Search Results/Filters    

Filters

Year

Banks




Expert Group










Full-Text


Issue Info: 
  • Year: 

    2017
  • Volume: 

    46
  • Issue: 

    4 (78)
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    956
  • Downloads: 

    0
Abstract: 

This paper studies the problem of the convolutional code parameters estimation in noisy scenario. Among the methods that have been proposed for this problem, the rank-based method has attracted most of the research. In this method, the receiver cuts the received sequence up into vectors of lengthl to form the rows of matrix C (l), for max l =1, ¼, lmax. The code parameters are estimated based on the rank of these matrices. To this end, the relation between the code parameters and the rank of C (l) should be known. To do this, the previous works proposed an experimental relation; however, it is not established in the general case. This paper analytically computes the rank relation and proposes a method to extract the rate k/n convolutional code parameters. The method uses the Gaussian elimination with row pivoting (GERP) algorithm to estimate the rank and null space of C (l). The proposed algorithm is based on a threshold value. Hence, an appropriate threshold will be proposed based on the Minimax decision rule.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 956

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

AMERI ALI

Issue Info: 
  • Year: 

    2020
  • Volume: 

    78
  • Issue: 

    4
  • Pages: 

    207-211
Measures: 
  • Citations: 

    0
  • Views: 

    1021
  • Downloads: 

    0
Abstract: 

Background: The most common types of non-melanoma skin cancer are basal cell carcinoma (BCC), and squamous cell carcinoma (SCC). AKIEC-Actinic keratoses (Solar keratoses) and intraepithelial carcinoma (Bowen’ s disease)-are common noninvasive precursors of SCC, which may progress to invasive SCC, if left untreated. Due to the importance of early detection in cancer treatment, this study aimed to propose a computer-based model for identification non-melanoma malignancies. Methods: In this analytic study, 327 AKIEC, 513 BCC, and 840 benign keratosis images from human against machine with 10000 training dermoscopy images (HAM10000) were extracted. From each of these three types, 90% of the images were designated as the training set and the remaining images were considered as the test set. A deep learning convolutional neural network (CNN) was developed for skin cancer detection by using AlexNet (Krizhevsky, et al., 2012) as a pretrained network. First, the model was trained on the training images to discriminate between benign and malignant lesions. In comparison with conventional methods, the main advantage of the proposed approach is that it does not need cumbersome and time-consuming procedures of lesion segmentation and feature extraction. This is because CNNs have the capability of learning useful features from the raw images. Once the system was trained, it was validated with test data to assess the performance. Study was carried out at Shahid Beheshti University of Medical Sciences, Tehran, Iran, in January and February, 2020. Results: The proposed deep learning network achieved an AUC (area under the ROC curve) of 0. 97. Using a confidence score threshold of 0. 5, a classification accuracy of 90% was attained in the classification of images into malignant and benign lesions. Moreover, a sensitivity of 94% and specificity of 86% were obtained. It should be noted that the user can change the threshold to adjust the model performance based on preference. For example, reducing the threshold increase sensitivity while decreasing specificity. Conclusion: The results highlight the efficacy of deep learning models in detecting non-melanoma skin cancer. This approach can be employed in computer-aided detection systems to assist dermatologists in identification of malignant lesions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1021

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 5
Issue Info: 
  • Year: 

    2018
  • Volume: 

    7
  • Issue: 

    1
  • Pages: 

    84-97
Measures: 
  • Citations: 

    0
  • Views: 

    199
  • Downloads: 

    70
Abstract: 

This paper concerns to blind identification of a convolutional code with desired rate in a noiseless transmission scenario. To the best of our knowledge, blind estimation of convolutional code based on only the received bitstream doesn’ t lead to a unique solution. Hence, without loss of generality, we will assume that the transmitter employs a non-catastrophic encoder. Moreover, we consider a complete synchronous scenario in which one can extract separate codewords from received sequence. This assumption is valid in many practical communication systems because, the frame preambles allow us to identify the beginning of each codewords. In this paper, we examine the blind identification problem for rate1/n and rate k/n convolutional codes, respectively. For rate 1/n, we propose an iterative method that uses three steps in each iteration to test the validity of a possible value of n. We show that this method can identify the parameters of a rate 1/n convolutional code from only two different noiseless received codewords. Afterwards, we generalize this method for a rate k/n convolutional code in which each iteration is composed of seven successive steps. We show that this method requires at least k+1 different codewords to identify all parameters of a rate k/n code.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 199

