-
A Review on Explainable Artificial Intelligence for Healthcare: Why, How, and When?
Authors:
Subrato Bharati,
M. Rubaiyat Hossain Mondal,
Prajoy Podder
Abstract:
Artificial intelligence (AI) models are increasingly finding applications in the field of medicine. Concerns have been raised about the explainability of the decisions that are made by these AI models. In this article, we give a systematic analysis of explainable artificial intelligence (XAI), with a primary focus on models that are currently being used in the field of healthcare. The literature s…
▽ More
Artificial intelligence (AI) models are increasingly finding applications in the field of medicine. Concerns have been raised about the explainability of the decisions that are made by these AI models. In this article, we give a systematic analysis of explainable artificial intelligence (XAI), with a primary focus on models that are currently being used in the field of healthcare. The literature search is conducted following the preferred reporting items for systematic reviews and meta-analyses (PRISMA) standards for relevant work published from 1 January 2012 to 02 February 2022. The review analyzes the prevailing trends in XAI and lays out the major directions in which research is headed. We investigate the why, how, and when of the uses of these XAI models and their implications. We present a comprehensive examination of XAI methodologies as well as an explanation of how a trustworthy AI can be derived from describing AI models for healthcare fields. The discussion of this work will contribute to the formalization of the XAI field.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
BLOOM: A 176B-Parameter Open-Access Multilingual Language Model
Authors:
BigScience Workshop,
:,
Teven Le Scao,
Angela Fan,
Christopher Akiki,
Ellie Pavlick,
Suzana Ilić,
Daniel Hesslow,
Roman Castagné,
Alexandra Sasha Luccioni,
François Yvon,
Matthias Gallé,
Jonathan Tow,
Alexander M. Rush,
Stella Biderman,
Albert Webson,
Pawan Sasanka Ammanamanchi,
Thomas Wang,
Benoît Sagot,
Niklas Muennighoff,
Albert Villanova del Moral,
Olatunji Ruwase,
Rachel Bawden,
Stas Bekman,
Angelina McMillan-Major
, et al. (369 additional authors not shown)
Abstract:
Large language models (LLMs) have been shown to be able to perform new tasks based on a few demonstrations or natural language instructions. While these capabilities have led to widespread adoption, most LLMs are developed by resource-rich organizations and are frequently kept from the public. As a step towards democratizing this powerful technology, we present BLOOM, a 176B-parameter open-access…
▽ More
Large language models (LLMs) have been shown to be able to perform new tasks based on a few demonstrations or natural language instructions. While these capabilities have led to widespread adoption, most LLMs are developed by resource-rich organizations and are frequently kept from the public. As a step towards democratizing this powerful technology, we present BLOOM, a 176B-parameter open-access language model designed and built thanks to a collaboration of hundreds of researchers. BLOOM is a decoder-only Transformer language model that was trained on the ROOTS corpus, a dataset comprising hundreds of sources in 46 natural and 13 programming languages (59 in total). We find that BLOOM achieves competitive performance on a wide variety of benchmarks, with stronger results after undergoing multitask prompted finetuning. To facilitate future research and applications using LLMs, we publicly release our models and code under the Responsible AI License.
△ Less
Submitted 27 June, 2023; v1 submitted 9 November, 2022;
originally announced November 2022.
