Applying Deep Learning to Transform Breast Cancer DiagnosisCognizant
Deep convolutional neural networks can assist pathologists in breast cancer diagnosis by automatically filtering benign tissue biopsies, identifying malignant regions and labeling important cellular features like nuclei for further analysis. Automatic detection of diagnostically relevant regions-of-interest and nuclei segmentation reduces the pathologist’s workload, while ensuring that no critical region is overlooked, rendering breast cancer diagnosis more reliable, efficient and cost-effective.
Applying Deep Learning to Transform Breast Cancer DiagnosisCognizant
Deep convolutional neural networks can assist pathologists in breast cancer diagnosis by automatically filtering benign tissue biopsies, identifying malignant regions and labeling important cellular features like nuclei for further analysis. Automatic detection of diagnostically relevant regions-of-interest and nuclei segmentation reduces the pathologist’s workload, while ensuring that no critical region is overlooked, rendering breast cancer diagnosis more reliable, efficient and cost-effective.
Performance analysis of automated brain tumor detection from MR imaging and CT scan using basic image processing techniques based on various hard and soft computing has been performed in our work. Moreover, we applied six traditional classifiers to detect brain tumor in the images. Then we applied CNN for brain tumor detection to include deep learning method in our work. We compared the result of the traditional one having the best accuracy (SVM) with the result of CNN. Furthermore, our work presents a generic method of tumor detection and extraction of its various features.
Talk @ ACM SF Bayarea Chapter on Deep Learning for medical imaging space.
The talk covers use cases, special challenges and solutions for Deep Learning for Medical Image Analysis using Tensorflow+Keras. You will learn about:
- Use cases for Deep Learning in Medical Image Analysis
- Different DNN architectures used for Medical Image Analysis
- Special purpose compute / accelerators for Deep Learning (in the Cloud / On-prem)
- How to parallelize your models for faster training of models and serving for inferenceing.
- Optimization techniques to get the best performance from your cluster (like Kubernetes/ Apache Mesos / Spark)
- How to build an efficient Data Pipeline for Medical Image Analysis using Deep Learning
- Resources to jump start your journey - like public data sets, common models used in Medical Image Analysis
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSINGDharshika Shreeganesh
Image processing is an active research area in which medical image processing is a highly challenging field. Medical imaging
techniques are used to image the inner portions of the human body for medical diagnosis. Brain tumor is a serious life altering
disease condition. Image segmentation plays a significant role in image processing as it helps in the extraction of suspicious regions
from the medical images. In this paper we have proposed segmentation of brain MRI image using K-means clustering algorithm
followed by morphological filtering which avoids the misclustered regions that can inevitably be formed after segmentation of the brain MRI image for detection of tumor location.
A comprehensive study about new and upcoming modalities in imaging and screening of breast lesions with description about every new modalities with their advantages and pitfalls.
details about brain tumor
literature survey on many reference papers related to brain tumor detection using various techniques
our proposed novel methodology for brain tumor detection
Machine Learning - Breast Cancer DiagnosisPramod Sharma
Machine learning is helping in making smart decisions faster. In this presentation measurements carried out on FNAC was analysed. The results were validated using 20 percent of the data. The data used for POC is from UCI Repository/
Brain Tumor Segmentation using Enhanced U-Net Model with Empirical AnalysisMD Abdullah Al Nasim
Cancer of the brain is deadly and requires careful surgical segmentation. The brain tumors were segmented using U-Net using a Convolutional Neural Network (CNN). When looking for overlaps of necrotic, edematous, growing, and healthy tissue, it might be hard to get relevant information from the images. The 2D U-Net network was improved and trained with the BraTS datasets to find these four areas. U-Net can set up many encoder and decoder routes that can be used to get information from images that can be used in different ways. To reduce computational time, we use image segmentation to exclude insignificant background details. Experiments on the BraTS datasets show that our proposed model for segmenting brain tumors from MRI (MRI) works well. In this study, we demonstrate that the BraTS datasets for 2017, 2018, 2019, and 2020 do not significantly differ from the BraTS 2019 dataset's attained dice scores of 0.8717 (necrotic), 0.9506 (edema), and 0.9427 (enhancing).
Pamela J DiPiro, MD, Clinical Director of CT and Breast Imagery at Dana-Farber Cancer Institute, goes over the different ways of imaging after breast cancer.
IMPLEMENTATION OF CRANIOSPINAL IRRADIATION (CSI) WITH POSTERIOR FOSSA BOOST U...Victor Ekpo
Craniospinal Irradiation (CSI) is often implemented for treatment of childhood medulloblastoma. For adults, the use of CSI is more complicated because of the very long field length (>54 cm). This case report shows the implementation of a CSI plan using IMRT with Three-Isocentre Overlap Junction (TIOJ).
