Agrawal, V. Chaudhary, A. Manoj Puthur, R. Goyal, A. Pal, T. Danti Dey, A. Kumar, K. Wadhwa, O. Ved

Abstract:

Background: Skin cancer is now is the buzzing button in the field of medical science. The cyst's pandemic is drastically calibrating the body and well-being of the global village. Methods: The extracted image of the skin tumor cannot be used in one way for diagnosis. The stored image contains anarchies like the center. This approach will locate the forepart of an extracted appearance of skin. Partitioning image models has been presented to sort out the disturbance in the picture. Results: After completing partitioning, feature extraction has been formed by using genetic algorithm and finally, classification can be performed between the trained and test data to evaluate a large scale of an image that helps the doctors for the right prediction. To bring the improvisation of the existing system, we have set our objectives with an analysis. The efficiency of the natural selection process and the enriching histogram is essential in that respect. To reduce the false-positive rate or output, GA is performed with its accuracy. Conclusions: The objective of this task is to bring improvisation of effectiveness. GA is accomplishing its task with perfection to bring down the invalid-positive rate or outcome. The paper's mergeable portion conflicts with the composition of deep learning and medical image processing, which provides superior accuracy. Proportional types of handling create the reusability without any errors.

Keywords: computer-aided system, detection, image segmentation, morphology

Procedia PDF Downloads 113
3352 Iris Detection on RGB Image for Controlling Side Mirror

Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris

Abstract:

Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.

Keywords: iris detection, midpoint coordinates, RGB images, side mirror

Procedia PDF Downloads 391
3351 Automatic Vehicle Detection Using Circular Synthetic Aperture Radar Image

Authors: Leping Chen, Daoxiang An, Xiaotao Huang

Abstract:

Automatic vehicle detection using synthetic aperture radar (SAR) image has been widely researched, as well as using optical remote sensing images. However, most researches treat the detection as an independent problem, failing to make full use of SAR data information. In circular SAR (CSAR), the two long borders of vehicle will shrink if the imaging surface is set higher than the reference one. Based on above variance, an automatic vehicle detection using CSAR image is proposed to enhance detection ability under complex environment, such as vehicles’ closely packing, which confuses the detector. The detection method uses the multiple images generated by different height plane to obtain an energy-concentrated image for detecting and then uses the maximally stable extremal regions method (MSER) to detect vehicles. A result of vehicles’ detection is given to verify the effectiveness and correctness of proposed method.

Keywords: circular SAR, vehicle detection, automatic, imaging

Procedia PDF Downloads 334
3350 Molecular Characterization and Phylogenetic Analysis of Capripoxviruses from Outbreak in Iran 2021

Authors: Maryam Torabi, Habibi, Abdolahi, Mohammadi, Hassanzadeh, Darban Maghami, Baghi

Abstract:

Sheeppox Virus (SPPV) and goatpox virus (GTPV) are considerable diseases of sheep, and goats, caused by viruses of the Capripoxvirus (CaPV) genus. They are responsible for economic losses. Animal mortality, morbidity, cost of vaccinations, and restrictions in animal products’ trade are the reasons of economic losses. Control and eradication of CaPV depend on early detection of outbreaks so that molecular detection and genetic analysis could be effective to this aim. This study was undertaken to molecularly characterize SPPV and GTPV strains that have been circulating in Iran. 120 skin papules and nodule biopsies were collected from different regions of Iran and were examined for SPPV, GTPV viruses using TaqMan Real -Time PCR. Some of these amplified genes were sequenced, and phylogenetic trees were constructed. Out of the 120 samples analysed, 98 were positive for CaPV by Real- Time PCR (81.6%), and most of them wereSPPV. then 10 positive samples were sequenced and characterized by amplifying the ORF 103CaPV gene. sequencing and phylogenetic analysis for these positive samples revealed a high percentage of identity with SPPV isolated from different countries in Middle East. In conclusions, molecular characterization revealed nearly complete identity with all recent SPPVs strains in local countries that requires further studies to monitor the virus evolution and transmission pathways to better understand the virus pathobiology that will help for SPPV control.

Keywords: molecular epidemiology, Real-Time PCR, phylogenetic analysis, capripoxviruses

Procedia PDF Downloads 112
3349 Adaptive CFAR Analysis for Non-Gaussian Distribution

Authors: Bouchemha Amel, Chachoui Takieddine, H. Maalem

Abstract:

Automatic detection of targets in a modern communication system RADAR is based primarily on the concept of adaptive CFAR detector. To have an effective detection, we must minimize the influence of disturbances due to the clutter. The detection algorithm adapts the CFAR detection threshold which is proportional to the average power of the clutter, maintaining a constant probability of false alarm. In this article, we analyze the performance of two variants of adaptive algorithms CA-CFAR and OS-CFAR and we compare the thresholds of these detectors in the marine environment (no-Gaussian) with a Weibull distribution.

Keywords: CFAR, threshold, clutter, distribution, Weibull, detection

Procedia PDF Downloads 549
3348 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 344
3347 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 441
3346 The Effect of Pixelation on Face Detection: Evidence from Eye Movements

Authors: Kaewmart Pongakkasira

Abstract:

This study investigated how different levels of pixelation affect face detection in natural scenes. Eye movements and reaction times, while observers searched for faces in natural scenes rendered in different ranges of pixels, were recorded. Detection performance for coarse visual detail at lower pixel size (3 x 3) was better than with very blurred detail carried by higher pixel size (9 x 9). The result is consistent with the notion that face detection relies on gross detail information of face-shape template, containing crude shape structure and features. In contrast, detection was impaired when face shape and features are obscured. However, it was considered that the degradation of scenic information might also contribute to the effect. In the next experiment, a more direct measurement of the effect of pixelation on face detection, only the embedded face photographs, but not the scene background, will be filtered.

Keywords: eye movements, face detection, face-shape information, pixelation

Procedia PDF Downloads 287
3345 Performance of Nakagami Fading Channel over Energy Detection Based Spectrum Sensing

Authors: M. Ranjeeth, S. Anuradha

Abstract:

Spectrum sensing is the main feature of cognitive radio technology. Spectrum sensing gives an idea of detecting the presence of the primary users in a licensed spectrum. In this paper we compare the theoretical results of detection probability of different fading environments like Rayleigh, Rician, Nakagami-m fading channels with the simulation results using energy detection based spectrum sensing. The numerical results are plotted as P_f Vs P_d for different SNR values, fading parameters. It is observed that Nakagami fading channel performance is better than other fading channels by using energy detection in spectrum sensing. A MATLAB simulation test bench has been implemented to know the performance of energy detection in different fading channel environment.

Keywords: spectrum sensing, energy detection, fading channels, probability of detection, probability of false alarm

Procedia PDF Downloads 497
3344 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 269
3343 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 42