-
Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions
Authors:
Subrato Bharati,
Prajoy Podder
Abstract:
The integration of the Internet of Things (IoT) connects a number of intelligent devices with a minimum of human interference that can interact with one another. IoT is rapidly emerging in the areas of computer science. However, new security problems were posed by the cross-cutting design of the multidisciplinary elements and IoT systems involved in deploying such schemes. Ineffective is the imple…
▽ More
The integration of the Internet of Things (IoT) connects a number of intelligent devices with a minimum of human interference that can interact with one another. IoT is rapidly emerging in the areas of computer science. However, new security problems were posed by the cross-cutting design of the multidisciplinary elements and IoT systems involved in deploying such schemes. Ineffective is the implementation of security protocols, i.e., authentication, encryption, application security, and access network for IoT systems and their essential weaknesses in security. Current security approaches can also be improved to protect the IoT environment effectively. In recent years, deep learning (DL)/ machine learning (ML) has progressed significantly in various critical implementations. Therefore, DL/ML methods are essential to turn IoT systems protection from simply enabling safe contact between IoT systems to intelligence systems in security. This review aims to include an extensive analysis of ML systems and state-of-the-art developments in DL methods to improve enhanced IoT device protection methods. On the other hand, various new insights in machine and deep learning for IoT Securities illustrate how it could help future research. IoT protection risks relating to emerging or essential threats are identified, as well as future IoT device attacks and possible threats associated with each surface. We then carefully analyze DL and ML IoT protection approaches and present each approach's benefits, possibilities, and weaknesses. This review discusses a number of potential challenges and limitations. The future works, recommendations, and suggestions of DL/ML in IoT security are also included.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Federated learning: Applications, challenges and future directions
Authors:
Subrato Bharati,
M. Rubaiyat Hossain Mondal,
Prajoy Podder,
V. B. Surya Prasath
Abstract:
Federated learning (FL) is a system in which a central aggregator coordinates the efforts of multiple clients to solve machine learning problems. This setting allows training data to be dispersed in order to protect privacy. The purpose of this paper is to provide an overview of FL systems with a focus on healthcare. FL is evaluated here based on its frameworks, architectures, and applications. It…
▽ More
Federated learning (FL) is a system in which a central aggregator coordinates the efforts of multiple clients to solve machine learning problems. This setting allows training data to be dispersed in order to protect privacy. The purpose of this paper is to provide an overview of FL systems with a focus on healthcare. FL is evaluated here based on its frameworks, architectures, and applications. It is shown here that FL solves the preceding issues with a shared global deep learning (DL) model via a central aggregator server. This paper examines recent developments and provides a comprehensive list of unresolved issues, inspired by the rapid growth of FL research. In the context of FL, several privacy methods are described, including secure multiparty computation, homomorphic encryption, differential privacy, and stochastic gradient descent. Furthermore, a review of various FL classes, such as horizontal and vertical FL and federated transfer learning, is provided. FL has applications in wireless communication, service recommendation, intelligent medical diagnosis systems, and healthcare, all of which are discussed in this paper. We also present a thorough review of existing FL challenges, such as privacy protection, communication cost, system heterogeneity, and unreliable model upload, followed by future research directions.
△ Less
Submitted 24 June, 2022; v1 submitted 18 May, 2022;
originally announced May 2022.
-
Deep Learning for Medical Image Registration: A Comprehensive Review
Authors:
Subrato Bharati,
M. Rubaiyat Hossain Mondal,
Prajoy Podder,
V. B. Surya Prasath
Abstract:
Image registration is a critical component in the applications of various medical image analyses. In recent years, there has been a tremendous surge in the development of deep learning (DL)-based medical image registration models. This paper provides a comprehensive review of medical image registration. Firstly, a discussion is provided for supervised registration categories, for example, fully su…
▽ More
Image registration is a critical component in the applications of various medical image analyses. In recent years, there has been a tremendous surge in the development of deep learning (DL)-based medical image registration models. This paper provides a comprehensive review of medical image registration. Firstly, a discussion is provided for supervised registration categories, for example, fully supervised, dual supervised, and weakly supervised registration. Next, similarity-based as well as generative adversarial network (GAN)-based registration are presented as part of unsupervised registration. Deep iterative registration is then described with emphasis on deep similarity-based and reinforcement learning-based registration. Moreover, the application areas of medical image registration are reviewed. This review focuses on monomodal and multimodal registration and associated imaging, for instance, X-ray, CT scan, ultrasound, and MRI. The existing challenges are highlighted in this review, where it is shown that a major challenge is the absence of a training dataset with known transformations. Finally, a discussion is provided on the promising future research areas in the field of DL-based medical image registration.
△ Less
Submitted 24 April, 2022;
originally announced April 2022.