Breast Cancer Detection from Mammography Images Using Machine Learning Algorithms (U-Net Segmentation and Dense Net Classifier implementation are in progress)
https://jst.org.in/index.html
Our journal has dynamic landscape of academia and industry, the pursuit of knowledge extends across multiple domains, creating a tapestry where engineering, management, science, and mathematics converge. Welcome to our international journal, where we embark on a journey through the realms of cutting-edge technologies and innovative marketing strategies.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Performance analysis of automated brain tumor detection from MR imaging and CT scan using basic image processing techniques based on various hard and soft computing has been performed in our work. Moreover, we applied six traditional classifiers to detect brain tumor in the images. Then we applied CNN for brain tumor detection to include deep learning method in our work. We compared the result of the traditional one having the best accuracy (SVM) with the result of CNN. Furthermore, our work presents a generic method of tumor detection and extraction of its various features.
Talk @ ACM SF Bayarea Chapter on Deep Learning for medical imaging space.
The talk covers use cases, special challenges and solutions for Deep Learning for Medical Image Analysis using Tensorflow+Keras. You will learn about:
- Use cases for Deep Learning in Medical Image Analysis
- Different DNN architectures used for Medical Image Analysis
- Special purpose compute / accelerators for Deep Learning (in the Cloud / On-prem)
- How to parallelize your models for faster training of models and serving for inferenceing.
- Optimization techniques to get the best performance from your cluster (like Kubernetes/ Apache Mesos / Spark)
- How to build an efficient Data Pipeline for Medical Image Analysis using Deep Learning
- Resources to jump start your journey - like public data sets, common models used in Medical Image Analysis
BRAIN TUMOR MRI IMAGE SEGMENTATION AND DETECTION IN IMAGE PROCESSINGDharshika Shreeganesh
Image processing is an active research area in which medical image processing is a highly challenging field. Medical imaging
techniques are used to image the inner portions of the human body for medical diagnosis. Brain tumor is a serious life altering
disease condition. Image segmentation plays a significant role in image processing as it helps in the extraction of suspicious regions
from the medical images. In this paper we have proposed segmentation of brain MRI image using K-means clustering algorithm
followed by morphological filtering which avoids the misclustered regions that can inevitably be formed after segmentation of the brain MRI image for detection of tumor location.
A comprehensive study about new and upcoming modalities in imaging and screening of breast lesions with description about every new modalities with their advantages and pitfalls.
details about brain tumor
literature survey on many reference papers related to brain tumor detection using various techniques
our proposed novel methodology for brain tumor detection
Machine Learning - Breast Cancer DiagnosisPramod Sharma
Machine learning is helping in making smart decisions faster. In this presentation measurements carried out on FNAC was analysed. The results were validated using 20 percent of the data. The data used for POC is from UCI Repository/
Brain Tumor Segmentation using Enhanced U-Net Model with Empirical AnalysisMD Abdullah Al Nasim
Cancer of the brain is deadly and requires careful surgical segmentation. The brain tumors were segmented using U-Net using a Convolutional Neural Network (CNN). When looking for overlaps of necrotic, edematous, growing, and healthy tissue, it might be hard to get relevant information from the images. The 2D U-Net network was improved and trained with the BraTS datasets to find these four areas. U-Net can set up many encoder and decoder routes that can be used to get information from images that can be used in different ways. To reduce computational time, we use image segmentation to exclude insignificant background details. Experiments on the BraTS datasets show that our proposed model for segmenting brain tumors from MRI (MRI) works well. In this study, we demonstrate that the BraTS datasets for 2017, 2018, 2019, and 2020 do not significantly differ from the BraTS 2019 dataset's attained dice scores of 0.8717 (necrotic), 0.9506 (edema), and 0.9427 (enhancing).
Pamela J DiPiro, MD, Clinical Director of CT and Breast Imagery at Dana-Farber Cancer Institute, goes over the different ways of imaging after breast cancer.
IMPLEMENTATION OF CRANIOSPINAL IRRADIATION (CSI) WITH POSTERIOR FOSSA BOOST U...Victor Ekpo
Craniospinal Irradiation (CSI) is often implemented for treatment of childhood medulloblastoma. For adults, the use of CSI is more complicated because of the very long field length (>54 cm). This case report shows the implementation of a CSI plan using IMRT with Three-Isocentre Overlap Junction (TIOJ).
