Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif Jun 2024

Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif

Journal of Soft Computing and Computer Applications

The coronavirus disease 2019 outbreak caused widespread disruption. The World Health Organization has recommended wearing face masks, along with other public health measures, such as social distancing, following medical guidelines, and thermal scanning, to reduce transmission, reduce the burden on healthcare systems, and protect population groups. However, wearing a mask, which acts as a barrier or shield to reduce transmission of infection from infected individuals, hides most facial features, such as the nose, mouth, and chin, on which face detection systems depend, which leads to the weakness of these systems. This paper aims to provide essential insights for researchers and …


Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali Jun 2024

Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali

Journal of Soft Computing and Computer Applications

Video anomaly detection is one of the trickiest issues in intelligent video surveillance because of the complexity of real data and the hazy definition of anomalies. Since abnormal occurrences typically seem different from normal events and move differently. The global optical flow was determined with the maximum accuracy and speed using the Farneback approach for calculating the magnitudes. Two approaches have been used in this study to detect strangeness in the video. These approaches are Deep Learning (DL) and manuality. The first method uses the activity map's development of entropy to detect the oddity in the video using a particular …


A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy Jun 2024

A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy

Journal of Soft Computing and Computer Applications

The primary elements of Intelligent Transportation Systems (ITSs) have become Vehicular Ad-hoc NETworks (VANETs), allowing communication between the infrastructure environment and vehicles. The large amount of data gathered by connected vehicles has simplified how Deep Learning (DL) techniques are applied in VANETs. DL is a subfield of artificial intelligence that provides improved learning algorithms able to analyzing and process complex and heterogeneous data. This study explains the power of DL in VANETs, considering applications like decision-making, vehicle localization, anomaly detection, traffic prediction and intelligent routing, various types of DL, including Recurrent Neural Networks (RNNs), and Convolutional Neural Networks (CNNs) are …


Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng May 2024

Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng

Turkish Journal of Electrical Engineering and Computer Sciences

Deep learning (DL) models have performed tremendously well in image classification. This good performance can be attributed to the availability of massive data in most domains. However, some domains are known to have few datasets, especially the health sector. This makes it difficult to develop domain-specific high-performing DL algorithms for these fields. The field of health is critical and requires accurate detection of diseases. In the United States Gastrointestinal diseases are prevalent and affect 60 to 70 million people. Ulcerative colitis, polyps, and esophagitis are some gastrointestinal diseases. Colorectal polyps is the third most diagnosed malignancy in the world. This …


Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r May 2024

Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

Breast cancer is the most prevalent and crucial cancer type that should be diagnosed early to reduce mortality. Therefore, mammography is essential for early diagnosis owing to high-resolution imaging and appropriate visualization. However, the major problem of mammography screening is the high false positive recall rate for breast cancer diagnosis. High false positive recall rates psychologically affect patients, leading to anxiety, depression, and stress. Moreover, false positive recalls increase costs and create an unnecessary expert workload. Thus, this study proposes a deep learning based breast cancer diagnosis model to reduce false positive and false negative rates. The proposed model has …


Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek May 2024

Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek

Turkish Journal of Electrical Engineering and Computer Sciences

This survey focuses on Text-to-SQL, automated translation of natural language queries into SQL queries. Initially, we describe the problem and its main challenges. Then, by following the PRISMA systematic review methodology, we survey the existing Text-to-SQL review papers in the literature. We apply the same method to extract proposed Text-to-SQL models and classify them with respect to used evaluation metrics and benchmarks. We highlight the accuracies achieved by various models on Text-to-SQL datasets and discuss execution-guided evaluation strategies. We present insights into model training times and implementations of different models. We also explore the availability of Text-to-SQL datasets in non-English …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei Apr 2024

Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei

Journal of System Simulation

Abstract: In order to improve the processing ability of the depth-neural network dehazing algorithm to the supplementary data set, and to make the network differently process the image features of different importance to improve the dehazing ability of the network, an incremental dehazing algorithm based on multiple migration of attention is proposed. The teacher's attention generation network in the form of Encoder-Decoder extracts the multiple attention of labels and haze, which is used it as the label of the characteristic migration media network to constrain the network training to form the migration media attention as close as possible to the …


Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu Feb 2024

Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Recent advances in deep learning, increased availability of large-scale datasets, and improvement of accelerated graphics processing units facilitated creation of an unprecedented amount of synthetically generated media content with impressive visual quality. Although such technology is used predominantly for entertainment, there is widespread practice of using deepfake technology for malevolent ends. This potential for malicious use necessitates the creation of detection methods capable of reliably distinguishing manipulated video content. In this work we aim to create a learning-based detection method for synthetically generated videos. To this end, we attempt to detect spatiotemporal inconsistencies by leveraging a learning-based magnification-inspired feature manipulation …


Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu Feb 2024

Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The utilization of remote sensing products for vehicle detection through deep learning has gained immense popularity, especially due to the advancement of unmanned aerial vehicles (UAVs). UAVs offer millimeter-level spatial resolution at low flight altitudes, which surpasses traditional airborne platforms. Detecting vehicles from very high-resolution UAV data is crucial in numerous applications, including parking lot and highway management, traffic monitoring, search and rescue missions, and military operations. Obtaining UAV data at desired periods allows the detection and tracking of target objects even several times during a day. Despite challenges such as diverse vehicle characteristics, traffic congestion, and hardware limitations, the …


Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li Jan 2024

Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li

Journal of System Simulation

Abstract: Aiming at the lack of directionality of traditional dot product attention, this paper proposes a directed attention model (DAM) based on cosine similarity. To effectively represent the direction relationship between the spatial and temporal features of video frames, the paper defines the relationship function in the attention mechanism using the cosine similarity theory, which can remove the absolute value of the relationship between features. To reduce the computational burden of the attention mechanism, the operation is decomposed from two dimensions of time and space. The computational complexity is further optimized by combining linear attention operation. The experiment is divided …