-
Surgical tool classification and localization: results and methods from the MICCAI 2022 SurgToolLoc challenge
Authors:
Aneeq Zia,
Kiran Bhattacharyya,
Xi Liu,
Max Berniker,
Ziheng Wang,
Rogerio Nespolo,
Satoshi Kondo,
Satoshi Kasai,
Kousuke Hirasawa,
Bo Liu,
David Austin,
Yiheng Wang,
Michal Futrega,
Jean-Francois Puget,
Zhenqiang Li,
Yoichi Sato,
Ryo Fujii,
Ryo Hachiuma,
Mana Masuda,
Hideo Saito,
An Wang,
Mengya Xu,
Mobarakol Islam,
Long Bai,
Winnie Pang
, et al. (46 additional authors not shown)
Abstract:
The ability to automatically detect and track surgical instruments in endoscopic videos can enable transformational interventions. Assessing surgical performance and efficiency, identifying skilled tool use and choreography, and planning operational and logistical aspects of OR resources are just a few of the applications that could benefit. Unfortunately, obtaining the annotations needed to train…
▽ More
The ability to automatically detect and track surgical instruments in endoscopic videos can enable transformational interventions. Assessing surgical performance and efficiency, identifying skilled tool use and choreography, and planning operational and logistical aspects of OR resources are just a few of the applications that could benefit. Unfortunately, obtaining the annotations needed to train machine learning models to identify and localize surgical tools is a difficult task. Annotating bounding boxes frame-by-frame is tedious and time-consuming, yet large amounts of data with a wide variety of surgical tools and surgeries must be captured for robust training. Moreover, ongoing annotator training is needed to stay up to date with surgical instrument innovation. In robotic-assisted surgery, however, potentially informative data like timestamps of instrument installation and removal can be programmatically harvested. The ability to rely on tool installation data alone would significantly reduce the workload to train robust tool-tracking models. With this motivation in mind we invited the surgical data science community to participate in the challenge, SurgToolLoc 2022. The goal was to leverage tool presence data as weak labels for machine learning models trained to detect tools and localize them in video frames with bounding boxes. We present the results of this challenge along with many of the team's efforts. We conclude by discussing these results in the broader context of machine learning and surgical data science. The training data used for this challenge consisting of 24,695 video clips with tool presence labels is also being released publicly and can be accessed at https://console.cloud.google.com/storage/browser/isi-surgtoolloc-2022.
△ Less
Submitted 31 May, 2023; v1 submitted 11 May, 2023;
originally announced May 2023.
-
Objective Surgical Skills Assessment and Tool Localization: Results from the MICCAI 2021 SimSurgSkill Challenge
Authors:
Aneeq Zia,
Kiran Bhattacharyya,
Xi Liu,
Ziheng Wang,
Max Berniker,
Satoshi Kondo,
Emanuele Colleoni,
Dimitris Psychogyios,
Yueming **,
**fan Zhou,
Evangelos Mazomenos,
Lena Maier-Hein,
Danail Stoyanov,
Stefanie Speidel,
Anthony Jarc
Abstract:
Timely and effective feedback within surgical training plays a critical role in develo** the skills required to perform safe and efficient surgery. Feedback from expert surgeons, while especially valuable in this regard, is challenging to acquire due to their typically busy schedules, and may be subject to biases. Formal assessment procedures like OSATS and GEARS attempt to provide objective mea…
▽ More
Timely and effective feedback within surgical training plays a critical role in develo** the skills required to perform safe and efficient surgery. Feedback from expert surgeons, while especially valuable in this regard, is challenging to acquire due to their typically busy schedules, and may be subject to biases. Formal assessment procedures like OSATS and GEARS attempt to provide objective measures of skill, but remain time-consuming. With advances in machine learning there is an opportunity for fast and objective automated feedback on technical skills. The SimSurgSkill 2021 challenge (hosted as a sub-challenge of EndoVis at MICCAI 2021) aimed to promote and foster work in this endeavor. Using virtual reality (VR) surgical tasks, competitors were tasked with localizing instruments and predicting surgical skill. Here we summarize the winning approaches and how they performed. Using this publicly available dataset and results as a springboard, future work may enable more efficient training of surgeons with advances in surgical data science. The dataset can be accessed from https://console.cloud.google.com/storage/browser/isi-simsurgskill-2021.
△ Less
Submitted 8 December, 2022;
originally announced December 2022.
