Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 6 de 6
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
IEEE Trans Cybern ; PP2023 Sep 07.
Artículo en Inglés | MEDLINE | ID: mdl-37676810

RESUMEN

Object detection techniques have been widely studied, utilized in various works, and have exhibited robust performance on images with sufficient luminance. However, these approaches typically struggle to extract valuable features from low-luminance images, which often exhibit blurriness and dim appearence, leading to detection failures. To overcome this issue, we introduce an innovative unsupervised feature domain knowledge distillation (KD) framework. The proposed framework enhances the generalization capability of neural networks across both low-and high-luminance domains without incurring additional computational costs during testing. This improvement is made possible through the integration of generative adversarial networks and our proposed unsupervised KD process. Furthermore, we introduce a region-based multiscale discriminator designed to discern feature domain discrepancies at the object level rather than from the global context. This bolsters the joint learning process of object detection and feature domain distillation tasks. Both qualitative and quantitative assessments shown that the proposed method, empowered by the region-based multiscale discriminator and the unsupervised feature domain distillation process, can effectively extract beneficial features from low-luminance images, outperforming other state-of-the-art approaches in both low-and sufficient-luminance domains.

2.
Artículo en Inglés | MEDLINE | ID: mdl-37015621

RESUMEN

Photographs taken through a glass window are susceptible to disturbances due to reflection. Therefore, single image reflection removal is crucial to image quality enhancement. In this paper, a novel learning architecture that can address this ill-posed problem is proposed. First, a novel reflection removal pipeline was designed to reconstruct the missing information caused by the camera imaging process using the proposed missing recovery network. Second, to address the issues in existing reflection removal strategies, we revisit several auxiliary priors and integrate them by defining an energy function. To solve the energy function, a convolutional neural network-based optimization scheme was proposed. Finally, we investigated the dark channel responses of reflection and clean images and found an interesting way to distinguish between these two types of images. We prove this property mathematically and propose a novel loss function called dark channel loss to improve performance. Experiments show that the proposed method outperforms state-of-the-art reflection removal methods both quantitatively and qualitatively.

3.
Micromachines (Basel) ; 11(5)2020 May 15.
Artículo en Inglés | MEDLINE | ID: mdl-32429169

RESUMEN

Physical unclonable function (PUF), a hardware-efficient approach, has drawn a lot ofattention in the security research community for exploiting the inevitable manufacturing variabilityof integrated circuits (IC) as the unique fingerprint of each IC. However, analog PUF is notrobust and resistant to environmental conditions. In this paper, we propose a digital PUF-basedsecure authentication model using the emergent spin-transfer torque magnetic random-accessmemory (STT-MRAM) PUF (called STT-DPSA for short). STT-DPSA is an original secure identityauthentication architecture for Internet of Things (IoT) devices to devise a computationallylightweight authentication architecture which is not susceptible to environmental conditions.Considering hardware security level or cell area, we alternatively build matrix multiplication orstochastic logic operation for our authentication model. To prove the feasibility of our model, thereliability of our PUF is validated via the working windows between temperature interval (-35 °C,110 °C) and Vdd interval [0.95 V, 1.16 V] and STT-DPSA is implemented with parameters n = 32,i = o = 1024, k = 8, and l = 2 using FPGA design flow. Under this setting of parameters, an attackerneeds to take time complexity O(2256) to compromise STT-DPSA. We also evaluate STT-DPSA usingSynopsys design compiler with TSMC 0.18 um process.