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 70 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

HAMIDI HOJJATOLLAH

Issue Info: 
  • Year: 

    2016
  • Volume: 

    -
  • Issue: 

    2 (SERIAL 28)
  • Pages: 

    51-69
Measures: 
  • Citations: 

    0
  • Views: 

    881
  • Downloads: 

    0
Abstract: 

We present a framework for algorithm-based fault tolerance methods in the design of fault tolerant computing systems. The ABFT error detection technique relies on the comparison of parity values computed in two ways. The parallel processing of input parity values produce output parity values comparable with parity values regenerated from the original processed outputs. Number data processing errors are detected by comparing parity values associated with a convolution code. This article proposes a new computing paradigm to provide fault tolerance for numerical algorithms. The data processing system is protected through parity values defined by a high-rate real convolution code. Parity comparisons provide error detection, while output data correction is affected by a decoding method that includes both round-off error and computer-induced errors. To use ABFT methods efficiently, a systematic form is desirable. A class of burst-correcting convolution codes will be investigated. The purpose is to describe new protection techniques that are easily combined with data processing methods, leading to more effective fault tolerance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 881

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1382
  • Volume: 

    9
Measures: 
  • Views: 

    2061
  • Downloads: 

    0
Abstract: 

در این مقاله به بررسی نحوه پیاده سازی الگوریتم chain code بر روی FPGA می پردازیم. الگوریتم chaincode یکی از الگوریتم های کد کردن تصویر می باشد که برای کد کردن لبه های یک شیء در تصویر استفاده می شود همچنین این الگوریتم می تواند عرض، ارتفاع، محیط و مساحت شیء را نیز به دست آورد. این الگوریتم در پردازش تصویر و شناسایی و مقایسه شیء ها و الگوها با هم کاربرد بسیاری دارد. در این پروژه ابتدا الگوریتم chain code با استفاده از VHDL که زبان توصیف سخت افزار می باشد، شبیه سازی شده و سپس برنامه نوشته شده به زبان VHDL بر روی مدل Spartan-II از FPGA های شرکت Xilinx پیاده سازی می شود.پردازنده مذکور قابلیت تولید chain code را برای یک تصویر با ابعاد حداکثر 256*256 پیکسل سیاه و سفید دارا می باشد که البته در صورت نیاز این ابعاد قابل گسترش می باشند. همچنین این پردازنده، طول، عرض، محیط و مساحت شیء موجود در تصویر را نیز علاوه بر تولید کد به دست می آورد.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2061

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Journal: 

خصوصی

Issue Info: 
  • End Date: 

    تیر 1373
Measures: 
  • Citations: 

    0
  • Views: 

    222
  • Downloads: 

    0
Keywords: 
Abstract: 

این طرح بخشی از طرح طراحی و ساخت دستگاه های «Bar. code. Reader» است که برای استفاده در هتل ها، به عنوان کلید، طراحی شده اند. نمونه مورد نظر، پس از طراحی و ساخت مورد تست قرار گرفت. با توجه به نتایج مثبت آزمایش یک هزار سری از سیستم به سفارش کارفرما ساخته شد و تحویل گردید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 222

Issue Info: 
  • Year: 

    1388
  • Volume: 

    17
Measures: 
  • Views: 

    303
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 303

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

اعتضادی حمید

Journal: 

بندر و دریا

Issue Info: 
  • Year: 

    0
  • Volume: 

    27
  • Issue: 

    192
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    906
  • Downloads: 

    0
Keywords: 
Abstract: 

لطفا برای مشاهده متن کامل این مقاله اینجا را کلیک کنید.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 906

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2015
  • Volume: 

    -
  • Issue: 

    8
  • Pages: 

    55-86
Measures: 
  • Citations: 

    0
  • Views: 

    739
  • Downloads: 

    0
Abstract: 

Terrorism is a phenomenon which considerable attention has been focused on in recent years. In this respect, the criminal code is one of mechanisms has been regarded to combat terrorism. Although the penal code is a tool to response the crimes of punishments of offenders, political entity of terrorism can separate the criminal code from its basic principles in order to combat terrorism procedures and establishing Tool-using for politicians. Notwithstanding this danger (risk), the criminal code has many privileges to the non-legal alternatives which based on the criminal code; it can be preferred to other methods like war. Still, the suggested method is creating a comprehensive method to combat terrorism entities which it is to employ every of these methods besides the others.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 739

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button