University of Birjand
Breast cancer stands as a prevalent cause of fatality among females on a global scale, with prompt detection playing a pivotal role in diminishing mortality rates. The utilization of ultrasound scans in the BUSI dataset for medical imagery pertaining to breast cancer has exhibited commendable segmentation outcomes through the application of UNet and UNet++ networks. Nevertheless, a notable drawback of these models resides in their inattention towards the temporal aspects embedded within the images. This research endeavors to enrich the UNet++ architecture by integrating LSTM layers and self-attention mechanisms to exploit temporal characteristics for segmentation purposes. Furthermore, the incorporation of a Multiscale Feature Extraction Module aims to grasp varied scale features within the UNet++. Through the amalgamation of our proposed methodology with data augmentation on the BUSI with GT dataset, an accuracy rate of 98.88%, specificity of 99.53%, precision of 95.34%, sensitivity of 91.20%, F1-score of 93.74, and Dice coefficient of 92.74% are achieved. These findings demonstrate competitiveness with cutting-edge techniques outlined in existing literature.
The Complex Emotion Recognition System (CERS) deciphers complex emotional states by examining combinations of basic emotions expressed, their interconnections, and the dynamic variations. Through the utilization of advanced algorithms, CERS provides profound insights into emotional dynamics, facilitating a nuanced understanding and customized responses. The attainment of such a level of emotional recognition in machines necessitates the knowledge distillation and the comprehension of novel concepts akin to human cognition. The development of AI systems for discerning complex emotions poses a substantial challenge with significant implications for affective computing. Furthermore, obtaining a sizable dataset for CERS proves to be a daunting task due to the intricacies involved in capturing subtle emotions, necessitating specialized methods for data collection and processing. Incorporating physiological signals such as Electrocardiogram (ECG) and Electroencephalogram (EEG) can notably enhance CERS by furnishing valuable insights into the user's emotional state, enhancing the quality of datasets, and fortifying system dependability. A comprehensive literature review was conducted in this study to assess the efficacy of machine learning, deep learning, and meta-learning approaches in both basic and complex emotion recognition utilizing EEG, ECG signals, and facial expression datasets. The chosen research papers offer perspectives on potential applications, clinical implications, and results of CERSs, with the objective of promoting their acceptance and integration into clinical decision-making processes. This study highlights research gaps and challenges in understanding CERSs, encouraging further investigation by relevant studies and organizations. Lastly, the significance of meta-learning approaches in improving CERS performance and guiding future research endeavors is underscored.
With the emergence of the Internet of things (IoT), human life is now progressing towards smartification faster than ever before. Thus, smart cities become automated in different aspects such as business, education, economy, medicine, and urban areas. Since smartification requires a variety of dynamic information in different urban dimensions, mobile crowdsourcing has gained importance in smart cities. This chapter systematically reviews the related applications of smart cities that use mobile crowdsourcing for data acquisition. For this purpose, the applications are classified as environmental, urban life, and transportation categories and then investigated in detail. This survey helps in understanding the current situation of smart cities from the viewpoint of crowdsourcing and discusses the future research directions in this field.
Myocardial infarction (MI) results in heart muscle injury due to receiving insufficient blood flow. MI is the most common cause of mortality in middle-aged and elderly individuals around the world. To diagnose MI, clinicians need to interpret electrocardiography (ECG) signals, which requires expertise and is subject to observer bias. Artificial intelligence-based methods can be utilized to screen for or diagnose MI automatically using ECG signals. In this work, we conducted a comprehensive assessment of artificial intelligence-based approaches for MI detection based on ECG as well as other biophysical signals, including machine learning (ML) and deep learning (DL) models. The performance of traditional ML methods relies on handcrafted features and manual selection of ECG signals, whereas DL models can automate these tasks. The review observed that deep convolutional neural networks (DCNNs) yielded excellent classification performance for MI diagnosis, which explains why they have become prevalent in recent years. To our knowledge, this is the first comprehensive survey of artificial intelligence techniques employed for MI diagnosis using ECG and other biophysical signals.