-
Diagnosis of COVID-19 Using Machine Learning and Deep Learning: A review
Authors:
M. Rubaiyat Hossain Mondal,
Subrato Bharati,
Prajoy Podder
Abstract:
Background: This paper provides a systematic review of the application of Artificial Intelligence (AI) in the form of Machine Learning (ML) and Deep Learning (DL) techniques in fighting against the effects of novel coronavirus disease (COVID-19). Objective & Methods: The objective is to perform a sco** review on AI for COVID-19 using preferred reporting items of systematic reviews and meta-analy…
▽ More
Background: This paper provides a systematic review of the application of Artificial Intelligence (AI) in the form of Machine Learning (ML) and Deep Learning (DL) techniques in fighting against the effects of novel coronavirus disease (COVID-19). Objective & Methods: The objective is to perform a sco** review on AI for COVID-19 using preferred reporting items of systematic reviews and meta-analysis (PRISMA) guidelines. A literature search was performed for relevant studies published from 1 January 2020 till 27 March 2021. Out of 4050 research papers available in reputed publishers, a full-text review of 440 articles was done based on the keywords of AI, COVID-19, ML, forecasting, DL, X-ray, and Computed Tomography (CT). Finally, 52 articles were included in the result synthesis of this paper. As part of the review, different ML regression methods were reviewed first in predicting the number of confirmed and death cases. Secondly, a comprehensive survey was carried out on the use of ML in classifying COVID-19 patients. Thirdly, different datasets on medical imaging were compared in terms of the number of images, number of positive samples and number of classes in the datasets. The different stages of the diagnosis, including preprocessing, segmentation and feature extraction were also reviewed. Fourthly, the performance results of different research papers were compared to evaluate the effectiveness of DL methods on different datasets. Results: Results show that residual neural network (ResNet-18) and densely connected convolutional network (DenseNet 169) exhibit excellent classification accuracy for X-ray images, while DenseNet-201 has the maximum accuracy in classifying CT scan images. This indicates that ML and DL are useful tools in assisting researchers and medical professionals in predicting, screening and detecting COVID-19.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Medical Imaging with Deep Learning for COVID- 19 Diagnosis: A Comprehensive Review
Authors:
Subrato Bharati,
Prajoy Podder,
M. Rubaiyat Hossain Mondal,
V. B. Surya Prasath
Abstract:
The outbreak of novel coronavirus disease (COVID- 19) has claimed millions of lives and has affected all aspects of human life. This paper focuses on the application of deep learning (DL) models to medical imaging and drug discovery for managing COVID-19 disease. In this article, we detail various medical imaging-based studies such as X-rays and computed tomography (CT) images along with DL method…
▽ More
The outbreak of novel coronavirus disease (COVID- 19) has claimed millions of lives and has affected all aspects of human life. This paper focuses on the application of deep learning (DL) models to medical imaging and drug discovery for managing COVID-19 disease. In this article, we detail various medical imaging-based studies such as X-rays and computed tomography (CT) images along with DL methods for classifying COVID-19 affected versus pneumonia. The applications of DL techniques to medical images are further described in terms of image localization, segmentation, registration, and classification leading to COVID-19 detection. The reviews of recent papers indicate that the highest classification accuracy of 99.80% is obtained when InstaCovNet-19 DL method is applied to an X-ray dataset of 361 COVID-19 patients, 362 pneumonia patients and 365 normal people. Furthermore, it can be seen that the best classification accuracy of 99.054% can be achieved when EDL_COVID DL method is applied to a CT image dataset of 7500 samples where COVID-19 patients, lung tumor patients and normal people are equal in number. Moreover, we illustrate the potential DL techniques in drug or vaccine discovery in combating the coronavirus. Finally, we address a number of problems, concerns and future research directions relevant to DL applications for COVID-19.
△ Less
Submitted 13 July, 2021;
originally announced July 2021.
