This contribution presents a deep learning method for the extraction and fusion of information relating to kidney stone fragments acquired from different viewpoints of the endoscope. Surface and section fragment images are jointly used during the training of the classifier to improve the discrimination power of the features by adding attention layers at the end of each convolutional block. This approach is specifically designed to mimic the morpho-constitutional analysis performed in ex-vivo by biologists to visually identify kidney stones by inspecting both views. The addition of attention mechanisms to the backbone improved the results of single view extraction backbones by 4% on average. Moreover, in comparison to the state-of-the-art, the fusion of the deep features improved the overall results up to 11% in terms of kidney stone classification accuracy.
translated by 谷歌翻译
前列腺癌是全世界男性癌症第二大的癌症和第六主要原因。专家在诊断前列腺癌期间面临的主要问题是含有肿瘤组织的感兴趣区域(ROI)的定位。目前,在大多数情况下,该ROI的分割是由专家医生手动进行的,但是该程序受到某些患者的检测率低(约27-44%)或过度诊断的困扰。因此,几项研究工作解决了从磁共振图像中自动分割和提取ROI特征的挑战,因为此过程可以极大地促进许多诊断和治疗应用。然而,缺乏明确的前列腺边界,前列腺组织固有的异质性以及多种前列腺形状的多样性使这一过程非常难以自动化。在这项工作中,通过获得的MRI图像数据集对六个深度学习模型进行了培训和分析。来自Dijon中心的医院和Catalunya大学。我们使用分类跨环膜损失函数进行了多种深度学习模型(即U-NET,注意U-NET,密度密度,R2U-NET和R2U-NET)的比较。使用通常用于图像分割的三个指标进行分析:骰子分数,JACCARD索引和均方误差。为我们提供最佳结果分割的模型是R2U-NET,骰子,Jaccard和平均平方误差分别达到0.869、0.782和0.00013。
translated by 谷歌翻译
及时的手枪检测是提高公共安全的关键问题;然而,许多监视系统的有效性仍然依赖于有限的人类注意。以前关于手枪检测的大部分研究基于静态图像检测器,撇开可用于改善视频中的对象检测的有价值的时间信息。为了提高监控系统的性能,应建造实时颞尾手枪检测系统。使用时间yolov5,基于准反复性神经网络的架构,从视频中提取时间信息以改善手枪检测的结果。此外,提出了两种宣传数据集,用手,枪支和手机标记。一个包含2199静态图像来训练静态探测器,另一个包含5960帧视频来训练时间模块。此外,我们探索基于马赛克和混合的两个时间数据增强技术。得到的系统是三个时间架构:一个专注于减少使用地图$ _ {50:95} $ 56.1的推论,另一个在使用地图$ _ {50:95} $ 59.4之间具有良好的平衡。 ,最后一个专门从事准确性,用地图$ _ {50:95} $ 60.2。时间YOLOV5在中小型架构中实现实时检测。此外,它利用了视频中包含的时间特征,以便在我们的时间数据集中执行更好的YOLOV5,使TYOLOV5适用于现实世界应用。源代码在https://github.com/marioduran/tyolov5上公开使用。
translated by 谷歌翻译
风险评估在任何工作场所相关,然而,在处理易燃或危险物质时,在处理易燃或危险物质时,在这种情况下,这种情况都有程度的不可预测性可能是不够的。这的一个例子是喷射火灾的冲击,火焰的热量可以达到附近的设备,并显着增加Domino效应与灾难性结果的概率。因此,从风险管理的角度来看,这种火灾事故的表征是重要的。一种这样的表征将是火焰中不同辐射区的分割,因此本文提出了有关几种传统计算机视觉和深度学习分割方法来解决此具体问题的探索性研究。还探讨了使用丙烷喷射火灾的数据集丙烷喷射火灾训练和评估不同地区的分布以及寻求缓解数据不平衡的不同丢失功能的分布。此外,不同的指标与专家执行的手动排名相关联,以便对专家的标准密切相关的评估。 Hausdorff距离和调整后的随机索引是具有最高相关性的度量,并且从UNET架构获得了具有加权交叉熵损耗的最佳结果。这些结果可用于未来的研究,以从分割面具中提取更多几何信息,或者甚至可以在其他类型的火灾事故中实施。
translated by 谷歌翻译
In the last years, the number of IoT devices deployed has suffered an undoubted explosion, reaching the scale of billions. However, some new cybersecurity issues have appeared together with this development. Some of these issues are the deployment of unauthorized devices, malicious code modification, malware deployment, or vulnerability exploitation. This fact has motivated the requirement for new device identification mechanisms based on behavior monitoring. Besides, these solutions have recently leveraged Machine and Deep Learning techniques due to the advances in this field and the increase in processing capabilities. In contrast, attackers do not stay stalled and have developed adversarial attacks focused on context modification and ML/DL evaluation evasion applied to IoT device identification solutions. This work explores the performance of hardware behavior-based individual device identification, how it is affected by possible context- and ML/DL-focused attacks, and how its resilience can be improved using defense techniques. In this sense, it proposes an LSTM-CNN architecture based on hardware performance behavior for individual device identification. Then, previous techniques have been compared with the proposed architecture using a hardware performance dataset collected from 45 Raspberry Pi devices running identical software. The LSTM-CNN improves previous solutions achieving a +0.96 average F1-Score and 0.8 minimum TPR for all devices. Afterward, context- and ML/DL-focused adversarial attacks were applied against the previous model to test its robustness. A temperature-based context attack was not able to disrupt the identification. However, some ML/DL state-of-the-art evasion attacks were successful. Finally, adversarial training and model distillation defense techniques are selected to improve the model resilience to evasion attacks, without degrading its performance.
