Search results

1 – 5 of 5
Article
Publication date: 14 December 2021

Deepak S. Uplaonkar, Virupakshappa and Nagabhushan Patil

The purpose of this study is to develop a hybrid algorithm for segmenting tumor from ultrasound images of the liver.

Abstract

Purpose

The purpose of this study is to develop a hybrid algorithm for segmenting tumor from ultrasound images of the liver.

Design/methodology/approach

After collecting the ultrasound images, contrast-limited adaptive histogram equalization approach (CLAHE) is applied as preprocessing, in order to enhance the visual quality of the images that helps in better segmentation. Then, adaptively regularized kernel-based fuzzy C means (ARKFCM) is used to segment tumor from the enhanced image along with local ternary pattern combined with selective level set approaches.

Findings

The proposed segmentation algorithm precisely segments the tumor portions from the enhanced images with lower computation cost. The proposed segmentation algorithm is compared with the existing algorithms and ground truth values in terms of Jaccard coefficient, dice coefficient, precision, Matthews correlation coefficient, f-score and accuracy. The experimental analysis shows that the proposed algorithm achieved 99.18% of accuracy and 92.17% of f-score value, which is better than the existing algorithms.

Practical implications

From the experimental analysis, the proposed ARKFCM with enhanced level set algorithm obtained better performance in ultrasound liver tumor segmentation related to graph-based algorithm. However, the proposed algorithm showed 3.11% improvement in dice coefficient compared to graph-based algorithm.

Originality/value

The image preprocessing is carried out using CLAHE algorithm. The preprocessed image is segmented by employing selective level set model and Local Ternary Pattern in ARKFCM algorithm. In this research, the proposed algorithm has advantages such as independence of clustering parameters, robustness in preserving the image details and optimal in finding the threshold value that effectively reduces the computational cost.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 15 no. 3
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 15 October 2021

Rangayya, Virupakshappa and Nagabhushan Patil

One of the challenging issues in computer vision and pattern recognition is face image recognition. Several studies based on face recognition were introduced in the past decades…

Abstract

Purpose

One of the challenging issues in computer vision and pattern recognition is face image recognition. Several studies based on face recognition were introduced in the past decades, but it has few classification issues in terms of poor performances. Hence, the authors proposed a novel model for face recognition.

Design/methodology/approach

The proposed method consists of four major sections such as data acquisition, segmentation, feature extraction and recognition. Initially, the images are transferred into grayscale images, and they pose issues that are eliminated by resizing the input images. The contrast limited adaptive histogram equalization (CLAHE) utilizes the image preprocessing step, thereby eliminating unwanted noise and improving the image contrast level. Second, the active contour and level set-based segmentation (ALS) with neural network (NN) or ALS with NN algorithm is used for facial image segmentation. Next, the four major kinds of feature descriptors are dominant color structure descriptors, scale-invariant feature transform descriptors, improved center-symmetric local binary patterns (ICSLBP) and histograms of gradients (HOG) are based on clour and texture features. Finally, the support vector machine (SVM) with modified random forest (MRF) model for facial image recognition.

Findings

Experimentally, the proposed method performance is evaluated using different kinds of evaluation criterions such as accuracy, similarity index, dice similarity coefficient, precision, recall and F-score results. However, the proposed method offers superior recognition performances than other state-of-art methods. Further face recognition was analyzed with the metrics such as accuracy, precision, recall and F-score and attained 99.2, 96, 98 and 96%, respectively.

Originality/value

The good facial recognition method is proposed in this research work to overcome threat to privacy, violation of rights and provide better security of data.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 15 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 13 October 2021

Sharanabasappa and Suvarna Nandyal

In order to prevent accidents during driving, driver drowsiness detection systems have become a hot topic for researchers. There are various types of features that can be used to…

Abstract

Purpose

In order to prevent accidents during driving, driver drowsiness detection systems have become a hot topic for researchers. There are various types of features that can be used to detect drowsiness. Detection can be done by utilizing behavioral data, physiological measurements and vehicle-based data. The existing deep convolutional neural network (CNN) models-based ensemble approach analyzed the behavioral data comprises eye or face or head movement captured by using a camera images or videos. However, the developed model suffered from the limitation of high computational cost because of the application of approximately 140 million parameters.