-
Artificial Neural Network for Cybersecurity: A Comprehensive Review
Authors:
Prajoy Podder,
Subrato Bharati,
M. Rubaiyat Hossain Mondal,
Pinto Kumar Paul,
Utku Kose
Abstract:
Cybersecurity is a very emerging field that protects systems, networks, and data from digital attacks. With the increase in the scale of the Internet and the evolution of cyber attacks, develo** novel cybersecurity tools has become important, particularly for Internet of things (IoT) networks. This paper provides a systematic review of the application of deep learning (DL) approaches for cyberse…
▽ More
Cybersecurity is a very emerging field that protects systems, networks, and data from digital attacks. With the increase in the scale of the Internet and the evolution of cyber attacks, develo** novel cybersecurity tools has become important, particularly for Internet of things (IoT) networks. This paper provides a systematic review of the application of deep learning (DL) approaches for cybersecurity. This paper provides a short description of DL methods which is used in cybersecurity, including deep belief networks, generative adversarial networks, recurrent neural networks, and others. Next, we illustrate the differences between shallow learning and DL. Moreover, a discussion is provided on the currently prevailing cyber-attacks in IoT and other networks, and the effectiveness of DL methods to manage these attacks. Besides, this paper describes studies that highlight the DL technique, cybersecurity applications, and the source of datasets. Next, a discussion is provided on the feasibility of DL systems for malware detection and classification, intrusion detection, and other frequent cyber-attacks, including identifying file type, spam, and network traffic. Our review indicates that high classification accuracy of 99.72% is obtained by restricted Boltzmann machine (RBM) when applied to a custom dataset, while long short-term memory (LSTM) achieves an accuracy of 99.80% for KDD Cup 99 dataset. Finally, this article discusses the importance of cybersecurity for reliable and practicable IoT-driven healthcare systems.
△ Less
Submitted 20 June, 2021;
originally announced July 2021.
-
How Misuse of Statistics Can Spread Misinformation: A Study of Misrepresentation of COVID-19 Data
Authors:
Shailesh Bharati,
Rahul Batra
Abstract:
This paper investigates various ways in which a pandemic such as the novel coronavirus, could be predicted using different mathematical models. It also studies the various ways in which these models could be depicted using various visualization techniques. This paper aims to present various statistical techniques suggested by the Centres for Disease Control and Prevention in order to represent the…
▽ More
This paper investigates various ways in which a pandemic such as the novel coronavirus, could be predicted using different mathematical models. It also studies the various ways in which these models could be depicted using various visualization techniques. This paper aims to present various statistical techniques suggested by the Centres for Disease Control and Prevention in order to represent the epidemiological data. The main focus of this paper is to analyse how epidemiological data or contagious diseases are theorized using any available information and later may be presented wrongly by not following the guidelines, leading to inaccurate representation and interpretations of the current scenario of the pandemic; with a special reference to the Indian Subcontinent.
△ Less
Submitted 14 February, 2021;
originally announced February 2021.
-
Review on the Security Threats of Internet of Things
Authors:
Prajoy Podder,
M. Rubaiyat Hossain Mondal,
Subrato Bharati,
Pinto Kumar Paul
Abstract:
Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0. The combination of IoT, cloud computing and healthcare can contribute in ensuring well-being of people. One important challenge of IoT network is maintaining privacy and to overcome security threats. This paper provides a systematic review of the security aspects of IoT. Firstly, the application of IoT…
▽ More
Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0. The combination of IoT, cloud computing and healthcare can contribute in ensuring well-being of people. One important challenge of IoT network is maintaining privacy and to overcome security threats. This paper provides a systematic review of the security aspects of IoT. Firstly, the application of IoT in industrial and medical service scenarios are described, and the security threats are discussed for the different layers of IoT healthcare architecture. Secondly, different types of existing malware including spyware, viruses, worms, keyloggers, and trojan horses are described in the context of IoT. Thirdly, some of the recent malware attacks such as Mirai, echobot and reaper are discussed. Next, a comparative discussion is presented on the effectiveness of different machine learning algorithms in mitigating the security threats. It is found that the k-nearest neighbor (kNN) machine learning algorithm exhibits excellent accuracy in detecting malware. This paper also reviews different tools for ransomware detection, classification and analysis. Finally, a discussion is presented on the existing security issues, open challenges and possible future scopes in ensuring IoT security.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
ZnO Nanowire Arrays Decorated with Titanium Nitride Nanoparticles as Surface Enhanced Raman Scattering Substrates
Authors:
Y. Rajesh,
M. S. S. Bharati,
S. Venugopal Rao,
M. Ghanashyam Krishna
Abstract:
In this work, ZnO nanowire arrays decorated with titanium nitride (TiN) nanoparticles as surface enhanced Raman scattering (SERS) substrates is demonstrated. ZnO nanowires were grown by hydrothermal synthesis while ~100 nm TiN nanoparticles were obtained by grinding commercial powders for several hours. They were then decorated on the ZnO nanowire arrays using acetone as the medium. Scanning elect…
▽ More
In this work, ZnO nanowire arrays decorated with titanium nitride (TiN) nanoparticles as surface enhanced Raman scattering (SERS) substrates is demonstrated. ZnO nanowires were grown by hydrothermal synthesis while ~100 nm TiN nanoparticles were obtained by grinding commercial powders for several hours. They were then decorated on the ZnO nanowire arrays using acetone as the medium. Scanning electron microscopy confirmed the presence of TiN nanoparticles on the ZnO nanowires. TiN nanoparticles exhibited localized surface plasmon resonances at 430, 520 and 600 nm. SERS experiments using Nile Blue and Methylene Blue as the analyte molecules showed significant enhancement in the Raman signals. It is shown that the origin of the SERS effect is chemical in nature, due to charge transfer between the analyte molecule and the TiN nanoparticles. The current work, thus, represents a simple, cost-effective and facile method for the fabrication of TiN based surface enhanced Raman scattering substrates.
