• Tidak ada hasil yang ditemukan

OER000001410-1.pdf

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "OER000001410-1.pdf"

Copied!
228
0
0

Teks penuh

Bessam Abdulrazak AmI Lab, Università di Sherbrooke, Canada Hamdi Aloulou Università di Monastir, Centro per la ricerca digitale,. Franco Mercalli MultiMed Engineers SRLS, Italia Fulvio Mastrogiovanni Università di Genova, Italia Hisato Kobayashi Hosei University, Giappone.

Alzheimer’s Disease Early Detection Using a Low Cost Three-Dimensional

Densenet-121 Architecture

1 Introduction

This work consists in measuring the accuracy of the detection of Alzheimer's disease in a three-dimensional CNN architecture, specifically a densenet-121, trained using ADNI MRI images. Before presenting the results of the development of a low-cost sealing net for the detection of Alzheimer's disease, we first provide in Sect.2 some background definitions to support our work.

2 Background

Clinical Disease Stages

We can design DNNs to integrate them into computer-aided diagnosis protocols for the detection of many priority diseases. The early detection of AD with software will allow us to strengthen and improve medical protocols by providing what we call Computer Aided Diagnosis (CAD).

Medical Imaging

Positrons react with electrons in the body and when these two particles combine, they cancel each other out. Detectors in a PET scanner measure these photons and use this information to create images of internal organs [16].

3 Previous Work

This annihilation produces a small amount of energy in the form of two photons that shoot off in opposite directions. Finally, we want our process to be repeatable, and we report it complete with all the parameters used, as explained in the next sections.

4 Methodology

Data Acquisition

In fact, we did not find any article with multiclass classification with more than four classes. Finally, the quantitative analysis of the collected items does not make a great contribution due to these shortcomings.

Data Preprocessing

Our Development

With this implementation, we configure the neural network training process with the following parameters. Channels We send parameter 1 to the neural network constructor because the images are monochrome.

5 Results and Discussion

For example, it is common to test or validate neural networks during training; thus, it is possible to analyze the loss and accuracy of neural networks in each period. As the area under each curve approaches the value of 1.0, the classifier's diagnostic ability is shown to be greater.

Fig. 2. Metrics of evaluation of the densenet-121 at 80 epochs
Fig. 2. Metrics of evaluation of the densenet-121 at 80 epochs

6 Conclusions and Future Work

Similarly, LMCI's bad count is also acceptable because the class is usually classified as AD. However, as can be noted, the macro average and the weighted average are better.

We propose an adaptive configuration of the vital signs monitoring process depending on the variation in the patient's health status and the decisions of the medical staff. It provides a manual and self-adaptive configuration of the vital signs monitoring process depending on the variation in the patient's health status and the decisions of the medical staff.

Fig. 1. The NEWS2 scores chart.
Fig. 1. The NEWS2 scores chart.

Machine Learning Based Rank Attack Detection for Smart Hospital

Infrastructure

DIO (DODAG Information Object): used to build, maintain DODAG and regularly refresh the information of nodes in the network topology. A rank attack is one of the most well-known RPL attacks, where an attacker advertises a false rank to trick other nodes into establishing routes through him.

2 Related Work

3 Rank Attack Scenario

ML-based Rank Attack Detection for Smart Hospital Infrastructure 33 attacks are considered one of the dangerous attacks in dynamic IoT networks as the attacker controls an existing node (one of the internal attacks that can affect the RPL) in the DODAG or it can identify the network and insert its own malicious node and that node will act as the attack node as shown in Fig.4.

4 Proposed Approach

It mainly performs some extremely complex data transformations to find a solution to separate the data based on defined labels or outputs. The concept of the SVM learning approach is based on the definition of the optimal separating hyperplane (Figure 5) [21], which maximizes the limit of the training data [17,18].

5 IDS Solution and Results

Simulation Setup

In two-dimensional space this hyper-lane is a line that divides a plane into two parts where each class lies on either side.

Evaluation Parameter

LPM Power consumption parameter that indicates the power consumption in sleep mode. CPU flow parameter indicating the level of node processing. Send parameter related to node communication while transmitting Listen parameter related to node communication while receiving.

Power Tracking per Mote for Each Simulation

6 Conclusion

Winter, T., Thubert, P., Brandt, A., et al.: RPL: ​​IPv6 routing protocol for low-power, lossy networks. Rehman, A., et al.: Rank attack using objective function in RPL for low power and lossy networks.

Remote Health Monitoring Systems Based on Bluetooth Low Energy (BLE)

Communication Systems

General Context

Therefore, various communication technologies were suggested for data exchange between body sensor nodes and the coordinator (first level). IEEE is the standard dedicated to the communication between the sensors and the coordinator.