Trusting the accuracy of data inputted on online platforms can be difficult due to the possibility of malicious websites gathering information for unlawful reasons. Analyzing each website individually becomes challenging with the presence of such malicious sites, making it hard to efficiently list all Uniform Resource Locators (URLs) on a blacklist. This ongoing challenge emphasizes the crucial need for strong security measures to safeguard against potential threats and unauthorized data collection. To detect the risk posed by malicious websites, it is proposed to utilize Machine Learning (ML)-based techniques. To this, we used several ML techniques such as Hist Gradient Boosting Classifier (HGBC), K-Nearest Neighbor (KNN), Logistic Regression (LR), Decision Tree (DT), Random Forest (RF), Multi-Layer Perceptron (MLP), Light Gradient Boosting Machine (LGBM), and Support Vector Machine (SVM) for detection of the benign and malicious website dataset. The dataset used contains 1781 records of malicious and benign website data with 13 features. First, we investigated missing value imputation on the dataset. Then, we normalized this data by scaling to a range of zero and one. Next, we utilized the Synthetic Minority Oversampling Technique (SMOTE) to balance the training data since the data set was unbalanced. After that, we applied ML algorithms to the balanced training set. Meanwhile, all algorithms were optimized based on grid search. Finally, the models were evaluated based on accuracy, precision, recall, F1 score, and the Area Under the Curve (AUC) metrics. The results demonstrated that the HGBC classifier has the best performance in terms of the mentioned metrics compared to the other classifiers.
The Λ- \Lambda{\text -} and Ξ- \Xi{\text -}triton(t) momentum correlation functions, to be measured in high-energy heavy-ion collisions, are explored. Mainly, STAR detector acquired data provides an opportunity to explore the $ \Lambda t $ correlation function. The Λt \Lambda t correlation functions are calculated using an isle-type and spin-averaged Λt \Lambda t potential, also, its sensitivity to changes in potential strength has also been investigated. % Besides, even though there is no experimental data on the $ \Xi{\text -} $triton interaction yet, I constructed Ξt\Xi t potentials based on the first principles HAL QCD and Nijmegen extended soft-core (ESC08c) model of spin- and isospin averaged $\Xi N$ interactions in single-folding potentials (SFP) approach. Then, the Ξt\Xi t correlation functions are calculated for these two modern potentials as well as for Nijmegen hard-core model D (NHC-D) ΞN\Xi N potential. The numerical results predict that, with good measurement resolution, it might be possible to recognize different potentials with a correlation function at relatively small source sizes, i.e., R=13 R = 1-3 fm.
The spin dependence of the ϕ \phi N interaction is explored through the bound states of ϕN-α \phi\textrm{N-}\alpha mesic nuclei with α\alpha being a spectator to attract the ϕ \phi N pair without changing its spin structure. The bound state of ϕ6He _{\phi}^{6}\textrm{He} mesic nuclei is calculated within the framework of the developed three-body cluster model by solving the Faddeev equations in the method of hyperspherical harmonics (HH) expansions. The calculations are done by employing the state-of-the-art ϕ \phi N potential obtained from lattice QCD calculations and correlation function analysis for the 4S3/2^{4}S_{3/2} and 2S1/2^{2}S_{1/2} channels. The ϕα \phi\alpha potential is constructed through a folding procedure of the spin-averaged ϕ \phi N interaction with the matter distribution of 4He ^{4}\textrm{He} . And for Nα\alpha potential two common types of Nα\alpha interactions are taken from the literature with central and spin-orbit components. The central binding energies of the ϕN-α \phi\textrm{N-}\alpha bound states in the spin 3/2(1/2) 3/2\left(1/2\right) channel are found to be 10(25)\sim 10 \left(25\right) and 11(13) 11 \left(13\right) MeV at Euclidean times t/a=12 t/a=12 and 1414, respectively. As well as, the corresponding nuclear matter radii are estimated to be 4.5(1.7)\sim 4.5 \left(1.7\right) and 4.6(1.8) 4.6 \left(1.8\right) fm.
Human brain neuron activities are incredibly significant nowadays. Neuronal behavior is assessed by analyzing signal data such as electroencephalography (EEG), which can offer scientists valuable information about diseases and human-computer interaction. One of the difficulties researchers confront while evaluating these signals is the existence of large volumes of spike data. Spikes are some considerable parts of signal data that can happen as a consequence of vital biomarkers or physical issues such as electrode movements. Hence, distinguishing types of spikes is important. From this spot, the spike classification concept commences. Previously, researchers classified spikes manually. The manual classification was not precise enough as it involves extensive analysis. Consequently, Artificial Intelligence (AI) was introduced into neuroscience to assist clinicians in classifying spikes correctly. This review discusses the importance and use of AI in spike classification, focusing on the recognition of neural activity noises. The task is divided into three main components: preprocessing, classification, and evaluation. Existing methods are introduced and their importance is determined. The review also highlights the need for more efficient algorithms. The primary goal is to provide a perspective on spike classification for future research and provide a comprehensive understanding of the methodologies and issues involved. The review organizes materials in the spike classification field for future studies. In this work, numerous studies were extracted from different databases. The PRISMA-related research guidelines were then used to choose papers. Then, research studies based on spike classification using machine learning and deep learning approaches with effective preprocessing were selected.