△ Less
Submitted 12 December, 2020;
originally announced December 2020.
-
Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems
Authors:
Subrato Bharati,
Prajoy Podder,
M. Rubaiyat Hossain Mondal,
Md. Robiul Alam Robel
Abstract:
Traffic management, road safety, and environmental impact are important issues in the modern world. These challenges are addressed by the application of sensing, control and communication methods of intelligent transportation systems (ITS). A part of ITS is a vehicular ad-hoc network (VANET) which means a wireless network of vehicles. However, communication among vehicles in a VANET exposes severa…
▽ More
Traffic management, road safety, and environmental impact are important issues in the modern world. These challenges are addressed by the application of sensing, control and communication methods of intelligent transportation systems (ITS). A part of ITS is a vehicular ad-hoc network (VANET) which means a wireless network of vehicles. However, communication among vehicles in a VANET exposes several security threats which need to be studied and addressed. In this review, firstly, the basic flow of VANET is illustrated focusing on its communication methods, architecture, characteristics, standards, and security facilities. Next, the attacks and threats for VANET are discussed. Moreover, the authentication systems are described by which vehicular networks can be protected from fake messages and malicious nodes. Security threats and counter measures are discussed for different remote vehicle communication methods namely, remote keyless entry system, dedicated short range communication, cellular scheme, Zigbee, Bluetooth, radio frequency identification, WiFi, WiMAX, and different direct vehicle communication methods namely on-board diagnosis and universal serial bus.
△ Less
Submitted 11 June, 2020;
originally announced June 2020.
-
Artificial Neural Network Based Breast Cancer Screening: A Comprehensive Review
Authors:
Subrato Bharati,
Prajoy Podder,
M. Rubaiyat Hossain Mondal
Abstract:
Breast cancer is a common fatal disease for women. Early diagnosis and detection is necessary in order to improve the prognosis of breast cancer affected people. For predicting breast cancer, several automated systems are already developed using different medical imaging modalities. This paper provides a systematic review of the literature on artificial neural network (ANN) based models for the di…
▽ More
Breast cancer is a common fatal disease for women. Early diagnosis and detection is necessary in order to improve the prognosis of breast cancer affected people. For predicting breast cancer, several automated systems are already developed using different medical imaging modalities. This paper provides a systematic review of the literature on artificial neural network (ANN) based models for the diagnosis of breast cancer via mammography. The advantages and limitations of different ANN models including spiking neural network (SNN), deep belief network (DBN), convolutional neural network (CNN), multilayer neural network (MLNN), stacked autoencoders (SAE), and stacked de-noising autoencoders (SDAE) are described in this review. The review also shows that the studies related to breast cancer detection applied different deep learning models to a number of publicly available datasets. For comparing the performance of the models, different metrics such as accuracy, precision, recall, etc. were used in the existing studies. It is found that the best performance was achieved by residual neural network (ResNet)-50 and ResNet-101 models of CNN algorithm.
△ Less
Submitted 29 May, 2020;
originally announced June 2020.