Contributions and Paper Organisation

Today, sensing devices with 802.15.6 modules are not sufficiently available for commercial use in the market and are more expensive than Bluetooth Low Energy (BLE) wearable sensors, which are widely commercialized by many sensor manufacturers such as libelium, mindwave. For this reason, our research in this paper focuses on RHMS using sensors with BLE interfaces.

2 BLE Based RHMS

RHMS Basic Architecture

Related Works About RHMS Using BLE

According to the authors, a peer-reviewed evaluation of the developed monitoring system for 40 individuals (aged 18 to 66 years) showed that the proposed system is convenient and reliable and generates warning messages to the physician and patient in critical circumstances. The data from each sensor is transmitted to the storage server via the BLE communication interface.

Table 1. Recapitulative table related to monosensing RHMS based BLE.
Table 1. Recapitulative table related to monosensing RHMS based BLE.

3 BLE Communication Protocols

Basic Concepts

The master coordinates the MAC using a TDMA scheme, determines when slaves should listen, and provides them with the map of data channels to use.

BLE Protocols Stack

4 Reading Sensed Physiological Signs with BLE

Example of Services and Characteristics of HDP

Steps for Reading Sensed Data on Mobile App

5 Conclusion

Alfian, G., Syafrudin, M., Ijaz, M.F., Syaekhoni, M.A., Fitriyani, N.L., Rhee, J.: A customized healthcare monitoring system for diabetic patients using BLE-based sensors and data processing in real time. Kakria, P., Tripathi, N.K., Kitipawang, P.: A real-time human health monitoring system for remote cardiac patients using smartphones and wearable sensors.

Modeling and Specification

Most of these patterns are presented visually and informally, with no formal semantics involved. We propose a graphical modeling of these patterns to describe both their structural and behavioral features.

2 Structural Patterns Modeling

Metamodel

Registration design patterns” allow to register the attributes and the characteristics of a new device on the back-end server. Registration Design Patterns' are composed of 'Automatic Client Driven Registration Pattern' and 'Server Driven Model Pattern'.

General Pattern Model

Bootstrap's Medium-Based Model” allows you to configure a new device in-place via a removable storage medium inserted into the device. If the device is deployed locally, we use the Medium-Based Bootstrap Template as a solution to configure the new device.

Fig. 1. Metamodel of IoT design patterns
Fig. 1. Metamodel of IoT design patterns

3 Behavioral Patterns Modeling

4 Case Study: Smart Home

5 Patterns Specification

The ExtendedComponent diagram, which models the structural features of the design patterns, is transformed into a context in the Event-B method, in which we specify the architecture entities and their relationships. The sequence diagram is transformed into a machine in event B, in which we specify the events between the pattern entities.

6 Tool Support

This transformation is proposed to assign formal notations to IoT design patterns for the purpose of verifying their design correctness in the second step. This strategy is interesting because it defines the pattern development process and improves the quality of the obtained models and thus the success of the formal development process.

7 Related Work

For pattern specification, we used the Event-B formal method to assign formal notations to SOA design patterns in order to verify their design correctness. In this paper, we present the modeling of IoT design patterns proposed by Reinfurt et al.

Fig. 7. The tool editor
Fig. 7. The tool editor

8 Conclusions

Tounsi, I., Hadj Kacem, M., Hadj Kacem, A., Drira, K.: A Refinement-Based Approach for Building Valid SOA Design Patterns. Tounsi, I., Hrichi, Z., Hadj Kacem, M., Hadj Kacem, A., Drira, K.: Using SoaML Models and Event-B Specifications for Modeling SOA Design Patterns.

EEG-Based Hypo-vigilance Detection Using Convolutional Neural Network

In this paper, we focus on the EEG signal study recorded by fourteen electrodes for hypo-vigilance detection by analyzing the different functionalities in the brain from the electrodes placed on the participant's scalp. In this paper, we propose a CNN hypo-vigilance detection method using EEG data to classify drowsiness and wakefulness states.

2 Proposed Approach

Data Acquisition

The state of relaxation was characterized by alpha waves having a frequency interval between 8 to 12 Hz and an amplitude interval between 20 to 60 µV. The state of drowsiness was shown by theta waves, which have a frequency interval between 4 and 8 Hz and an amplitude interval between 50 and 75 µV.

Fig. 3. The monitoring of O1 and O2 electrodes in the mornings (a), afternoons (b) and evenings (c).
Fig. 3. The monitoring of O1 and O2 electrodes in the mornings (a), afternoons (b) and evenings (c).

Data Analysis: Simple CNN Classification

To reduce the overlap and increase the testing accuracy, we use the data augmentation technique [17] which consists in increasing the training set by data transformations that preserve the labels.