-
Multispectral Satellite Data Classification using Soft Computing Approach
Authors:
Purbarag Pathak Choudhury,
Ujjal Kr Dutta,
Dhruba Kr Bhattacharyya
Abstract:
A satellite image is a remotely sensed image data, where each pixel represents a specific location on earth. The pixel value recorded is the reflection radiation from the earth's surface at that location. Multispectral images are those that capture image data at specific frequencies across the electromagnetic spectrum as compared to Panchromatic images which are sensitive to all wavelength of visi…
▽ More
A satellite image is a remotely sensed image data, where each pixel represents a specific location on earth. The pixel value recorded is the reflection radiation from the earth's surface at that location. Multispectral images are those that capture image data at specific frequencies across the electromagnetic spectrum as compared to Panchromatic images which are sensitive to all wavelength of visible light. Because of the high resolution and high dimensions of these images, they create difficulties for clustering techniques to efficiently detect clusters of different sizes, shapes and densities as a trade off for fast processing time. In this paper we propose a grid-density based clustering technique for identification of objects. We also introduce an approach to classify a satellite image data using a rule induction based machine learning algorithm. The object identification and classification methods have been validated using several synthetic and benchmark datasets.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Surgical Visual Domain Adaptation: Results from the MICCAI 2020 SurgVisDom Challenge
Authors:
Aneeq Zia,
Kiran Bhattacharyya,
Xi Liu,
Ziheng Wang,
Satoshi Kondo,
Emanuele Colleoni,
Beatrice van Amsterdam,
Razeen Hussain,
Raabid Hussain,
Lena Maier-Hein,
Danail Stoyanov,
Stefanie Speidel,
Anthony Jarc
Abstract:
Surgical data science is revolutionizing minimally invasive surgery by enabling context-aware applications. However, many challenges exist around surgical data (and health data, more generally) needed to develop context-aware models. This work - presented as part of the Endoscopic Vision (EndoVis) challenge at the Medical Image Computing and Computer Assisted Intervention (MICCAI) 2020 conference…
▽ More
Surgical data science is revolutionizing minimally invasive surgery by enabling context-aware applications. However, many challenges exist around surgical data (and health data, more generally) needed to develop context-aware models. This work - presented as part of the Endoscopic Vision (EndoVis) challenge at the Medical Image Computing and Computer Assisted Intervention (MICCAI) 2020 conference - seeks to explore the potential for visual domain adaptation in surgery to overcome data privacy concerns. In particular, we propose to use video from virtual reality (VR) simulations of surgical exercises in robotic-assisted surgery to develop algorithms to recognize tasks in a clinical-like setting. We present the performance of the different approaches to solve visual domain adaptation developed by challenge participants. Our analysis shows that the presented models were unable to learn meaningful motion based features form VR data alone, but did significantly better when small amount of clinical-like data was also made available. Based on these results, we discuss promising methods and further work to address the problem of visual domain adaptation in surgical data science. We also release the challenge dataset publicly at https://www.synapse.org/surgvisdom2020.
△ Less
Submitted 26 February, 2021;
originally announced February 2021.
-
Plagiarism: Taxonomy, Tools and Detection Techniques
Authors:
Hussain A Chowdhury,
Dhruba K Bhattacharyya
Abstract:
To detect plagiarism of any form, it is essential to have broad knowledge of its possible forms and classes, and existence of various tools and systems for its detection. Based on impact or severity of damages, plagiarism may occur in an article or in any production in a number of ways. This survey presents a taxonomy of various plagiarism forms and include discussion on each of these forms. Over…
▽ More
To detect plagiarism of any form, it is essential to have broad knowledge of its possible forms and classes, and existence of various tools and systems for its detection. Based on impact or severity of damages, plagiarism may occur in an article or in any production in a number of ways. This survey presents a taxonomy of various plagiarism forms and include discussion on each of these forms. Over the years, a good number tools and techniques have been introduced to detect plagiarism. This paper highlights few promising methods for plagiarism detection based on machine learning techniques. We analyse the pros and cons of these methods and finally we highlight a list of issues and research challenges related to this evolving research problem.
△ Less
Submitted 19 January, 2018;
originally announced January 2018.
-
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
Authors:
Rup Kumar Deka,
Dhruba Kumar Bhattacharyya,
Jugal Kumar Kalita
Abstract:
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several promin…
▽ More
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several prominent approaches introduced to counter DDoS attacks in private clouds. We also discuss issues and challenges to mitigate DDoS attacks in private clouds.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.
-
Big Data Analytics in Bioinformatics: A Machine Learning Perspective
Authors:
Hirak Kashyap,
Hasin Afzal Ahmed,
Nazrul Hoque,
Swarup Roy,
Dhruba Kumar Bhattacharyya
Abstract:
Bioinformatics research is characterized by voluminous and incremental datasets and complex data analytics methods. The machine learning methods used in bioinformatics are iterative and parallel. These methods can be scaled to handle big data using the distributed and parallel computing technologies.
Usually big data tools perform computation in batch-mode and are not optimized for iterative pro…
▽ More
Bioinformatics research is characterized by voluminous and incremental datasets and complex data analytics methods. The machine learning methods used in bioinformatics are iterative and parallel. These methods can be scaled to handle big data using the distributed and parallel computing technologies.
Usually big data tools perform computation in batch-mode and are not optimized for iterative processing and high data dependency among operations. In the recent years, parallel, incremental, and multi-view machine learning algorithms have been proposed. Similarly, graph-based architectures and in-memory big data tools have been developed to minimize I/O cost and optimize iterative processing.
However, there lack standard big data architectures and tools for many important bioinformatics problems, such as fast construction of co-expression and regulatory networks and salient module identification, detection of complexes over growing protein-protein interaction data, fast analysis of massive DNA, RNA, and protein sequence data, and fast querying on incremental and heterogeneous disease networks. This paper addresses the issues and challenges posed by several big data problems in bioinformatics, and gives an overview of the state of the art and the future research opportunities.