This paper presents an application of adaptive control algorithm in order to reject the external disturbances in dual-stage hard disk drives. For this purpose, a dual PID controller is first designed without the plant exposure to external disturbances. Then, an adaptive control approach based on recursive least squares adaptive (RLS) algorithm was employed to identify and reject disturbances. The performance of the proposed technique was evaluated for hard disk track-seeking through simulation experiments. Results show the feasibility and precise tracking of the designed control system.
The effects of outflow on the behavior of a viscous gaseous disc around a compact object in an advection-dominated state are examined in this paper. We suppose that the flow is steady, axisymmetric, and rotating. Also, we focus on the model in which the mass, the angular momentum, and the energy can be transported outward by outflow. Similar to the pioneering studies, we consider a power-law function for mass inflow rate as M˙rs\dot{M} \propto r^s. We assume that the power index ss is proportional to the dimensionless thickness H/RH/R of disc. To analyze such a system, the hydrodynamic equations have extracted in cylindrical coordinates (r,φ,z)(r,\varphi,z). Then, the flow equations were vertically integrated, and a set of self-similar solutions was got in the radial direction. Our solutions include three essential parameters: λ\lambda, ff and ζ\zeta. The influence of the outflow on the dynamics of the disc is investigated by the λ\lambda parameter. The degree of advection of flow is shown by the advection parameter ff. Also, energy extraction from the disc by the outflow is showed by ζ\zeta parameter. Our findings demonstrate a significant correlation between the outflow parameters, flow advection parameter, and the temperature, thickness, and inflow-outflow rate of the disc. In addition, we explored the influence of these parameters on the power index ss, too. The results of our study demonstrate that enhancing the outflow parameter or flow advection degree increases power index ss, while extracting more energy through outflow decreases index ss.
This paper introduces a comprehensive database for research and investigation on the effects of inheritance on handwriting. A database has been created that can be used to answer questions such as: Is there a genetic component to handwriting? Is handwriting inherited? Do family relationships affect handwriting? Varieties of samples of handwritten components such as: digits, letters, shapes and free paragraphs of 210 families including (grandparents, parents, uncles, aunts, siblings, cousins, nephews and nieces) have been collected using specially designed forms, and family relationships of all writers are captured. To the best of our knowledge, no such database is presently available. Based on comparisons and investigation of features of handwritings of family members, similarities among their features and writing styles are detected. Our database is freely available to the pattern recognition community and hope it will pave the way for investigations on the effects of inheritance and family relationships on handwritings.
Mammography is often used as the most common laboratory method for the detection of breast cancer, yet associated with the high cost and many side effects. Machine learning prediction as an alternative method has shown promising results. This paper presents a method based on a multilayer fuzzy expert system for the detection of breast cancer using an extreme learning machine (ELM) classification model integrated with radial basis function (RBF) kernel called ELM-RBF, considering the Wisconsin dataset. The performance of the proposed model is further compared with a linear-SVM model. The proposed model outperforms the linear-SVM model with RMSE, R2, MAPE equal to 0.1719, 0.9374 and 0.0539, respectively. Furthermore, both models are studied in terms of criteria of accuracy, precision, sensitivity, specificity, validation, true positive rate (TPR), and false-negative rate (FNR). The ELM-RBF model for these criteria presents better performance compared to the SVM model.
In this paper, a novel objective evaluation metric for image fusion is presented. Remarkable and attractive points of the proposed metric are that it has no parameter, the result is probability in the range of [0, 1] and it is free from illumination dependence. This metric is easy to implement and the result is computed in four steps: (1) Smoothing the images using Gaussian filter. (2) Transforming images to a vector field using Del operator. (3) Computing the normal distribution function ({\mu},{\sigma}) for each corresponding pixel, and converting to the standard normal distribution function. (4) Computing the probability of being well-behaved fusion method as the result. To judge the quality of the proposed metric, it is compared to thirteen well-known non-reference objective evaluation metrics, where eight fusion methods are employed on seven experiments of multimodal medical images. The experimental results and statistical comparisons show that in contrast to the previously objective evaluation metrics the proposed one performs better in terms of both agreeing with human visual perception and evaluating fusion methods that are not performed at the same level.
