Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

A Comparative Study Of Yolo Models And A Transformer-Based Yolov5 Model For Mass Detection In Mammograms, Damla Coşkun, Dervi̇ş Karaboğa, Alper Baştürk, Bahri̇ye Akay, Özkan Ufuk Nalbantoğlu, Serap Doğan, İshak Paçal, Meryem Altin Karagöz Nov 2023

A Comparative Study Of Yolo Models And A Transformer-Based Yolov5 Model For Mass Detection In Mammograms, Damla Coşkun, Dervi̇ş Karaboğa, Alper Baştürk, Bahri̇ye Akay, Özkan Ufuk Nalbantoğlu, Serap Doğan, İshak Paçal, Meryem Altin Karagöz

Turkish Journal of Electrical Engineering and Computer Sciences

Breast cancer is a prevalent form of cancer across the globe, and if it is not diagnosed at an early stage it can be life-threatening. In order to aid in its diagnosis, detection, and classification, computer-aided detection (CAD) systems are employed. You Only Look Once (YOLO)-based CAD algorithms have become very popular owing to their highly accurate results for object detection tasks in recent years. Therefore, the most popular YOLO models are implemented to compare the performance in mass detection with various experiments on the INbreast dataset. In addition, a YOLO model with an integrated Swin Transformer in its backbone …


Infrared Imaging Segmentation Employing An Explainable Deep Neural Network, Xinfei Liao, Dan Wang, Zairan Li, Nilanjan Dey, Rs Simon, Fuqian Shi Oct 2023

Infrared Imaging Segmentation Employing An Explainable Deep Neural Network, Xinfei Liao, Dan Wang, Zairan Li, Nilanjan Dey, Rs Simon, Fuqian Shi

Turkish Journal of Electrical Engineering and Computer Sciences

Explainable AI (XAI) improved by a deep neural network (DNN) of a residual neural network (ResNet) and long short-term memory networks (LSTMs), termed XAIRL, is proposed for segmenting foot infrared imaging datasets. First, an infrared sensor imaging dataset is acquired by a foot infrared sensor imaging device and preprocessed. The infrared sensor image features are then defined and extracted with XAIRL being applied to segment the dataset. This paper compares and discusses our results with XAIRL. Evaluation indices are applied to perform various measurements for foot infrared image segmentation including accuracy, precision, recall, F1 score, intersection over union (IoU), Dice …


Cognitive Digital Modelling For Hyperspectral Image Classification Using Transfer Learning Model, Mohammad Shabaz, Mukesh Soni Oct 2023

Cognitive Digital Modelling For Hyperspectral Image Classification Using Transfer Learning Model, Mohammad Shabaz, Mukesh Soni

Turkish Journal of Electrical Engineering and Computer Sciences

Deep convolutional neural networks can fully use the intrinsic relationship between features and improve the separability of hyperspectral images, which has received extensive in recent years. However, the need for a large number of labelled samples to train deep network models limits the application of such methods. The idea of transfer learning is introduced into remote sensing image classification to reduce the need for the number of labelled samples. In particular, the situation in which each class in the target picture only has one labelled sample is investigated. In the target domain, the number of training samples is enlarged by …


Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang Sep 2023

Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang

Journal of System Simulation

Abstract: To address the problem of the loss of local style details in cross-domain image simulation, a ChinOperaGAN network framework suitable for opera makeup is designed from the perspective of protecting the excellent traditional culture. In order to solve the style translation of differences in two image domains, multiple overlapping local adversarial discriminators are proposed in the generative adversarial network. Since paired opera makeup data are difficult to obtain, a synthetic image is generated by combining the source image makeup mapping to effectively guide the transfer of local makeup details between images. In view of the characteristics of opera makeup …


Lightweight Deep Neural Network Models For Electromyography Signal Recognition For Prosthetic Control, Ahmet Mert Jul 2023

Lightweight Deep Neural Network Models For Electromyography Signal Recognition For Prosthetic Control, Ahmet Mert

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, lightweight deep learning methods are proposed to recognize multichannel electromyography (EMG) signals against varying contraction levels. The classical machine learning, and signal processing methods namely, linear discriminant analysis (LDA), quadratic discriminant analysis (QDA), root mean square (RMS), and waveform length (WL) are adopted to convolutional neural network (CNN), and long short-term memory neural network (LSTM). Eight-channel recordings of nine amputees from a publicly available dataset are used for training and testing the proposed models considering prosthetic control strategies. Six class hand movements with three contraction levels are applied to WL and RMS-based feature extraction. After that, they …