translated by 谷歌翻译
Cybercriminals are moving towards zero-day attacks affecting resource-constrained devices such as single-board computers (SBC). Assuming that perfect security is unrealistic, Moving Target Defense (MTD) is a promising approach to mitigate attacks by dynamically altering target attack surfaces. Still, selecting suitable MTD techniques for zero-day attacks is an open challenge. Reinforcement Learning (RL) could be an effective approach to optimize the MTD selection through trial and error, but the literature fails when i) evaluating the performance of RL and MTD solutions in real-world scenarios, ii) studying whether behavioral fingerprinting is suitable for representing SBC's states, and iii) calculating the consumption of resources in SBC. To improve these limitations, the work at hand proposes an online RL-based framework to learn the correct MTD mechanisms mitigating heterogeneous zero-day attacks in SBC. The framework considers behavioral fingerprinting to represent SBCs' states and RL to learn MTD techniques that mitigate each malicious state. It has been deployed on a real IoT crowdsensing scenario with a Raspberry Pi acting as a spectrum sensor. More in detail, the Raspberry Pi has been infected with different samples of command and control malware, rootkits, and ransomware to later select between four existing MTD techniques. A set of experiments demonstrated the suitability of the framework to learn proper MTD techniques mitigating all attacks (except a harmfulness rootkit) while consuming <1 MB of storage and utilizing <55% CPU and <80% RAM.
translated by 谷歌翻译
Uncertainty quantification is crucial to inverse problems, as it could provide decision-makers with valuable information about the inversion results. For example, seismic inversion is a notoriously ill-posed inverse problem due to the band-limited and noisy nature of seismic data. It is therefore of paramount importance to quantify the uncertainties associated to the inversion process to ease the subsequent interpretation and decision making processes. Within this framework of reference, sampling from a target posterior provides a fundamental approach to quantifying the uncertainty in seismic inversion. However, selecting appropriate prior information in a probabilistic inversion is crucial, yet non-trivial, as it influences the ability of a sampling-based inference in providing geological realism in the posterior samples. To overcome such limitations, we present a regularized variational inference framework that performs posterior inference by implicitly regularizing the Kullback-Leibler divergence loss with a CNN-based denoiser by means of the Plug-and-Play methods. We call this new algorithm Plug-and-Play Stein Variational Gradient Descent (PnP-SVGD) and demonstrate its ability in producing high-resolution, trustworthy samples representative of the subsurface structures, which we argue could be used for post-inference tasks such as reservoir modelling and history matching. To validate the proposed method, numerical tests are performed on both synthetic and field post-stack seismic data.
translated by 谷歌翻译
We present a Machine Learning (ML) study case to illustrate the challenges of clinical translation for a real-time AI-empowered echocardiography system with data of ICU patients in LMICs. Such ML case study includes data preparation, curation and labelling from 2D Ultrasound videos of 31 ICU patients in LMICs and model selection, validation and deployment of three thinner neural networks to classify apical four-chamber view. Results of the ML heuristics showed the promising implementation, validation and application of thinner networks to classify 4CV with limited datasets. We conclude this work mentioning the need for (a) datasets to improve diversity of demographics, diseases, and (b) the need of further investigations of thinner models to be run and implemented in low-cost hardware to be clinically translated in the ICU in LMICs. The code and other resources to reproduce this work are available at https://github.com/vital-ultrasound/ai-assisted-echocardiography-for-low-resource-countries.
translated by 谷歌翻译
$ $With recent advances in CNNs, exceptional improvements have been made in semantic segmentation of high resolution images in terms of accuracy and latency. However, challenges still remain in detecting objects in crowded scenes, large scale variations, partial occlusion, and distortions, while still maintaining mobility and latency. We introduce a fast and efficient convolutional neural network, ASBU-Net, for semantic segmentation of high resolution images that addresses these problems and uses no novelty layers for ease of quantization and embedded hardware support. ASBU-Net is based on a new feature extraction module, atrous space bender layer (ASBL), which is efficient in terms of computation and memory. The ASB layers form a building block that is used to make ASBNet. Since this network does not use any special layers it can be easily implemented, quantized and deployed on FPGAs and other hardware with limited memory. We present experiments on resource and accuracy trade-offs and show strong performance compared to other popular models.
translated by 谷歌翻译
Deep learning models have shown promising results in recognizing depressive states using video-based facial expressions. While successful models typically leverage using 3D-CNNs or video distillation techniques, the different use of pretraining, data augmentation, preprocessing, and optimization techniques across experiments makes it difficult to make fair architectural comparisons. We propose instead to enhance two simple models based on ResNet-50 that use only static spatial information by using two specific face alignment methods and improved data augmentation, optimization, and scheduling techniques. Our extensive experiments on benchmark datasets obtain similar results to sophisticated spatio-temporal models for single streams, while the score-level fusion of two different streams outperforms state-of-the-art methods. Our findings suggest that specific modifications in the preprocessing and training process result in noticeable differences in the performance of the models and could hide the actual originally attributed to the use of different neural network architectures.
translated by 谷歌翻译