This paper explores the integration of power splitting(PS) simultaneous wireless information and power transfer (SWIPT) architecture and federated learning (FL) in Internet of Things (IoT) networks. The use of SWIPT allows power-constrained devices to simultaneously harvest energy and transmit data, addressing the energy limitations faced by IoT devices. The proposed scenario involves an Unmanned Arial Vehicle (UAV) serving as the base station (BS) and edge server, aggregating weight updates from IoT devices and unicasting aggregated updates to each device. The results demonstrate the feasibility of FL in IoT scenarios, ensuring communication efficiency without depleting device batteries.
The deuteron-deuteron (D-D) thermonuclear reaction rates in metallic environments (considering the electron screening effects) is calculated using the S-factor functions which were obtained by fitting to low-energy data on D-D reactions. For this purpose, a fitted S-factor model based on the NACRE compilation is employed. This limited the energy range of Big Bang nucleosynthesis (BBN) for the 2H(d,p)3H ^{2}\textrm{H}\left(d,p\right) ^{3}\textrm{H} and 2H(d,n)3He^{2} \textrm{H} \left(d,n\right) ^{3}\textrm{He} reactions. The corresponding Maxwellian-averaged thermonuclear reaction rates of relevance in astrophysical plasmas at temperatures in the range from 10610^{6} K to 1010(or 1.3×108)10^{10}\left(\textrm{or }1.3\times10^{8}\right) K are provided in tabular formats. In these evaluations, the screening energy (Ue U_{e} ) is assumed to be 100,400,750,1000100, 400, 750, 1000 eV and 12501250 eV. This series of values has been selected based on theoretical and experimental studies conducted so far. % Eventually, our numerical analysis suggests that the ratio of the reaction rate with the screening potential to the reaction rate without the screening potential, can be described by the term exp(4.70+6.50Ue/T9) \exp\left(4.70 +6.50\:{U_{e}}/{T_{9}}\right) for both 2H(d,p)3H ^{2}\textrm{H}\left(d,p\right) ^{3}\textrm{H} and 2H(d,n)3He^{2} \textrm{H} \left(d,n\right) ^{3}\textrm{He} reactions. This series of values has been selected based on theoretical and experimental studies conducted so far.
Accurate prediction of molecular solubility is a cornerstone of early-stage drug discovery, yet conventional machine learning models face significant challenges due to limited labeled data and the high-dimensional nature of molecular descriptors. To address these issues, we propose LatMixSol, a novel latent space augmentation framework that combines autoencoder-based feature compression with guided interpolation to enrich training data. Our approach first encodes molecular descriptors into a low-dimensional latent space using a two-layer autoencoder. Spectral clustering is then applied to group chemically similar molecules, enabling targeted MixUp-style interpolation within clusters. Synthetic samples are generated by blending latent vectors of cluster members and decoding them back to the original feature space. Evaluated on the Huuskonen solubility benchmark, LatMixSol demonstrates consistent improvements across three of four gradient-boosted regressors (CatBoost, LightGBM, HistGradientBoosting), achieving RMSE reductions of 3.2-7.6% and R-squared increases of 0.5-1.5%. Notably, HistGradientBoosting shows the most significant enhancement with a 7.6% RMSE improvement. Our analysis confirms that cluster-guided latent space augmentation preserves chemical validity while expanding dataset diversity, offering a computationally efficient strategy to enhance predictive models in resource-constrained drug discovery pipelines.
Objectives: Timely and accurate detection of colorectal polyps plays a crucial role in diagnosing and preventing colorectal cancer, a major cause of mortality worldwide. This study introduces a new, lightweight, and efficient framework for polyp detection that combines the Local Outlier Factor (LOF) algorithm for filtering noisy data with the YOLO-v11n deep learning model. Study design: An experimental study leveraging deep learning and outlier removal techniques across multiple public datasets. Methods: The proposed approach was tested on five diverse and publicly available datasets: CVC-ColonDB, CVC-ClinicDB, Kvasir-SEG, ETIS, and EndoScene. Since these datasets originally lacked bounding box annotations, we converted their segmentation masks into suitable detection labels. To enhance the robustness and generalizability of our model, we apply 5-fold cross-validation and remove anomalous samples using the LOF method configured with 30 neighbors and a contamination ratio of 5%. Cleaned data are then fed into YOLO-v11n, a fast and resource-efficient object detection architecture optimized for real-time applications. We train the model using a combination of modern augmentation strategies to improve detection accuracy under diverse conditions. Results: Our approach significantly improves polyp localization performance, achieving a precision of 95.83%, recall of 91.85%, F1-score of 93.48%, mAP@0.5 of 96.48%, and mAP@0.5:0.95 of 77.75%. Compared to previous YOLO-based methods, our model demonstrates enhanced accuracy and efficiency. Conclusions: These results suggest that the proposed method is well-suited for real-time colonoscopy support in clinical settings. Overall, the study underscores how crucial data preprocessing and model efficiency are when designing effective AI systems for medical imaging.
