-
A Novel SLCA-UNet Architecture for Automatic MRI Brain Tumor Segmentation
Authors:
Tejashwini P S,
Thriveni J,
Venugopal K R
Abstract:
Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Althou…
▽ More
Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Although MRI is the current standard method for imaging tumors, its clinical usefulness is constrained by the requirement of manual segmentation which is time-consuming. Deep learning-based approaches have emerged as a promising solution to develop automated biomedical image exploration tools and the UNet architecture is commonly used for segmentation. However, the traditional UNet has limitations in terms of complexity, training, accuracy, and contextual information processing. As a result, the modified UNet architecture, which incorporates residual dense blocks, layered attention, and channel attention modules, in addition to stacked convolution, can effectively capture both coarse and fine feature information. The proposed SLCA UNet approach achieves good performance on the freely accessible Brain Tumor Segmentation (BraTS) dataset, with an average performance of 0.845, 0.845, 0.999, and 8.1 in terms of Dice, Sensitivity, Specificity, and Hausdorff95 for BraTS 2020 dataset, respectively.
△ Less
Submitted 16 July, 2023;
originally announced July 2023.
-
Contiguous Hetero-structures & Co-existing Morphological Derivatives of Preferentially Grown Carbo-nitrides in Long Term Aged SS 316LN with Varying Nitrogen Concentration
Authors:
Alphy George,
Vaishnavi Krupa B. R.,
R. Mythili,
Arup Dasgupta,
J. Ganesh Kumar,
G. V. Prasad Reddy
Abstract:
To assess long-term structural integrity under operational conditions in nuclear reactors, SS 316LN with varying nitrogen content is subjected to thermal aging for 20000 hours at 650°C. While the annealing twins and heterogeneous grain evolution by bimodal division are independent of chemical composition, the type, size and morphology of evolving secondary phases are characteristic for nitrogen co…
▽ More
To assess long-term structural integrity under operational conditions in nuclear reactors, SS 316LN with varying nitrogen content is subjected to thermal aging for 20000 hours at 650°C. While the annealing twins and heterogeneous grain evolution by bimodal division are independent of chemical composition, the type, size and morphology of evolving secondary phases are characteristic for nitrogen concentration. Colour contrast in bright field optical microscopy combined with transmission electron microscopy reveals the presence of three major precipitate phases; M23(C, N)6, Fe2Mo intermetallics and Cr2N. Contiguously formed hetero-structures of Fe2Mo and Cr2N are quantified and extensive formation has been observed in steels with high nitrogen content (0.14 wt. % and 0.22 wt. %). A unique occurrence of morphological derivatives of intra-granular M23(C, N)6 precipitates with cube-on-cube orientation relationship such as (1) isolated cubes, (2) primary stringers/strings of cubes, (3) secondary stringers/clusters of branched primary strings, and (4) clusters of laths are identified. The stringers and laths are preferentially grown in{111}/<110>γ and have crystallographic variants. The conclusions are drawn from bright field colour contrast optical micrographs in the present study demonstrate the potential of light optical microscopy to be used as a significant tool to efficiently and accurately process huge amount of data including the preferential growth planes/directions ({111}/<110>) of morphological derivatives of M23(C, N)6 precipitates, by analyzing the symmetry and dense planes/directions of secondary phases. Overall mechanical properties have been reformed by the precipitation strengthening effect arising from the excess nitrogen content.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
Huskysort
Authors:
R. C. Hillyard,
Yunlu Liaozheng,
Sai Vineeth K. R
Abstract:
Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can…
▽ More
Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can divide the work into linear, i.e. $\textbf{O}(N)$, work and linearithmic, i.e. $\textbf{O}(N log N)$, work. An algorithm that moves work from the linearithmic phase to the linear phase may be able to reduce the total number of array accesses and, indirectly, processing time. This paper describes an approach to sorting which reduces the number of expensive comparisons in the linearithmic phase as much as possible by substituting inexpensive comparisons. In Java, the two system sorts are dual-pivot quicksort (for primitives) and Timsort for objects. We demonstrate that a combination of these two algorithms can run significantly faster than either algorithm alone for the types of objects which are expensive to compare. We call this improved sorting algorithm Huskysort.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol
Authors:
Vinay Kumar B. R.,
Roshan Antony,
Navin Kashyap
Abstract:
This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossiping involves each node forwarding a received p…
▽ More
This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossiping involves each node forwarding a received packet to all its neighbours only with a certain probability $p$. In this paper, we study the effect of introducing redundancy, in the form of coded packets, into a probabilistic forwarding protocol. Specifically, we assume that the source node has $k$ data packets to broadcast, which are encoded into $n \ge k$ coded packets, such that any $k$ of these coded packets are sufficient to recover the original $k$ data packets. Our interest is in determining the minimum forwarding probability $p$ for a "successful broadcast", which we take to be the event that the expected fraction of network nodes that receive at least $k$ of the $n$ coded packets is close to 1. We examine, via simulations and analysis of a number of different network topologies (e.g., trees, grids, random geometric graphs), how this minimum forwarding probability, and correspondingly, the expected total number of packet transmissions varies with the amount of redundancy added. Our simulation results indicate that over network topologies that are highly connected, the introduction of redundancy into the probabilistic forwarding protocol is useful, as it can significantly reduce the expected total number of transmissions needed for a successful broadcast. On the other hand, for trees, our analysis shows that the expected total number of transmissions needed increases with redundancy.