-
Realization of MIMO Channel Model for Spatial Diversity with Capacity and SNR Multiplexing Gains
Authors:
Subrato Bharati,
Prajoy Podder,
Niketa Gandhi,
Ajith Abraham
Abstract:
Multiple input multiple output (MIMO) system transmission is a popular diversity technique to improve the reliability of a communication system where transmitter, communication channel and receiver are the important elements. Data transmission reliability can be ensured when the bit error rate is very low. Normally, multiple antenna elements are used at both the transmitting and receiving section…
▽ More
Multiple input multiple output (MIMO) system transmission is a popular diversity technique to improve the reliability of a communication system where transmitter, communication channel and receiver are the important elements. Data transmission reliability can be ensured when the bit error rate is very low. Normally, multiple antenna elements are used at both the transmitting and receiving section in MIMO Systems. MIMO system utilizes antenna diversity or spatial diversity coding system in wireless channels because wireless channels severely suffer from multipath fading in which the transmitted signal is reflected along various multiple paths before reaching to the destination or receiving section.Parallel transmission of MIMO system has also been implemented where both the real part and imaginary part of the original, detected and the corresponding received data sequence has been described graphically. The MIMO channel average capacity is achieved more than 80% for dissimilar levels of impairments in transceiver when the value of kappa (Level of impairments in transmitter hardware) reduces from 0.02 to 0.005. The finite-SNR multiplexing gain (Proportion of MIMO system capacity to SISO system capacity) has been observed for deterministic and uncorrelated Rayleigh fading channels correspondingly. The core difference is in the high SNR level. It may occur for two reasons: (a) there is a quicker convergence to the limits under transceiver impairments (b) deterministic channels that are built on digital architectural plans or topographical maps of the propagation environment acquire an asymptotic gain superior than multiplexing gain when the number of transmitting antenna is greater than the number of receiving antenna.
△ Less
Submitted 24 April, 2020;
originally announced May 2020.
-
Diagnosis of Breast Cancer Based on Modern Mammography using Hybrid Transfer Learning
Authors:
Aditya Khamparia,
Subrato Bharati,
Prajoy Podder,
Deepak Gupta,
Ashish Khanna,
Thai Kim Phung,
Dang N. H. Thanh
Abstract:
Breast cancer is a common cancer for women. Early detection of breast cancer can considerably increase the survival rate of women. This paper mainly focuses on transfer learning process to detect breast cancer. Modified VGG (MVGG), residual network, mobile network is proposed and implemented in this paper. DDSM dataset is used in this paper. Experimental results show that our proposed hybrid trans…
▽ More
Breast cancer is a common cancer for women. Early detection of breast cancer can considerably increase the survival rate of women. This paper mainly focuses on transfer learning process to detect breast cancer. Modified VGG (MVGG), residual network, mobile network is proposed and implemented in this paper. DDSM dataset is used in this paper. Experimental results show that our proposed hybrid transfers learning model (Fusion of MVGG16 and ImageNet) provides an accuracy of 88.3% where the number of epoch is 15. On the other hand, only modified VGG 16 architecture (MVGG 16) provides an accuracy 80.8% and MobileNet provides an accuracy of 77.2%. So, it is clearly stated that the proposed hybrid pre-trained network outperforms well compared to single architecture. This architecture can be considered as an effective tool for the radiologists in order to reduce the false negative and false positive rate. Therefore, the efficiency of mammography analysis will be improved.
△ Less
Submitted 27 May, 2020; v1 submitted 23 March, 2020;
originally announced March 2020.
