Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
Add more filters

Database
Language
Publication year range
1.
Ecotoxicol Environ Saf ; 270: 115894, 2024 Jan 15.
Article in English | MEDLINE | ID: mdl-38171100

ABSTRACT

Algal toxins produced by microalgae, such as domoic acid (DA)1, have toxic effects on humans. However, toxicity tests using mice only yield lethal doses of algal toxins without providing insights into the mechanism of action on cells. In this study, a fast segmentation of microfluidic flow cytometry cell images based on the bidirectional background subtraction (BBS)2 method was developed to get the visual evidence of apoptosis in both bright-field and fluorescence images. This approach enables mapping of changes in cell morphology and activity under algal toxins, allowing for fast (within 60 s) and automated biological detection. By combining microfluidics with flow cytometry, the intricate cellular-level reaction process can be observed in micro samples of 293 T cells and mouse spleen cells, offering potential for future in vitro experiments.


Subject(s)
Microalgae , Microfluidics , Humans , Animals , Mice , Flow Cytometry
2.
J Imaging Inform Med ; 2024 Apr 16.
Article in English | MEDLINE | ID: mdl-38627267

ABSTRACT

Skin cancer affects people of all ages and is a common disease. The death toll from skin cancer rises with a late diagnosis. An automated mechanism for early-stage skin cancer detection is required to diminish the mortality rate. Visual examination with scanning or imaging screening is a common mechanism for detecting this disease, but due to its similarity to other diseases, this mechanism shows the least accuracy. This article introduces an innovative segmentation mechanism that operates on the ISIC dataset to divide skin images into critical and non-critical sections. The main objective of the research is to segment lesions from dermoscopic skin images. The suggested framework is completed in two steps. The first step is to pre-process the image; for this, we have applied a bottom hat filter for hair removal and image enhancement by applying DCT and color coefficient. In the next phase, a background subtraction method with midpoint analysis is applied for segmentation to extract the region of interest and achieves an accuracy of 95.30%. The ground truth for the validation of segmentation is accomplished by comparing the segmented images with validation data provided with the ISIC dataset.

3.
Sci Rep ; 14(1): 6052, 2024 Mar 13.
Article in English | MEDLINE | ID: mdl-38480768

ABSTRACT

Human recognition and automated image validation are the most widely used approaches to validate the output of binary segmentation methods but, as the number of pixels in an image easily exceeds several million, they become highly demanding from both practical and computational standpoint. We propose a method, called PARSEG, which stands for PArtitioning, Random Selection, Estimation, and Generalization; being the basic steps within this procedure. Suggested method enables us to perform statistical validation of binary images by selecting the minimum number of pixels from the original image to be used for validation without deteriorating the effectiveness of the validation procedure. It utilizes binary classifiers to accomplish image validation and selects the optimal sample of pixels according to a specific objective function. As a result, the computational complexity of the validation experiment is substantially reduced. The procedure's effectiveness is illustrated by considering images composed of approximately 13 million pixels from the field of seed recognition. PARSEG provides roughly the same precision of the validation process when extended to the entire image, but it utilizes only about 4% of the original number of pixels, thus reducing, by about 90%, the computing time required to validate a binary segmented image.

4.
Bioinspir Biomim ; 19(5)2024 Jul 08.
Article in English | MEDLINE | ID: mdl-38917814

ABSTRACT

Flying insects rely mainly upon visual motion to detect and track objects. There has been a lot of research on fly inspired algorithms for object detection, but few have been developed based on visual motion alone. One of the daunting difficulties is that the neural and circuit mechanisms underlying the foreground-background segmentation are still unclear. Our previous modeling study proposed that the lobula held parallel pathways with distinct directional selectivity, each of which could retinotopically discriminate figures moving in its own preferred direction based on relative motion cues. The previous model, however, did not address how the multiple parallel pathways gave the only detection output at their common downstream. Since the preferred directions of the pathways along either horizontal or vertical axis were opposite to each other, the background moving in the opposite direction to an object also activated the corresponding lobula pathway. Indiscriminate or ungated projection from all the pathways to their downstream would mix objects with the moving background, making the previous model fail with non-stationary background. Here, we extend the previous model by proposing that the background motion-dependent gating of individual lobula projections is the key to object detection. Large-field lobula plate tangential cells are hypothesized to perform the gating to realize bioinspired background subtraction. The model is shown to be capable of implementing a robust detection of moving objects in video sequences with either a moving camera that induces translational optic flow or a static camera. The model sheds light on the potential of the concise fly algorithm in real-world applications.


Subject(s)
Motion Perception , Animals , Motion Perception/physiology , Biomimetics/methods , Algorithms , Computer Simulation , Insecta/physiology , Models, Neurological , Visual Pathways/physiology , Diptera/physiology
5.
Heliyon ; 10(15): e34922, 2024 Aug 15.
Article in English | MEDLINE | ID: mdl-39145028

ABSTRACT

The concept of security is becoming a global challenge, and governments, stakeholders, corporate societies, and individuals must urgently create a reasonable protection mechanism for good. Therefore, a real-time surveillance system is essential for detection, tracking, and monitoring. Many studies have attempted to provide better solutions but more research and better approaches are essential. This study presents a real-time framework for object detection and tracking for security surveillance systems. The system has been designed based on approximate median filtering, component labeling, background subtraction, and deep learning approaches. The new algorithms for object detection, tracking, and recognition have been implemented using Python and integrated with C# programming languages for ease of use. A software application framework is designed, implemented, and evaluated. The experimental results based on MOT-Challenge performance metrics show that the proposed algorithms have much better performance in terms of accuracy and precision on the MOT15, MOT16, and MOT17 datasets compared to state-of-the-art approaches. This framework also provides an accurate and effective means of monitoring and recognizing moving objects. The software development, including the design of the framework user interfaces, is coded in the C# programming language and integrated with Python using Microsoft Visual Studio (2019 edition). The integration is performed to provide a convenient user interface and to enable the execution of the framework as a standard and standalone software application. Future studies will consider the dynamic scalability of the framework to accommodate different surveillance application areas in overcrowded scenarios. Multiple data sources are integrated to enhance the performance for different scene times, locations, and weather conditions. Furthermore, other object-detection techniques such as You Only Look Once (YOLO) and its variants shall be considered in future studies. These techniques allow the framework to adapt to complex situations in which security surveillance is challenging.

SELECTION OF CITATIONS
SEARCH DETAIL