Improving Unet Segmentation Performance Using An Ensemble Model In Images Containing Railway Lines, Mehmet Sevi̇, İlhan Aydin Jul 2023

Improving Unet Segmentation Performance Using An Ensemble Model In Images Containing Railway Lines, Mehmet Sevi̇, İlhan Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

This study aims to make sense of the autonomous system and the railway environment for railway vehicles. For this purpose, by determining the railway line, information about the general condition of the line can be obtained along the way. In addition, objects such as pedestrian crossings, people, cars, and traffic signs on the line will be extracted. The rails and the rail environment in the images will be segmented with a semantic segmentation network. In order to ensure the safety of rail transport, computer vision, and deep learning-based methods are increasingly used to inspect railway tracks and surrounding objects. In …


An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇ May 2023

An Efficient Deep Learning Architecture For Turkish Lira Recognition And Counterfeit Detection, Burak İyi̇kesi̇ci̇, Ergun Erçelebi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Banknote counterfeiting is a common practice worldwide. Due to the recent developments in technology, banknote imitation has become easier than before. There are different kinds of algorithms developed for the detection of counterfeit banknotes for different countries in the literature. The earlier algorithms utilized classical image processing techniques where the implementations of machine learning and deep learning algorithms appeared with the developments in the artificial intelligence field as well as the computer hardware. In this study, a novel convolutional neural networks-based deep learning algorithm has been developed that detects counterfeit Turkish Lira banknotes and their denominations using the banknote images …


Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni May 2023

Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni

UNLV Theses, Dissertations, Professional Papers, and Capstones

Due to the rapid development of computing and sensing technologies, Internet of Things (IoT)-based cardiac monitoring plays a crucial role in providing patients with cost-efficient solutions for long-term, continuous, and pervasive electrocardiogram (ECG) monitoring outside a hospital setting. In a typical IoT-based ECG monitoring system, ECG signals are picked up by sensors located on the edge, and then uploaded to the remote cloud servers. ECG interpretation is performed for the collected ECGs in the cloud servers and the analysis results can be made instantly available to the patients as well as their healthcare providers.In this dissertation, we first examine the …


Task Offloading And Resource Allocation Based On Dl-Ga In Mobile Edge Computing, Hang Gu, Minjuan Zhang, Wenzao Li, Yuwen Pan May 2023

Task Offloading And Resource Allocation Based On Dl-Ga In Mobile Edge Computing, Hang Gu, Minjuan Zhang, Wenzao Li, Yuwen Pan

Turkish Journal of Electrical Engineering and Computer Sciences

With the rapid development of 5G and the Internet of Things (IoT), the traditional cloud computing architecture struggle to support the booming computation-intensive and latency-sensitive applications. Mobile edge computing (MEC) has emerged as a solution which enables abundant IoT tasks to be offloaded to edge services. However, task offloading and resource allocation remain challenges in MEC framework. In this paper, we add the total number of offloaded tasks to the optimization objective and apply algorithm called Deep Learning Trained by Genetic Algorithm (DL-GA) to maximize the value function, which is defined as a weighted sum of energy consumption, latency, and …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


3d Point Cloud Classification With Acgan-3d And Vacwgan-Gp, Onur Ergün, Yusuf Sahi̇lli̇oğlu Mar 2023

3d Point Cloud Classification With Acgan-3d And Vacwgan-Gp, Onur Ergün, Yusuf Sahi̇lli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Machine learning and deep learning techniques are widely used to make sense of 3D point cloud data which became ubiquitous and important due to the recent advances in 3D scanning technologies and other sensors. In this work, we propose two networks to predict the class of the input 3D point cloud: 3D Auxiliary Classifier Generative Adversarial Network (ACGAN-3D) and Versatile Auxiliary Conditional Wasserstein Generative Adversarial Network with Gradient Penalty (VACWGAN-GP). Unlike other classifiers, we are able to enlarge the limited data set with the data produced by generative models. We consequently aim to increase the success of the model by …


Modulation Recognition Method Of Mixed Signal Based On Intelligent Analysis Of Cyclic Spectrum Section, Yu Du, Xinquan Yang, Jianhua Zhang, Suchun Yuan, Huachao Xiao, Jingjing Yuan Jan 2023