-
Hybrid Deep Learning for Detecting Lung Diseases from X-ray Images
Authors:
Subrato Bharati,
Prajoy Podder,
M. Rubaiyat Hossain Mondal
Abstract:
Lung disease is common throughout the world. These include chronic obstructive pulmonary disease, pneumonia, asthma, tuberculosis, fibrosis, etc. Timely diagnosis of lung disease is essential. Many image processing and machine learning models have been developed for this purpose. Different forms of existing deep learning techniques including convolutional neural network (CNN), vanilla neural netwo…
▽ More
Lung disease is common throughout the world. These include chronic obstructive pulmonary disease, pneumonia, asthma, tuberculosis, fibrosis, etc. Timely diagnosis of lung disease is essential. Many image processing and machine learning models have been developed for this purpose. Different forms of existing deep learning techniques including convolutional neural network (CNN), vanilla neural network, visual geometry group based neural network (VGG), and capsule network are applied for lung disease prediction.The basic CNN has poor performance for rotated, tilted, or other abnormal image orientation. Therefore, we propose a new hybrid deep learning framework by combining VGG, data augmentation and spatial transformer network (STN) with CNN. This new hybrid method is termed here as VGG Data STN with CNN (VDSNet). As implementation tools, Jupyter Notebook, Tensorflow, and Keras are used. The new model is applied to NIH chest X-ray image dataset collected from Kaggle repository. Full and sample versions of the dataset are considered. For both full and sample datasets, VDSNet outperforms existing methods in terms of a number of metrics including precision, recall, F0.5 score and validation accuracy. For the case of full dataset, VDSNet exhibits a validation accuracy of 73%, while vanilla gray, vanilla RGB, hybrid CNN and VGG, and modified capsule network have accuracy values of 67.8%, 69%, 69.5%, 60.5% and 63.8%, respectively. When sample dataset rather than full dataset is used, VDSNet requires much lower training time at the expense of a slightly lower validation accuracy. Hence, the proposed VDSNet framework will simplify the detection of lung disease for experts as well as for doctors.
△ Less
Submitted 1 July, 2020; v1 submitted 2 March, 2020;
originally announced March 2020.
-
Bit Error Rate Analysis of M-ARY PSK and M-ARY QAM Over Rician Fading Channel
Authors:
Subrato Bharati,
Mohammad Atikur Rahman,
Prajoy Podder,
Muhammad Ashiqul Islam,
Mohammad Hossain
Abstract:
This paper mainly illustrates the Bit error rate performance of M-ary QAM and M-ary PSK for different values of SNR over Rician Fading channel. A signal experiences multipath propagation in the wireless communication system which causes expeditious signal amplitude fluctuations in time, is defined as fading. Rician Fading is a small signal fading. Rician fading is a hypothetical model for radio pr…
▽ More
This paper mainly illustrates the Bit error rate performance of M-ary QAM and M-ary PSK for different values of SNR over Rician Fading channel. A signal experiences multipath propagation in the wireless communication system which causes expeditious signal amplitude fluctuations in time, is defined as fading. Rician Fading is a small signal fading. Rician fading is a hypothetical model for radio propagation inconsistency produced by fractional cancellation of a radio signal by itself and as a result the signal reaches in the receiver by several different paths. In this case, at least one of the destination paths is being lengthened or shortened. From this paper , it can be observed that the value of Bit error rate decreases when signal to noise ratio increases in decibel for Mary QAM and M-ary PSK such as 256 QAM, 64 PSK etc. Constellation diagrams of M-QAM and M-PSK have also been showed in this paper using MATLAB Simulation. The falling of Bit error rate with the increase of diversity order for a fixed value of SNR has also been included in this paper. Diversity is a influential receiver system which offers improvement over received signal strength.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.
-
Implementation of ASK, FSK and PSK with BER vs. SNR comparison over AWGN channel
Authors:
Subrato Bharati,
Mohammad Atikur Rahman,
Prajoy Podder
Abstract:
This paper mainly discusses about three basic digital modulation process ASK, FSK, PSK. These modulation schemes can be characterized by their transmitted symbols which consist of a discrete set of values occurring at gradually spaced intervals. The selection of a digital modulation technique for a specific application depend not only the bandwidth efficiency and implementation complexity but also…
▽ More
This paper mainly discusses about three basic digital modulation process ASK, FSK, PSK. These modulation schemes can be characterized by their transmitted symbols which consist of a discrete set of values occurring at gradually spaced intervals. The selection of a digital modulation technique for a specific application depend not only the bandwidth efficiency and implementation complexity but also error rate occurred in a bit (BER) and signal to noise ratio. Binary modulation methods use two level symbols and are facile to implement, provide good error substantiation. BER is a key parameter that used for assessing systems that transmit signal data from one location to another. SNR is well known measure of how the signal and noise power compare against each other. It directly affects the probability of error performance of a system. In this paper, we have implemented ASK, FSK and PSK using MATLAB. Cosine signal has been used as a carrier wave. In this paper, a comparative exploration of BER performance of ASK, FSK and PSK for channel utilization is proposed and the investigation are carried out with SNR over AWGN channel as the reference factor.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.