3 Experimental Evaluation

For our data distribution, we choose 70% for the train part and 30% for the test. After convergence, the optimal number of test epochs for all results of different electrodes set a value equal to 80.

Table 2. Training and testing results of the different numbers of electrodes with data augmentation.
Table 2. Training and testing results of the different numbers of electrodes with data augmentation.

4 Conclusion

The images or other third-party material in this chapter are included in the chapter's Creative Commons license, unless otherwise noted in a credit line for the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by law or exceeds the permitted use, you must obtain permission directly from the copyright holder.

Respiratory Activity Classification Based on Ballistocardiogram Analysis

As a consequence, it is recommended to have continuous monitoring of the vital signs to ensure an optimal diagnosis of a patient's condition [6]. Due to the ejection of the blood during systole, the body's mechanical reaction and thus the BCG signal are measured.

2 Material and Method

  • Data Collection
  • BCG Signal Analysis
  • BCG Signal Feature Extraction
  • Activities Classification
  • Classification Evaluation

Both signals reach the upper limit of the acquisition equipment, which is explained by the broad peaks in the BCG signals. BCG Feature Engineering: The SFM and SC measurements are evaluated on each frame of the BCG signal.

Fig. 1. Illustration of the BCG signal during the experimental protocol activities.
Fig. 1. Illustration of the BCG signal during the experimental protocol activities.

3 Experimental Results

Feature Illustration

The terms of the confusion matrix presented in Figure 4 are defined as follows: where C is the number of classes, Me is the number of predictions of class i that actually belong to class j, this is usually measured by comparing the test results with the ground truth. Both coughing and movement activities (right plots) show large fluctuations in their respective sfm signals, this is due to the absence of periodicity in these signals.

Table 1. Mean value of SF M and SC during each activity.
Table 1. Mean value of SF M and SC during each activity.

Classifier Evaluation

We used a reconstructed time series signal from the spectral flatness measure (SFM) and the spectral centroid (SC) of the raw data. In: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2015, New York, NY, USA, pp.

Fig. 5. P P V Confusion matrix
Fig. 5. P P V Confusion matrix

A Convolutional Neural Network for Lentigo Diagnosis

Lentigo Detection

Most forms of lentigo are benign [13], such as lentigo simplex as Figure 1(a) and solar lentigo as Figure 1(b). For all these reasons, our approach is based on images obtained by this method.

Convolutional Neural Networks

3 Proposed Method for Lentigo Detection

  • Data Preparation
  • InceptionV3 Model
  • Transfer Learning
  • Prediction Model

In the first step of the preprocessing procedure, the RCM images from the training set are adjusted to match the InceptionV3 network. As shown in Fig.3, transfer learning [22] is proposed to ensure better performance of the model.

Fig. 4. Architecture of the InceptionV3 model.
Fig. 4. Architecture of the InceptionV3 model.

4 Experimental Validation

The performance of the proposed method is shown by the set of tests according to the ability to correctly diagnose the provided skin tissues. These results present a high classification accuracy, which proves the robustness of the used artificial neural network architecture.

Table 1. Data augmentation parameters.
Table 1. Data augmentation parameters.

Unsupervised Method Based on Superpixel Segmentation for Corpus

However, in many sagittal brain MRI slices, the fornix appears in the vicinity of the CC with a similar intensity (Fig.1) [2]. This study demonstrated that the total volume of the CC and its sub-regions is correlated with autism severity [8].

Fig. 1. Example of sagittal brain MRI slices from the OASIS dataset: (a) The input MRI
Fig. 1. Example of sagittal brain MRI slices from the OASIS dataset: (a) The input MRI

3 Proposed Method

CC Segmentation of the Midsagittal Slice

CC Parcellation

It is an adjustment of K-tools for generating superpixels to be faster than existing methods, more memory efficient while significantly improving segmentation accuracy. Second, a combination of color and spatial proximity is achieved by a weighted distance measure that allows both control over superpixel size and compactness.

Fig. 3. CC segmentation: (a) Input sagittal MRI. (b) Cluster Map. (c) Isolated CC.
Fig. 3. CC segmentation: (a) Input sagittal MRI. (b) Cluster Map. (c) Isolated CC.

4 Experimental Results

Qualitative Evaluation

In fact, according to our collaborating clinician expert, the CC shape and subdivision are well defined and the delineated CC area properly represents the five anatomical subdivisions of the CC, especially the critical ones: the rostrum and splenium. The fornix has been correctly removed from the CC region and the obtained CC parcellation shows an accurate subdivision of CC into five regions within MRI scans of the brain, without penetrating the irrelevant neighboring structures.

Quantitative Evaluation

Extensive experiments and quantitative comparisons with corresponding CC parcellation methods proved the accuracy of the proposed method on two challenging benchmark datasets. Witelson, S.: Hand and gender differences in the isthmus and gender of the human corpus callosum: a postmortem morphological study.