△ Less
Submitted 10 January, 2019; v1 submitted 7 January, 2019;
originally announced January 2019.
-
FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture
Authors:
Satish S Bhairannawar,
Rathan R,
Raja K B,
Venugopal K R,
L M Patnaik
Abstract:
The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log…
▽ More
The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log Multiplier (REFMLM) for image Filters. The 2x2 error free Mitchell log multiplier is designed with zero error by introducing error correction term is used in higher order Karastuba-Ofman Multiplier (KOM) Architectures. The higher order KOM multipliers is decomposed into number of lower order multipliers using radix 2 till basic multiplier block of order 2x2 which is designed by error free Mitchell log multiplier. The 8x8 REFMLM is tested for Gaussian filter to remove noise in fingerprint image. The Multiplier is synthesized using Spartan 3 FPGA family device XC3S1500-5fg320. It is observed that the performance parameters such as area utilization, speed, error and PSNR are better in the case of proposed architecture compared to existing architectures
△ Less
Submitted 8 July, 2014;
originally announced July 2014.
-
QoS group based optimal retransmission medium access protocol for wireless sensor networks
Authors:
Kumaraswamy M,
Shaila K,
Tejaswi V,
Venugopal K R,
S S Iyengar,
L M Patnaik
Abstract:
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide au…
▽ More
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit data to a sink node, but cannot receive acknowledgement control signals from the sink node. The proposed protocol GORMA provides QoS to the nodes which work independently on predefined time by allowing them to transmit each packet an optimal number of times within a given period. Our simulation results shows that the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and two QoS groups and minimize the energy consumption.
△ Less
Submitted 11 April, 2014;
originally announced April 2014.
-
Multiple Domain Secure Routing for Wireless Sensor Networks
Authors:
Lata B T,
Jansi P K R,
Shaila K,
D N Sujatha,
Venugopal K R,
L M Patnaik
Abstract:
Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain…
▽ More
Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain Routing with Overlap of Nodes (MDRON) and Multiple Domain Routing Without Overlap of Nodes (MDRWON) algorithms, in which packets follow multiple optimized paths simultaneously. The Special node algorithm searches the node which has maximum power and these nodes are used for transferring the packet from one domain to another domain. Simulation results using MATLAB shows that performance is better than Purely Random Propagation (PRP) and Non Repetitive Random Propagation(NRRP) Algorithms.
△ Less
Submitted 22 September, 2013;
originally announced September 2013.
-
Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining
Authors:
Srikantaiah K C,
Suraj M,
Venugopal K R,
L M Patnaik
Abstract:
There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity base…
▽ More
There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity based mechanisms; WDES, to extract desired SERPs and store them in the local depository for offline browsing and WDICS, to integrate the requested contents and enable the user to perform the intended analysis and extract the desired information. Our experimental results show that WDES and WDICS outperform DEPTA [1] in terms of Precision and Recall.
△ Less
Submitted 23 March, 2013;
originally announced March 2013.
-
Fingerprint Recognition Using Minutia Score Matching
Authors:
Ravi. J,
K. B. Raja,
Venugopal. K. R
Abstract:
The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, wh…
▽ More
The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae from the thinned image. The false matching ratio is better compared to the existing algorithm.
△ Less
Submitted 23 January, 2010;
originally announced January 2010.