Breast Cancer Detection from Mammography Images Using Machine Learning Algorithms (U-Net Segmentation and Dense Net Classifier implementation are in progress)
https://jst.org.in/index.html
Our journal has dynamic landscape of academia and industry, the pursuit of knowledge extends across multiple domains, creating a tapestry where engineering, management, science, and mathematics converge. Welcome to our international journal, where we embark on a journey through the realms of cutting-edge technologies and innovative marketing strategies.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Novel and Efficient Lifting Scheme based Super Resolution Reconstruction fo...CSCJournals
Mammography is the most effective method for early detection of breast diseases. However, the typical diagnostic signs, such as masses and microcalcifications, are difficult to be detected because mammograms are low contrast and noisy images. We concentrate on a special case of super resolution reconstruction for early detection of cancer from low resolution mammogram images. Super resolution reconstruction is the process of combining several low resolution images into a single higher resolution image. This paper describes a novel approach for enhancing the resolution of mammographic images. We are proposing an efficient lifting wavelet based denoising with adaptive interpolation for super resolution reconstruction. Under this frame work, the digitized low resolution mammographic images are decomposed into many levels to obtain different frequency bands. We use Daubechies (D4) lifting schemes to decompose low resolution mammogram images into multilevel scale and wavelet coefficients. Then our proposed novel soft thresholding technique is used to remove the noisy coefficients, by fixing optimum threshold value. In order to obtain an image of higher resolution adaptive interpolation is applied. Our proposed lifting wavelet transform based restoration and adaptive interpolation preserves the edges as well as smoothens the image without introducing artifacts. The proposed algorithm avoids the application of iterative method, reduces the complexity of calculation and applies to large dimension low-resolution images. Experimental results show that the proposed approach has succeeded in obtaining a high-resolution mammogram image with a high PSNR, ISNR ratio and a good visual quality.
Automated breast cancer detection system from breast mammogram using deep neu...nooriasukmaningtyas
All over the world breast cancer is a major disease which mostly affects the women and it may also cause death if it is not diagnosed in its early stage. But nowadays, several screening methods like magnetic resonance imaging (MRI), ultrasound imaging, thermography and mammography are available to detect the breast cancer. In this article mammography images are used to detect the breast cancer. In mammography image the cancerous lumps/microcalcifications are seen to be tiny with low contrast therefore it is difficult for the doctors/radiologist to detect it. Hence, to help the doctors/radiologist a novel system based on deep neural network is introduced in this article that detects the cancerous lumps/microcalcifications automatically from the mammogram images. The system acquires the mammographic images from the mammographic image analysis society (MIAS) data set. After pre-processing these images by 2D median image filter, cancerous features are extracted from the images by the hybridization of convolutional neural network with rat swarm optimization algorithm. Finally, the breast cancer patients are classified by integrating random forest with arithmetic optimization algorithm. This system identifies the breast cancer patients accurately and its performance is relatively high compared to other approaches.
A novel approach to jointly address localization and classification of breast...IJECEIAES
Localization of the cancerous region as well as classification of the type of the cancer is highly inter-linked with each other. However, investigation towards existing approaches depicts that these problems are always iindividually solved where there is still a big research gap for a generalized solution towards addressing both the problems. Therefore, the proposed manuscript presents a simple, novel, and less-iterative computational model that jointly address the localization-classification problems taking the case study of early diagnosis of breast cancer. The proposed study harnesses the potential of simple bio-inspired optimization technique in order to obtained better local and global best outcome to confirm the accuracy of the outcome. The study outcome of the proposed system exhibits that proposed system offers higher accuracy and lower response time in contrast with other existing classifiers that are freqently witnessed in existing approaches of classification in medical image process.
PREDICTION OF BREAST CANCER USING DATA MINING TECHNIQUESIAEME Publication
Women who have improved from breast cancer (BC) constantly panic about setback. The way that they have persevered through the meticulous treatment makes repeat their biggest fear. However, with current spreads in technology, early repeat prediction can enable patients to get treatment prior. The accessibility of broad information and propelled techniques make precise and fast prediction possible. This examination expects to think about the exactness of a couple of existing information mining calculations in predicting BC repeat. It inserts a particle swarm optimization as highlight choice into ANN classifier. An objective of increasing the accuracy level of the prediction model.
The Evolution and Impact of Medical Science Journals in Advancing Healthcaresana473753
Medical science journals have evolved into essential tools for advancing healthcare by disseminating research findings, promoting evidence-based practices, and fostering collaboration. Their historical significance, role in evidence-based medicine, and adaptability to the digital age make them indispensable in the quest for improved healthcare outcomes. As they continue to evolve, medical science journals will play a vital role in shaping the future of medicine and healthcare worldwide.
"journals" refer to academic or professional publications that contain articles and research papers related to various aspects of the medical field. These journals serve as a platform for the dissemination of new medical knowledge, research findings, clinical studies, and expert opinions. They play a crucial role in advancing medical science, sharing best practices, and keeping healthcare professionals, researchers, and students informed about the latest developments in medicine and related disciplines.
