Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r May 2024

Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

Breast cancer is the most prevalent and crucial cancer type that should be diagnosed early to reduce mortality. Therefore, mammography is essential for early diagnosis owing to high-resolution imaging and appropriate visualization. However, the major problem of mammography screening is the high false positive recall rate for breast cancer diagnosis. High false positive recall rates psychologically affect patients, leading to anxiety, depression, and stress. Moreover, false positive recalls increase costs and create an unnecessary expert workload. Thus, this study proposes a deep learning based breast cancer diagnosis model to reduce false positive and false negative rates. The proposed model has …


Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek May 2024

Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek

Turkish Journal of Electrical Engineering and Computer Sciences

This survey focuses on Text-to-SQL, automated translation of natural language queries into SQL queries. Initially, we describe the problem and its main challenges. Then, by following the PRISMA systematic review methodology, we survey the existing Text-to-SQL review papers in the literature. We apply the same method to extract proposed Text-to-SQL models and classify them with respect to used evaluation metrics and benchmarks. We highlight the accuracies achieved by various models on Text-to-SQL datasets and discuss execution-guided evaluation strategies. We present insights into model training times and implementations of different models. We also explore the availability of Text-to-SQL datasets in non-English …


Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng May 2024

Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng

Turkish Journal of Electrical Engineering and Computer Sciences

Deep learning (DL) models have performed tremendously well in image classification. This good performance can be attributed to the availability of massive data in most domains. However, some domains are known to have few datasets, especially the health sector. This makes it difficult to develop domain-specific high-performing DL algorithms for these fields. The field of health is critical and requires accurate detection of diseases. In the United States Gastrointestinal diseases are prevalent and affect 60 to 70 million people. Ulcerative colitis, polyps, and esophagitis are some gastrointestinal diseases. Colorectal polyps is the third most diagnosed malignancy in the world. This …


Enhancing Electrical Network Vulnerability Assessment With Machine Learning And Deep Learning Techniques, M Mishkatur Rahman, Ayman Sajjad Akash, Harun Pirim, Chau Le, Trung Le, Om Prakash Yadav May 2024

Enhancing Electrical Network Vulnerability Assessment With Machine Learning And Deep Learning Techniques, M Mishkatur Rahman, Ayman Sajjad Akash, Harun Pirim, Chau Le, Trung Le, Om Prakash Yadav

Northeast Journal of Complex Systems (NEJCS)

This research utilizes advanced machine learning techniques to evaluate node vul-
nerability in power grid networks. Utilizing the SciGRID and GridKit datasets, con-
sisting of 479, 16,167 nodes and 765, 20,539 edges respectively, the study employs
K-nearest neighbor and median imputation methods to address missing data. Cen-
trality metrics are integrated into a single comprehensive score for assessing node
criticality, categorizing nodes into four centrality levels informative of vulnerability.
This categorization informs the use of traditional machine learning (including XG-
Boost, SVM, Multilayer Perceptron) and Graph Neural Networks in the analysis.
The study not only benchmarks the capabilities of these …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei Apr 2024

Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei

Journal of System Simulation

Abstract: In order to improve the processing ability of the depth-neural network dehazing algorithm to the supplementary data set, and to make the network differently process the image features of different importance to improve the dehazing ability of the network, an incremental dehazing algorithm based on multiple migration of attention is proposed. The teacher's attention generation network in the form of Encoder-Decoder extracts the multiple attention of labels and haze, which is used it as the label of the characteristic migration media network to constrain the network training to form the migration media attention as close as possible to the …


Anti-Phishing Approach For Iot System In Fog Networks Based On Machine Learning Algorithms, Mahmoud Gad Awwad, Mohamed M. Ashour, El Said A. Marzouk, Eman Abdelhalim Mar 2024

Anti-Phishing Approach For Iot System In Fog Networks Based On Machine Learning Algorithms, Mahmoud Gad Awwad, Mohamed M. Ashour, El Said A. Marzouk, Eman Abdelhalim

Mansoura Engineering Journal

As the Internet of Things (IoT) continues to expand, ensuring the security and privacyِ of IoT systems becomes increasingly critical. Phishing attacks pose a significant threat to IoT devices and can lead to unauthorized access, data breaches, and compromised functionality. In this paper, we propose an anti-phishing approach for IoT systems in fog networks that leverages machine learning algorithms, including a .fusion with deep learning techniques We explore the effectiveness of eleven traditional machine learning algorithms combined with deep learning in detecting and preventing phishing attacks in IoT systems. By utilizing a diverse range of algorithms, we aim to enhance …


Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu Feb 2024

Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Recent advances in deep learning, increased availability of large-scale datasets, and improvement of accelerated graphics processing units facilitated creation of an unprecedented amount of synthetically generated media content with impressive visual quality. Although such technology is used predominantly for entertainment, there is widespread practice of using deepfake technology for malevolent ends. This potential for malicious use necessitates the creation of detection methods capable of reliably distinguishing manipulated video content. In this work we aim to create a learning-based detection method for synthetically generated videos. To this end, we attempt to detect spatiotemporal inconsistencies by leveraging a learning-based magnification-inspired feature manipulation …


Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu Feb 2024

Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The utilization of remote sensing products for vehicle detection through deep learning has gained immense popularity, especially due to the advancement of unmanned aerial vehicles (UAVs). UAVs offer millimeter-level spatial resolution at low flight altitudes, which surpasses traditional airborne platforms. Detecting vehicles from very high-resolution UAV data is crucial in numerous applications, including parking lot and highway management, traffic monitoring, search and rescue missions, and military operations. Obtaining UAV data at desired periods allows the detection and tracking of target objects even several times during a day. Despite challenges such as diverse vehicle characteristics, traffic congestion, and hardware limitations, the …


Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li Jan 2024

Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li

Journal of System Simulation

Abstract: Aiming at the lack of directionality of traditional dot product attention, this paper proposes a directed attention model (DAM) based on cosine similarity. To effectively represent the direction relationship between the spatial and temporal features of video frames, the paper defines the relationship function in the attention mechanism using the cosine similarity theory, which can remove the absolute value of the relationship between features. To reduce the computational burden of the attention mechanism, the operation is decomposed from two dimensions of time and space. The computational complexity is further optimized by combining linear attention operation. The experiment is divided …


Deep Learning Based Classification Of Focal Liver Lesions With 3 And 4 Phase Contrast-Enhanced Ct Protocols, Ahmed El-Emam, Hossam El-Din Moustafa, Mohamed Moawad, Mohamed Aouf Jan 2024

Deep Learning Based Classification Of Focal Liver Lesions With 3 And 4 Phase Contrast-Enhanced Ct Protocols, Ahmed El-Emam, Hossam El-Din Moustafa, Mohamed Moawad, Mohamed Aouf

Mansoura Engineering Journal

It had been noticed that 3-phase and 4-phase computed tomography protocols with contrast serve as standard examinations for diagnosing liver tumors. Additionally, many patients require periodic follow-up, which entails significant radiation exposure for them. Advancements in image processing facilitate automated liver lesion segmentation. However, the challenge remains in classifying these small lesions by doctors, especially when the liver has different types of lesions with very little intensity difference. Therefore, deep learning can be utilized for the classification of liver lesions. The present work introduces a CNN-based module for the classification of liver lesions. The module consists of four stages: data …