One of the most common and important destructive attacks on the victim system is Advanced Persistent Threat (APT)-attack. The APT attacker can achieve his hostile goals by obtaining information and gaining financial benefits regarding the infrastructure of a network. One of the solutions to detect a secret APT attack is using network traffic. Due to the nature of the APT attack in terms of being on the network for a long time and the fact that the network may crash because of high traffic, it is difficult to detect this type of attack. Hence, in this study, machine learning methods such as C5.0 decision tree, Bayesian network and deep neural network are used for timely detection and classification of APT-attacks on the NSL-KDD dataset. Moreover, 10-fold cross validation method is used to experiment these models. As a result, the accuracy (ACC) of the C5.0 decision tree, Bayesian network and 6-layer deep learning models is obtained as 95.64%, 88.37% and 98.85%, respectively, and also, in terms of the important criterion of the false positive rate (FPR), the FPR value for the C5.0 decision tree, Bayesian network and 6-layer deep learning models is obtained as 2.56, 10.47 and 1.13, respectively. Other criterions such as sensitivity, specificity, accuracy, false negative rate and F-measure are also investigated for the models, and the experimental results show that the deep learning model with automatic multi-layered extraction of features has the best performance for timely detection of an APT-attack comparing to other classification models.
Lip-based biometric authentication (LBBA) has attracted many researchers during the last decade. The lip is specifically interesting for biometric researchers because it is a twin biometric with the potential to function both as a physiological and a behavioral trait. Although much valuable research was conducted on LBBA, none of them considered the different emotions of the client during the video acquisition step of LBBA, which can potentially affect the client's facial expressions and speech tempo. We proposed a novel network structure called WhisperNetV2, which extends our previously proposed network called WhisperNet. Our proposed network leverages a deep Siamese structure with triplet loss having three identical SlowFast networks as embedding networks. The SlowFast network is an excellent candidate for our task since the fast pathway extracts motion-related features (behavioral lip movements) with a high frame rate and low channel capacity. The slow pathway extracts visual features (physiological lip appearance) with a low frame rate and high channel capacity. Using an open-set protocol, we trained our network using the CREMA-D dataset and acquired an Equal Error Rate (EER) of 0.005 on the test set. Considering that the acquired EER is less than most similar LBBA methods, our method can be considered as a state-of-the-art LBBA method.
Our aim was to assess the ability of radiography-based bone texture parameters in proximal femur and acetabulum to predict incident radiographic hip osteoarthritis (rHOA) over a 10 years period. Pelvic radiographs from CHECK (Cohort Hip and Cohort Knee) at baseline (987 hips) were analyzed for bone texture using fractal signature analysis in proximal femur and acetabulum. Elastic net (machine learning) was used to predict the incidence of rHOA (Kellgren-Lawrence grade (KL) > 1 or total hip replacement (THR)), joint space narrowing score (JSN, range 0-3), and osteophyte score (OST, range 0-3) after 10 years. Performance of prediction models was assessed using the area under the receiver operating characteristic curve (ROC AUC). Of the 987 hips without rHOA at baseline, 435 (44%) had rHOA at 10-year follow-up. Of the 667 hips with JSN grade 0 at baseline, 471 (71%) had JSN grade > 0 at 10-year follow-up. Of the 613 hips with OST grade 0 at baseline, 526 (86%) had OST grade > 0 at 10-year follow-up. AUCs for the models including age, gender, and body mass index to predict incident rHOA, JSN, and OST were 0.59, 0.54, and 0.51, respectively. The inclusion of bone texture parameters in the models improved the prediction of incident rHOA (ROC AUC 0.66 and 0.71 when baseline KL was also included in the model) and JSN (ROC AUC 0.62), but not incident OST (ROC AUC 0.53). Bone texture analysis provides additional information for predicting incident rHOA or THR over 10 years.
There are no more papers matching your filters at the moment.