A Review on Data Mining Techniques for Prediction of Breast Cancer RecurrenceDr. Amarjeet Singh
The most common type of cancer in women
worldwide is the Breast Cancer. Breast cancer may be
detected early using Mammograms, probably before it's
spread. Recurrent breast cancer could occur months or years
after initial treatment. The cancer could return within the
same place because the original cancer (local recurrence), or it
may spread to different areas of your body (distant
recurrence). Early stage treatment is done not only to cure
breast cancer however additionally facilitate in preventing its
repetition/recurrence. Data mining algorithms provide
assistance in predicting the early-stage breast cancer that
continually has been difficult analysis drawback. The
projected analysis can establish the most effective algorithm
that predicts the recurrence of the breast cancer and improve
the accuracy the algorithms. Large information like Clump,
Classification, Association Rules, Prediction and Neural
Networks, Decision Trees can be analyzed using data mining
applications and techniques.
Image processing and machine learning techniques used in computer-aided dete...IJECEIAES
This paper aims to review the previously developed Computer-aided detection (CAD) systems for mammogram screening because increasing death rate in women due to breast cancer is a global medical issue and it can be controlled only by early detection with regular screening. Till now mammography is the widely used breast imaging modality. CAD systems have been adopted by the radiologists to increase the accuracy of the breast cancer diagnosis by avoiding human errors and experience related issues. This study reveals that in spite of the higher accuracy obtained by the earlier proposed CAD systems for breast cancer diagnosis, they are not fully automated. Moreover, the false-positive mammogram screening cases are high in number and over-diagnosis of breast cancer exposes a patient towards harmful overtreatment for which a huge amount of money is being wasted. In addition, it is also reported that the mammogram screening result with and without CAD systems does not have noticeable difference, whereas the undetected cancer cases by CAD system are increasing. Thus, future research is required to improve the performance of CAD system for mammogram screening and make it completely automated.
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Abstract:
Breast cancer is the most common cancer among women in the world. It is estimated that one in eight women, all over the wide, would develop breast cancer during her life. Breast cancer is considered one of the first-leading causes of cancer deaths among women. The early detection of breast cancer could save many women's life. Mammogram is one of the most imaging technology used for diagnosing breast cancer. Although mammogram has recorded a high detection and classification accuracy, it is difficult in imaging dense breast tissues, its performance is poor in younger women, it is harmful, and it couldn’t detect breast tumor that less than 2 mm. To overcome these limitations, it was found that there is a relation between the temperature and the presence of breast cancer. Utilizing this fact, infrared thermography could be a good source of breast images to study and detect cancer at the early stages which is crucial for cancer patients for increasing the rate of breast cancer survival.
This talk aims to give an overview of the thermal imaging technology, its possible applications in the medical field, focusing on its opportunities and challenges for the early detection of breast cancer and highlighting the state-of-the-art of this point.
At the 35th AICC-RCOG Annual Conference in association with FOGSI and MOGS, Dr. Niranjan Chavan, President of MOGS, gave an address on Artificial Intelligence in Gynaecologic Oncology at Taj Lands' End, Bandra, Mumbai on the 6th November 2022
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
This guide describes how to explain your research in a persuasive, well-organized paper, avoiding plagiarism, tips to improve your academic English writing
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
Feature selection (FS) is a challenging problem that attracted the attention of many researchers. FS can be considered as an NP hard problem, If a dataset contains N features then 2N solutions are generated with each additional feature, the complexity doubles. To solve this problem, we reduce the dimensionality of the feature by extracting the most important features. In this paper, we integrate the chaotic maps in the standard butterfly optimization algorithm to increase the diversity and avoid trapping in local minima in this algorithm. The proposed algorithm is called Chaotic Butterfly Optimization Algorithm (CBOA). The performance of the proposed CBOA is investigated by applying it on 16 benchmark datasets and comparing it against six meta-heuristics algorithms. The results show that invoking the chaotic maps in the standard BOA can improve its performance with an accuracy more than 95% .
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
To learn how to use Google Scholar to find similar papers (related work) to your class or graduation projects
Step by step supported with screenshot to teach undergraduate students to know how find a research paper
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
Presentation Outlines
The Writing Process
Pitfalls in the Process
Project Thesis outlines
What should the abstract include?
What Should the Conclusion include?
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
To give a brief overview about Public Key Infrastructure and Digital Signature with simple example
Lecture Outlines
Why En/Dec by itself is NOT enough?
What is PKI and how does it work?
What is Digital Signature and how it is work
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
Lecture Objectives
1- To learn Caesar encryption as an example of symmetric encryption techniques
2- To learn RSA encryption as an example of asymmetric encryption techniques
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
Integer Wavelet Transform for Thermal Image
Authentication
Agenda
Introduction
Problem Definition
Research Aim
Proposed Method
Results and Discussion
Conclusion and Future Works
Introduction
Problem Definition
the Internet is a popular communication channel for messages and images transmission which need protection and authentication in different scenarios.