Design/methodology/approach

The proposed model uses significant feature parameters from the feature extraction process such as ReliefF, Infinite, Correlation, Term Variance are used for feature selection. The features that are selected are undergone for classification using ensemble classifier.

Findings

The output of these models is classified into non-drowsiness or drowsiness categories.

Research limitations/implications

In this research work higher end camera are required to collect videos as it is cost-effective. Therefore, researches are encouraged to use the existing datasets.

Practical implications

This paper overcomes the earlier approach. The developed model used complex deep learning models on small dataset which would also extract additional features, thereby provided a more satisfying result.

Originality/value

Drowsiness can be detected at the earliest using ensemble model which restricts the number of accidents.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 15 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 31 December 2021

Jyothi N. and Rekha Patil

This study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.

Abstract

Purpose

This study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.

Design/methodology/approach

The authors built a deep learning-based optimized trust mechanism that removes malicious content generated by selfish VANET nodes. This deep learning-based optimized trust framework is the combination of the Deep Belief Network-based Red Fox Optimization algorithm. A novel deep learning-based optimized model is developed to identify the type of vehicle in the non-line of sight (nLoS) condition. This authentication scheme satisfies both the security and privacy goals of the VANET environment. The message authenticity and integrity are verified using the vehicle location to determine the trust level. The location is verified via distance and time. It identifies whether the sender is in its actual location based on the time and distance.

Findings

A deep learning-based optimized Trust model is used to detect the obstacles that are present in both the line of sight and nLoS conditions to reduce the accident rate. While compared to the previous methods, the experimental results outperform better prediction results in terms of accuracy, precision, recall, computational cost and communication overhead.

Practical implications

The experiments are conducted using the Network Simulator Version 2 simulator and evaluated using different performance metrics including computational cost, accuracy, precision, recall and communication overhead with simple attack and opinion tampering attack. However, the proposed method provided better prediction results in terms of computational cost, accuracy, precision, recall, and communication overhead than other existing methods, such as K-nearest neighbor and Artificial Neural Network. Hence, the proposed method highly against the simple attack and opinion tampering attacks.

Originality/value

This paper proposed a deep learning-based optimized Trust framework for trust prediction in VANET. A deep learning-based optimized Trust model is used to evaluate both event message senders and event message integrity and accuracy.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 9 April 2024

Shola Usharani, R. Gayathri, Uday Surya Deveswar Reddy Kovvuri, Maddukuri Nivas, Abdul Quadir Md, Kong Fah Tee and Arun Kumar Sivaraman

Automation of detecting cracked surfaces on buildings or in any industrially manufactured products is emerging nowadays. Detection of the cracked surface is a challenging task for…

Abstract

Purpose

Automation of detecting cracked surfaces on buildings or in any industrially manufactured products is emerging nowadays. Detection of the cracked surface is a challenging task for inspectors. Image-based automatic inspection of cracks can be very effective when compared to human eye inspection. With the advancement in deep learning techniques, by utilizing these methods the authors can create automation of work in a particular sector of various industries.

Design/methodology/approach

In this study, an upgraded convolutional neural network-based crack detection method has been proposed. The dataset consists of 3,886 images which include cracked and non-cracked images. Further, these data have been split into training and validation data. To inspect the cracks more accurately, data augmentation was performed on the dataset, and regularization techniques have been utilized to reduce the overfitting problems. In this work, VGG19, Xception and Inception V3, along with Resnet50 V2 CNN architectures to train the data.

Findings

A comparison between the trained models has been performed and from the obtained results, Xception performs better than other algorithms with 99.54% test accuracy. The results show detecting cracked regions and firm non-cracked regions is very efficient by the Xception algorithm.

Originality/value

The proposed method can be way better back to an automatic inspection of cracks in buildings with different design patterns such as decorated historical monuments.

Details

International Journal of Structural Integrity, vol. 15 no. 3
Type: Research Article
ISSN: 1757-9864

Keywords

1 – 5 of 5