4.
BMC Med Inform Decis Mak ; 19(1): 99, 2019 05 24.
Artículo en Inglés | MEDLINE | ID: mdl-31126274

RESUMEN

BACKGROUND: Numerous patients suffer from chronic wounds and wound infections nowadays. Until now, the care for wounds after surgery still remain a tedious and challenging work for the medical personnel and patients. As a result, with the help of the hand-held mobile devices, there is high demand for the development of a series of algorithms and related methods for wound infection early detection and wound self monitoring. METHODS: This research proposed an automated way to perform (1) wound image segmentation and (2) wound infection assessment after surgical operations. The first part describes an edge-based self-adaptive threshold detection image segmentation method to exclude nonwounded areas from the original images. The second part describes a wound infection assessment method based on machine learning approach. In this method, the extraction of feature points from the suture area and an optimal clustering method based on unimodal Rosin threshold algorithm that divides feature points into clusters are introduced. These clusters are then merged into several regions of interest (ROIs), each of which is regarded as a suture site. Notably, a support vector machine (SVM) can automatically interpret infections on these detected suture site. RESULTS: For (1) wound image segmentation, boundary-based evaluation were applied on 100 images with gold standard set up by three physicians. Overall, it achieves 76.44% true positive rate and 89.04% accuracy value. For (2) wound infection assessment, the results from a retrospective study using confirmed wound pictures from three physicians for the following four symptoms are presented: (1) Swelling, (2) Granulation, (3) Infection, and (4) Tissue Necrosis. Through cross-validation of 134 wound images, for anomaly detection, our classifiers achieved 87.31% accuracy value; for symptom assessment, our classifiers achieved 83.58% accuracy value. CONCLUSIONS: This augmentation mechanism has been demonstrated reliable enough to reduce the need for face-to-face diagnoses. To facilitate the use of this method and analytical framework, an automatic wound interpretation app and an accompanying website were developed. TRIAL REGISTRATION: 201505164RIND , 201803108RSB .


Asunto(s)
Algoritmos , Máquina de Vectores de Soporte , Infección de la Herida Quirúrgica/diagnóstico , Análisis por Conglomerados , Humanos , Estudios Retrospectivos
5.
IEEE Trans Neural Netw Learn Syst ; 29(8): 3828-3838, 2018 08.
Artículo en Inglés | MEDLINE | ID: mdl-28922130

RESUMEN

Restoration of visibility in hazy images is the first relevant step of information analysis in many outdoor computer vision applications. To this aim, the restored image must feature clear visibility with sufficient brightness and visible edges, while avoiding the production of noticeable artifacts. In this paper, we propose a haze removal approach based on the radial basis function (RBF) through artificial neural networks dedicated to effectively removing haze formation while retaining not only the visible edges but also the brightness of restored images. Unlike traditional haze-removal methods that consist of single atmospheric veils, the multiatmospheric veil is generated and then dynamically learned by the neurons of the proposed RBF networks according to the scene complexity. Through this process, more visible edges are retained in the restored images. Subsequently, the activation function during the testing process is employed to represent the brightness of the restored image. We compare the proposed method with the other state-of-the-art haze-removal methods and report experimental results in terms of qualitative and quantitative evaluations for benchmark color images captured in typical hazy weather conditions. The experimental results demonstrate that the proposed method is able to produce brighter and more vivid haze-free images with more visible edges than can the other state-of-the-art methods.

6.
Sensors (Basel) ; 10(4): 2770-92, 2010.
Artículo en Inglés | MEDLINE | ID: mdl-22319271

RESUMEN

An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given to this authentication problem. Moreover, existing methods suffer from different kinds of DoS attacks such as Path-Based DoS (PDoS) and False Endorsement-based DoS (FEDoS) attacks. In this paper, a scheme, called AAD, is proposed to Acquire Authentic Data in UWSNs. We exploit the collaboration among sensors to address the authentication problem. With the proper design of the collaboration mechanism, AAD has superior resilience against sensor compromises, PDoS attack, and FEDoS attack. In addition, compared with prior works, AAD also has relatively low energy consumption. In particular, according to our simulation, in a network with 1,000 sensors, the energy consumed by AAD is lower than 30% of that consumed by the existing method, ExCo. The analysis and simulation are also conducted to demonstrate the superiority of the proposed AAD scheme over the existing methods.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...