Two ways main ways to achieve such protection
Cryptography: making a message unreadable
Steganography: concealing a message inside another
Problem Definition
The data hiding-based steganography is used by application where parties need to exchange messages through images while preserving visual fidelity of the image.
A well-known steganography methods are
the one based on the least significant bit (LSB) technique.
Other methods enable hiding a variable length of bits in each byte according to the characteristics of the human visual system.
Problem Definition
Thermal imaging is a technique which converts an invisible radiation pattern of an object into visible images for feature extraction and analysis.
This technique was first developed for military purposes but later gained a wide application in various fields such as medicine, veterinary, security surveillance and others.
Aim
The aim of this research is:
Designing a thermal image authentication technique integrating the Integer Wavelet Transform (IWT) with a hash function.
Proposed Approach
The Proposed Method
In this method,
the thermal images were used as cover images
bits from secret data (images) were then hidden in the cover images.
This was achieved by using
the hash function and
IntegerWavelet Transform (IWT).
1, 2 and 3 bits per bytes have been hidden in both horizontal and vertical components of wavelet transform.
The Proposed Method
Results
Used Dataset
10 thermal images (.ppm) were used as cover images
They have been taken by different cameras and collected from the Internet.
These images are 512x512 pixel in dimension
The secret image that is used to be embedded in the cover images is 128128 pixel in dimension.
Used Dataset
Experimental Results
Experimental Results PSNR and IF
Experimental Results
Comparison with Related Work
Conclusion and Future Works
Hash based thermal image authentication technique using the Integer Wavelet Transform (IWT) was proposed
The performance of the proposed technique was evaluated using MSE, PSNR, and IF analysis and they have shown good performance for the proposed technique
A comparison with the most related work showed that our technique obtained a better performance
In the future, more analysis will be done to provide countermeasures to possible attacks.
Thanks and Acknowledgement
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
SIFT-based Arabic Sign Language Recognition (ArSL) System
By
Alaa Tharwat1,3
And
Tarek Gaber2,3
1Faculty of Eng. Suez Canal University, Ismailia, Egypt
2Faculty of Computers & Informatics , Suez Canal University, Ismailia, Egypt
3Scientic Research Group in Egypt (SRGE), http://www.egyptscience.netSuez Canal University
Scientific Research Group in Egypt
Introduction: Why ArSL
Introduction: Aim of the work
What is ArSL?
Translating ArSL to spoken language, i.e. translate hand gestures to Arabic characters
Sign Language hand formations:
Hand shape
Hand location
Hand movement
Hand orientation
Introduction: Types of ArSL
Proposed Method: General Framework
Proposed Method: General Framework
Training phase
Collecting all training images (i.e. gestures of Arabic Sign Language).
Extracting the features using SIFT
Representing each image by one feature vector.
Applying a dimensionality reduction (e.g, LDA) to reduce the number features in the vector
Proposed Method: Feature Extraction
Proposed Method: Feature Extraction
Proposed Method: Feature Extraction
Proposed Method: Classification Techniques
We have used the following classifiers assess their performance with our approach :
SVM is one of the classifers which deals with a problem of high dimensional datasets and gives very good results.
K-NN: unknown patterns are distinguished based on the similarity to known samples
Nearest Neighbor: Its idea is extremely simple as it does not require learning
Experimental Results: Dataset
We have used 210 gray level images with size 200x200.
These images represent 30 Arabic characters, 7 images for each character).
The images are collected in different illumination, rotation, quality levels, and image partiality.
Experimental Scenarios
To select the most suitable parameters.
To understand the effect of changing the number of training images.
To prove that our proposed method is robust against rotation
To prove that our proposed method is robust against occlusion.
Experimental Results
Experimental Results
Experimental Results
Experimental Results
Experimental Results
Conclusions
Our proposal approach for ArSL Recognition
Achieve an excellent accuracy to identify ArSL from 2D images
Robust against to rotation images with different angels and occluded images horizontally or vertically.
Robust against many previous ArSL approaches.
Performance of this approach is measured by
Using captured images with Matlab implementation
Comparison with related work
Future Work
Improving the results of in case of image occlusion
Increase the size of the dataset to check its scalability.
Identify characters from video frames and then try to implement real time ArSL system.
Thanks
Fair and Abuse-free Contract Signing Protocol Supporting Fair License Reselling
By
Tarek Gaber
PhD Candidate: School of Computer Science
The University of Manchester, Manchester, UK
Introduction
DRM (Digital Rights Management):
Content owners
Persistent protection
Prevent unauthorized access
Managing usage rights (i.e. license)
E.g. expiration date, device restriction, etc.
Protect their monetary interests
Consumers
Purchase licenses (from a License issuer (LI)) to access corresponding digital contents.