Table 1. Evaluation of the proposed method.
Table 1. Evaluation of the proposed method.

Using Learning Techniques to Observe Elderly’s Behavior Changes over Time

In this article, we focus on the problem of learning smart home sensor data describing the activities of the elderly. Our aim in this work is to propose an approach to identify periods when behavioral changes occur and detect anomalies in this period (e.g. older people sleep less and less every month).

2 Related Works

This daily score variation provides a global vision of the behavior of the elderly person over a period of time. Our goal in this work is not only to detect sudden changes, but also to analyze the possible evolution of the behavior over a long period of time.

3 Our Approach

Activities and Daily Behavior Pattern

Working in [2,3,5–8] consider home sensors to monitor daily activities, but do not analyze all activities of the older person at the same time. The user can perform the same activity at different times (for example, going to the toilet), but some activities only occur at specific times of the day (for example, having breakfast).

Normal Behavior Pattern for the Elderly

The start time and duration of each activity instance can be recorded by the user, or better detected by an activity recognition system based on sensors in the home. Using the same training data to model regularities in the three activities studied, we calculate the frequency, per n hour, of the "going to the toilet" activity.

Elderly’s Behavior Change Detection

It is the percentage of the duration of the activity in the observed day compared to the duration of the same activity in the usual behavior pattern. The duration estimate (80.95% in our case) is the percentage of the duration of the "eating lunch" activity in the observed day compared to the duration of the same activity in the usual behavior pattern.

Fig. 1. Illustration of the similarity and duration scores for the activity “eating lunch”
Fig. 1. Illustration of the similarity and duration scores for the activity “eating lunch”

4 Use Case

Dataset

Within home activities, anomalies can be classified as point, collective and contextual anomalies. For the activity “going to the toilet”, which occurs several times a day, we model and compare frequencies between a routine day and the observed day of the behavior change period.

Learning for Building the Normal Behavior Pattern

DBSCAN has two parameters; one is min pt which is the minimum number of points in a cluster and the other is Eps which is the maximum distance between two data points for them to be considered in the same cluster. We then eliminate point anomalies and calculate, for each activity in the training data set representing one month of collected data, the mean start time and mean duration.

Behavior Change Period and Anomalous Activities

The rows of the matrix contain types of outcomes (formation, change or reinforcement) and the columns contain types of change (observance, behavior or attitude). The development of MV is adaptable to the input spatial data in closed spaces and the profile of the inhabitant.

Fig. 3. Normal behavior pattern
Fig. 3. Normal behavior pattern

A Novel On-Wrist Fall Detection System Using Supervised Dictionary Learning

Technique

In the same direction, in this article we propose a new wrist-based fall detection system based on Supervised Dictionary Learning (SDL) to autonomously generate an optimal selection of features that best represent the acquired data. Indeed, the work presented here is an extension of previous research [19] that implemented a motion decomposition method to extract features (directional components and body orientation) and machine learning algorithms for fall detection based on a wearable device on the wrist.

2 Theoretical Background and Related Work

Wearable Fall Detection System

Dictionary Learning for Classification

The latter use label information in learning dictionary atoms, sparse vector coefficients, or both. Assuming that SDL methods and sparse representation differ in the way they use class labels, we will detail three of the most popular SDL algorithms, namely SRC, FDDL, and LRSDL.

Low-Rank Shared Dictionary (LRSDL)

Thus, the learned dictionary D = [D1,D2, .,Dm], where Di is a subdictionary corresponding to the classi, powerfully represents interclass similarity and intraclass variance. To describe FDDL more formally, assume X= [X1,X2, .,Xc], as the training examples are grouped according to the classes they belong to and c is the total number of classes.

3 Proposed Dictionary Learning Method

  • Dataset
  • Data Preprocessing
  • Dictionary Learning for Fall Detection
  • Performance Metrics
  • Experimental Configuration
  • Experimental Result

We will only acknowledge the vertical component of the motion and orientation decomposition, as it reached the best results in the latter work. In the training phase, the goal of the SDL algorithm is to map the low-dimensional training.

Fig. 1. Pipeline overview of the proposed SDL-based fall detection system.
Fig. 1. Pipeline overview of the proposed SDL-based fall detection system.

Gambar

Fig. 3. Metrics of evaluation of the densenet-121 at 110 epochs
Fig. 2. The solution architecture.
Fig. 1. Remote healthcare monitoring system integrating BLE communication inter- inter-faces.
Fig. 3. Required components for android BLE communication.
+7

Referensi

Dokumen terkait

The Butterworth filter is therefore more applicable to real-time applications, pro- ducing a smoothly-moving point as feedback for the location of the user’s gaze see, for example, Best