Modulation Recognition Method Of Mixed Signal Based On Intelligent Analysis Of Cyclic Spectrum Section, Yu Du, Xinquan Yang, Jianhua Zhang, Suchun Yuan, Huachao Xiao, Jingjing Yuan

Journal of System Simulation

Abstract: Aiming at the problems of low intelligence and poor adaptability for the existing mixed signal recognition methods, an intelligent recognition method based on cyclic spectral cross section and deep learning is proposed. For common mixed communication signals, the characteristics of zero frequency cross section of cyclic spectrum are theoretically deduced and analyzed. Two new pre-processing methods, nonlinear segmental mapping and directional pseudo-clustering are proposed, which can effectively improve the adaptability and consistency of cross section features. The pre-processed feature graph is combined with the residual network (ResNet), and the deep learning network is used to mine and analyze the …


Research On Intelligent Prediction Method Of Wargaming Air Mission, Dayong Zhang, Jingyu Yang, Xi Wu Jan 2023

Research On Intelligent Prediction Method Of Wargaming Air Mission, Dayong Zhang, Jingyu Yang, Xi Wu

Journal of System Simulation

Abstract: The efficient, accurate and automatic judgment of the combat mission or intention of the enemy's air targets in the battlefield is the basis of situation awareness and the key to the allocation of auxiliary combat resources. Combined with the calculation characteristics of feed forward deep neural network and long-term and short-term memory network model, two targeted basic index learners are designed, and then the weighted combination is carried out according to the cross entropy of the basic index, which can be used to further train the evaluation index of the learner. It can not only effectively prevent the model …


An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis Jan 2023

An Empirical Study Of Pre-Trained Model Reuse In The Hugging Face Deep Learning Model Registry, Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

Department of Electrical and Computer Engineering Faculty Publications

Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks. Prior works have studied reuse practices for traditional software packages to guide software engineers towards better package maintenance and dependency management. We lack a similar foundation of knowledge to guide behaviors in pre-trained model ecosystems.

In this work, we present the first empirical investigation of PTM reuse. …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams Jan 2023

Comparative Adjudication Of Noisy And Subjective Data Annotation Disagreements For Deep Learning, Scott David Williams

Browse all Theses and Dissertations

Obtaining accurate inferences from deep neural networks is difficult when models are trained on instances with conflicting labels. Algorithmic recognition of online hate speech illustrates this. No human annotator is perfectly reliable, so multiple annotators evaluate and label online posts in a corpus. Labeling scheme limitations, differences in annotators' beliefs, and limits to annotators' honesty and carefulness cause some labels to disagree. Consequently, decisive and accurate inferences become less likely. Some practical applications such as social research can tolerate some indecisiveness. However, an online platform using an indecisive classifier for automated content moderation could create more problems than it solves. …


Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh Jan 2023

Encryption And Compression Classification Of Internet Of Things Traffic, Mariam Najdat M Saleh

Browse all Theses and Dissertations

The Internet of Things (IoT) is used in many fields that generate sensitive data, such as healthcare and surveillance. Increased reliance on IoT raised serious information security concerns. This dissertation presents three systems for analyzing and classifying IoT traffic using Deep Learning (DL) models, and a large dataset is built for systems training and evaluation. The first system studies the effect of combining raw data and engineered features to optimize the classification of encrypted and compressed IoT traffic using Engineered Features Classification (EFC), Raw Data Classification (RDC), and combined Raw Data and Engineered Features Classification (RDEFC) approaches. Our results demonstrate …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu Jan 2023

Deep Learning-Based Classification Of Chaotic Systems Over Phase Portraits, Sezgi̇n Kaçar, Süleyman Uzun, Burak Aricioğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This study performed a deep learning-based classification of chaotic systems over their phase portraits. To the best of the authors' knowledge, such classification studies over phase portraits have not been conducted in the literature. To that end, a dataset consisting of the phase portraits of the most known two chaotic systems, namely Lorenz and Chen, is generated for different values of the parameters, initial conditions, step size, and time length. Then, a classification with high accuracy is carried out employing transfer learning methods. The transfer learning methods used in the study are SqueezeNet, VGG-19, AlexNet, ResNet50, ResNet101, DenseNet201, ShuffleNet, and …