But can NOT resell their licenses
Reselling Deal (RD) Method[1]
Current Contract Signing Protocols
Introduction
Gradual-release protocols
Optimistic contract signing
Introduction: Contract Signing Protocol
Introduction: Contract Signing Protocol
Properties of Contract Signing
Gradual-release Protocols
Dividing signatures to N verifiable parts
Exchanging the signatures part-by-part
Disadvantages
Not practical
Involved entities should have equal computational power
Inefficient
Many messages flows
High computational cost
Make each part verifiable
Prove that each part is correct
Optimistic Contract Signing (1 of 3)
Signers (A and B) optimistically sign a contract themselves
Optimistic Contract Signing (2 of 3)
If there is a problem, a TTP is only involved (e.g. A does not send M3)
Optimistic Contract Singing (3 of 3)
TTP is only involved if there is a problem
Disadvantages
Performance bottleneck
Decrease efficiency
Number of Message flow between TTP and signers
Increase transaction cost
Difficult to find
TTP and Reselling Deal (RD) Method[1]
Concurrent Signatures (CS) Scheme[3]
A digital signature scheme:
Non-binding or ambiguous signatures exchange, and
Releasing secret key called a keystone
Concurrently full binding signatures
Either the two exchanged signatures become binding, or none becomes.
Advantages:
No TTP
No equivalent computational power
CS Scheme Problems
CS and our Protocol
Can we utilize the CS advantages (i.e. no TTP, and no restriction of computational power) and overcome its problems?
Design considerations of the RDS protocol:
Fairness
Either both signers get a signed contract or none gets anything useful
Abuse-freeness
Inability to prove to an outside entity that a signer is able to control the output of a protocol.
Non-repudiation
No party could deny having generated his signature (NOO: Non-repudiation of Origin)
No party could deny having received a signature from the other signer (NOR: Non-repudiation of Receipt)
No dedicated TTP
RDS Protocol Assumptions
License Issuer (LI)
Trustworthy, issues licenses, and facilitates license reselling. It is already there in existing license distribution infrastructure
Reselling Permission of a license (RPLic)
It is issued with a resalable license
It is of the from [Lic||f||SignLI(Lic||f)], where f is the hash value of the keystone ks
Each license is issued with a unique ks
Channels
Drm digital rights managment-june2014-tarek gaberTarek Gaber
Digital Rights Management
Dr. Tarek Gaber
Faculty of Computers & Informatics
Suez Canal University , Ismailia, Egypt
and
SRGE (www.scienceegypt.net)
Email: tmgaber@gmail.com
Digital Content and its Characteristics
Before the digital era, one's ability to do various things with content were limited.
The Internet (digital age) makes it possible to nearly do anything with digital content.
Digital Content and its Characteristics
Digital contents, e.g. Music, Movies, documents, are:
very easy and cheap to copy
Essentially no “resistance” from duplication
This led to:
Loss of billion dollars a year for world trade.
Solutions
Cryptographic Techniques could help but not enough
DRM and Copyright Protection
Can content be protected even after its decryption?
Copying by persistent pirate would always be succeed.
Current technology can potentially minimize the scale of copying:
“keeping honest people honest”
Digital Rights Management (DRM) technologies can be help in this issue.
What is DRM?
It is a set of technologies (encryption, watermarking, hash function, signature, etc.) enabling content owners to identify and control:
the access to their content and
the conditions under which this access is given.
What is DRM? Cont.
DRM includes:
Persistent Protection: License to be always checked before using a content
Access tracking: Capability of tracking access to and operations on content
Rights licensing: Capability of defining specific rights to content and making them available by contract
Who Could Use DRM?
DRM System Framework
DRM Benefits
DRM Benefits
DRM can be integrated with content management (collection, managing, and publishing of information in any form or medium) to ensure:
Proper business practices
Implementation of new business models
Compliance with regulatory requirements in industries such as financial services, healthcare, and government
Control Access During Workflow by DRM
The process of drafting a law is circulated among committee members (e.g. judges and lawyers).
Using DRM technology, this becomes a closed circulation.
Also, the drafting law is in a tamper-proof format, with
print-only user-rights,
limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final law.
The judges and lawyers can
withdraw, alter, or grant permissions related to the content at any time.
Modification of Rights Over Time by DRM
Systems should be able to update rights and usage as needed to accommodate new distribution models,
E.g. allowing content to be accessed by to 2, 3, or 5 devices
Otherwise cost a lot of money and be a disincentive to customers.
DRM, in such case, can facilitate
collaboration, by creating the ‘trusted environment’
by persiste
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
A Novel Approach to Allow Multiple Resales of DRM-Protected Contents
Tarek Gaber
Dept. of Computer Science,
Faculty of Computers and Informatics,
Suez Canal University
Member of the Scientific Research Group in Egypt (SRGE)
http://www.egyptscience.net
Prof.Aboul Ella’s Group
Agenda
Introduction
Research Problem
Existing Solutions
Drawbacks of the existing solutions
Our vision
Proposed approach
Contributions
Future work
Introduction I
Cryptographic Techniques could help but not enough
Introduction II
DRM (Digital Rights Management):
Content owners
Persistent protection
Prevent unauthorized access
Managing usage rights (i.e. license)
E.g. expiration date, device restriction, etc.
Protect their monetary interests
Consumers
Purchase licenses (from a License issuer (LI)) to access corresponding digital contents.
But can NOT resell their licenses
DRM System
Research Problem
Existing Solutions
Hardware-based solutions
Trusted devices are used
Fair reselling addressed using offline TTP-based approach
Software-based solutions
Online service is used
Fair reselling is NOT addressed using
Did not address multiple resales of one license
Problems in Existing Solutions
Our Vision
Designing a license reselling solution such that:
Supporting reselling
No additional hardware
Play/view content offline
Not compromising content owners’ rights
Secure
Non-repudiation
Fairness
Abuse-free
Additional attractive features
Support market power
Proposed Approach
LI Verifications
Re-salablity Check
Contributions
Novel approach allowing resale of a DRM-Protected content multiple times.
The underlying security mechanism already built into existing DRM systems.
The approach enables a buyer to make sure that a license he is about to purchase is indeed resalable and has not yet resold.
Contributions
The analysis of the approach has shown that it satisfies the specified security requirements.
The approach also can thwart potential threats and attacks that could be mounted by either a buyer or a reseller.
Future Work
Doing a prototype for this approach to assess its performance
Thanks
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
تطبيق محمول للصم والبكم يحول الاشارات الى صوت
د/ طارق محمد عبدالهادي جابر
مدرس بكلية الحاسبات و المعلومات
بجامعة قناة السويس
عضو بالمجموعة البحثية المصرية (SRGE)
http://www.egyptscience.net
Email: tmgaber@gmail.com
Prof.Aboul Ella’s Group
مقدمة
تقريبا قد يصاب أحدنا باحد اعضاء جسمه بشكل مؤقت أو دائم في يوم من الايام
لذا يمكن القول بأن الإعاقة جزء لا يتجزأ من الحالة الإنسانية
لمحة عن الوضع في العالم
نحو مليار شخص معاق من إجمالي 7.5 مليار نسمة
عدد هائل يكابدون الفقر
عدد كبير للغاية منهم يعانون من الانعزال الاجتماعي،
يحرم الكثير منهم من التعليم، والتوظيف والرعاية الصحية، ونظم الدعم الاجتماعي والقانوني.
80% يعيشون في الدول النامية
لمحة عن الوضع في مصر
من واقع بيانات وزارة الاتصالات المصرية:
يوجد حوالي 6% من المصرين ذو إعاقة بصرية،
وحوالي 3 ملاين من المصرين ذو اعاقة سمعية
الأمم المتحدة و ذوي الإحتياجات الخاصة
عقد اجتماع في الأمم المتحدة في شهر اكتوبر 2013 حول دمج ذوي الإعاقة في عمليات التنمية الشاملة وكان من أهم التوصيات:
ان يكون ذوي القدرات الخاصة أعضاء منتجين في مجتمعاتهم وبلادهم
ضرورة وجود التزام عالمي جديد إزاء أصحاب الإعاقة لإشراكهم في النشاط الاقتصادي بمختلف البلدان
ضرورة إتاحة تكنولوجيا المعلومات لذوي الإحتياجات الخاصة في جميع أنحاء العالم.
تطبيقات تكنولوجيا المعلومات لذوي الإحتياجات الخاصة
UK Case Study
40% of deaf people could experience mental health problem at some stages in their lives, compared with 25% in the hearing community,
The fact that callers and advisers can see each other and communicate directly using British Sign Language allowing a much more good conversation.
تطبيقات تكنولوجيا المعلومات لذوي الإحتياجات الخاصة
Breathing Space
It is a free, confidential phone and web based service for deaf people in Scotland experiencing low mood, depression or anxiety.
People who are feeling down or depressed will be able to contact the advisers via web cam and use British Sign Language to discuss their concerns in confidence.
تطبيقات تكنولوجيا المعلومات لذوي الإحتياجات الخاصة
SignVideo
It
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
Segmentation of thermograms breast cancer tarek-to-slid share
1. This project is funded by Structural Funds of the European Union (ESF) and state budget of the Czech Republic
Detection of Breast Abnormalities of
Thermograms based on a New
Segmentation Method
Dr. Tarek Gaber
IT4Innovation, VSB-TU Ostrava, Czech
Faculty of Computers & Informatics
Suez Canal University, Ismailia, Egypt
Scientific Research Group in Egypt
(SRGE)
Tmgaber@gmail.com
Dr. Mona Ali
Faculty of Computers & Information
Minia University, Minia, Egypt
Scientific Research Group in Egypt (SRGE)
Prepared by
3. • Breast cancer is*:
− the most common cancer
among women,
− considered one of the first-
leading causes of cancer
deaths among women
• So, the early detection of breast
cancer is a very crucial save
many women's life.
Introduction
* R. Siegel, J. Ma, Z. Zou, and A. Jemal, “Cancer statistics, 2014,” CA: a cancer journal for clinicians, vol.
64, no. 1, pp. 9–29, 2014.
4. Mammography is one of the most imaging technology used for
diagnosing breast cancer.
However, mammography
has difficultly in imaging dense breast tissues,
its performance is poor in younger women and harmful, and
it couldn’t detect breast tumor that less than 2 mm.
It is a high cost system
Based on http://www.blockimaging.com/, the cost of mammography
devices are
• GE Senographe DS- $60,000 to $95,000
• GE Senographe Essential- $105,000 to $155,000
• Physician's Workstation- $15,000 to $40,000
Introduction
5. Introduction
To overcome the mammography limitations, Infrared
thermography could be used
it was found that there is a relation between the
temperature and the presence of the breast cancer [1].
Thus thermography could be used to detect the cancer
at the early stages which is crucial for cancer patients
10.9.2015
[1] Yahara, Toshiro, et al. "Relationship between microvessel density and thermographic hot areas in breast
cancer." Surgery Today 33.4 (2003): 243-248.
6. It is the science of acquisition and
analysis of thermal information collected
using thermal imaging devices.
It is a noninvasive functional imaging
method, harmless, passive, fast, low
cost and sensitive method.
It can also be defined as a method
detecting an infrared energy emitted
from an object, then converts this energy
into a temperature, and then displays an
image representing the temperature
distribution
This concept is used to produce thermal
images instead mammogram
What is Infrared Thermography
7. Segmentation of Region of Interest (ROI) is always an important
step in developing a CAD system for a breast cancer detection.
ROI segmentation aims to separate the regions of the breast
from the other parts of the body..
It can be achieved either
fully automatic or semi-automatic
This paper proposes a fully automatic breast segmentation
approach
Problem Definition
8. The main idea of the proposed segmentation method is based on the following facts
[2]:
• The distance between body and camera is 1 meter.
• As can be seen from the Figure, the image occupies only the upper
part of the patient that contains a part of the stomach and arms with
nick.
• The breast also occupies a specific position in the women’s body which is
nearly at the center of the image.
The New Segmentation Idea
[2] L. Silva, D. Saade, G. Sequeiros, A. Silva, A. Paiva, R. Bravo, and A. Conci, “A new database for breast research
with infrared image,” Journal of Medical Imaging and Health Informatics, vol. 4, no. 1, pp.92–100, 2014.
11. Feature Extraction
From the enhanced ROI of breast thermograms,
two types of features are extracted:
1- First order statistical (feature with P>0.5 used), i.e. choosing
features significantly different from each other
13. The Support vector machine (SVM) was used to
evaluate the feature extracted from the ROI
extracted by our new proposed segmentation
method.
The classification was conducted on the following
scenarios
Classification
14. The used database
A benchmark database (PROENG database) [4]
contains 149 patients with images at size of
640*480 pixels. The frontal images were
selected to test the proposed system. 63 cases,
29 healthy and 34 malignant, were used.
[4] L. Silva, D. Saade, G. Sequeiros, A. Silva, A. Paiva, R. Bravo, and A.
Conci, “A new database for breast research with infrared image,” Journal
of Medical Imaging and Health Informatics, vol. 4, no. 1, pp.92–100, 2014.
18. • An automatic segmentation method for themograms have
been proposed.
• The method results proved its reliability in extracting the
ROI for different cases.
• This method was evaluated using the segmented ROI in a
proposed approach for the detection of the abnormalities of
breast thermograms
• the SVM with its kernel function was used to detect the
normal and abnormal breasts.
• Based the experimental results, it was found that the SVM-
RBF gave the best results (100%).
• using the measurements of the recall and the precision, the
evaluation of the classification results reached to 100%.
Conclusion and Future work
19. Can we develop a high accuracy rate CAD
system using the low cost and non-invasive
thermal technology to help many women
around the world to survive the breast cancer?
Thanks for your attention
20. Acknowledgment
Thanks to the IT4Innovation, VSB-TU of Ostrava, Ostrava,
Czech Republic for the financial support for this work
Thanks to the Scientific Research Group in Egypt, (SRGE),
http://www.egyptscience.net for the technical support of this
work
Thanks to all co-authros
Mona A. S. Ali;, Gehad Ismail Sayed, Tarek Gaber, Aboul Ella
Hassanien5, Vaclav Snasel, Lincoln F. Silva
10.9.2015