△ Less
Submitted 15 June, 2015;
originally announced June 2015.
-
Microelectromechanical Resonators for Radio Frequency Communication Applications
Authors:
Joydeep Basu,
Tarun Kanti Bhattacharyya
Abstract:
Over the past few years, microelectromechanical system (MEMS) based on-chip resonators have shown significant potential for sensing and high frequency signal processing applications. This is due to their excellent features like small size, large frequency-quality factor product, low power consumption, low cost batch fabrication, and integrability with CMOS IC technology. Radio frequency communicat…
▽ More
Over the past few years, microelectromechanical system (MEMS) based on-chip resonators have shown significant potential for sensing and high frequency signal processing applications. This is due to their excellent features like small size, large frequency-quality factor product, low power consumption, low cost batch fabrication, and integrability with CMOS IC technology. Radio frequency communication circuits like reference oscillators, filters, and mixers based on such MEMS resonators can be utilized for meeting the increasing count of RF components likely to be demanded by the next generation multi-band/multi-mode wireless devices. MEMS resonators can provide a feasible alternative to the present day well established quartz crystal technology that is riddled with major drawbacks like relatively large size, high cost, and low compatibility with IC chips. This article presents a survey of the developments in this field of resonant MEMS structures with detailed enumeration on the various micromechanical resonator types, modes of vibration, equivalent mechanical and electrical models, materials and technologies used for fabrication, and the application of the resonators for implementing oscillators and filters. These are followed by a discussion on the challenges for RF MEMS technology in comparison to quartz crystal technology; like high precision, stability, reliability, need for hermetic packaging etc. which remain to be addressed for enabling the inclusion of micromechanical resonators into tomorrow's highly integrated communication systems.
△ Less
Submitted 13 January, 2013;
originally announced January 2013.
-
An Effective Method for Fingerprint Classification
Authors:
Monowar H. Bhuyan,
Sarat Saharia,
Dhruba Kr Bhattacharyya
Abstract:
This paper presents an effective method for fingerprint classification using data mining approach. Initially, it generates a numeric code sequence for each fingerprint image based on the ridge flow patterns. Then for each class, a seed is selected by using a frequent itemsets generation technique. These seeds are subsequently used for clustering the fingerprint images. The proposed method was test…
▽ More
This paper presents an effective method for fingerprint classification using data mining approach. Initially, it generates a numeric code sequence for each fingerprint image based on the ridge flow patterns. Then for each class, a seed is selected by using a frequent itemsets generation technique. These seeds are subsequently used for clustering the fingerprint images. The proposed method was tested and evaluated in terms of several real-life datasets and a significant improvement in reducing the misclassification errors has been noticed in comparison to its other counterparts.
△ Less
Submitted 19 November, 2012;
originally announced November 2012.
-
An Effective Fingerprint Classification and Search Method
Authors:
Monowar H. Bhuyan,
D. K. Bhattacharyya
Abstract:
This paper presents an effective fingerprint classification method designed based on a hierarchical agglomerative clustering technique. The performance of the technique was evaluated in terms of several real-life datasets and a significant improvement in reducing the misclassification error has been noticed. This paper also presents a query based faster fingerprint search method over the clustered…
▽ More
This paper presents an effective fingerprint classification method designed based on a hierarchical agglomerative clustering technique. The performance of the technique was evaluated in terms of several real-life datasets and a significant improvement in reducing the misclassification error has been noticed. This paper also presents a query based faster fingerprint search method over the clustered fingerprint databases. The retrieval accuracy of the search method has been found effective in light of several real-life databases.
△ Less
Submitted 19 November, 2012;
originally announced November 2012.
-
Survey on Incremental Approaches for Network Anomaly Detection
Authors:
Monowar H. Bhuyan,
D. K. Bhattacharyya,
J. K. Kalita
Abstract:
As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs).…
▽ More
As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs). However, most IDSs lack the capability to detect novel or previously unknown attacks. A special type of IDSs, called Anomaly Detection Systems, develop models based on normal system or network behavior, with the goal of detecting both known and unknown attacks. Anomaly detection systems face many problems including high rate of false alarm, ability to work in online mode, and scalability. This paper presents a selective survey of incremental approaches for detecting anomaly in normal system or network traffic. The technological trends, open problems, and challenges over anomaly detection using incremental approach are also discussed.
△ Less
Submitted 19 November, 2012; v1 submitted 19 November, 2012;
originally announced November 2012.
-
Microelectromechanical system cantilever-based frequency doublers
Authors:
Joydeep Basu,
Tarun K. Bhattacharyya
Abstract:
Microelectromechanical system (MEMS) based on-chip resonators offer great potential for high frequency signal processing circuits like reference oscillators and filters. This is due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption, low cost batch fabrication etc. A capacitively transduced cantilever beam reson…
▽ More
Microelectromechanical system (MEMS) based on-chip resonators offer great potential for high frequency signal processing circuits like reference oscillators and filters. This is due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption, low cost batch fabrication etc. A capacitively transduced cantilever beam resonator is one such popular MEMS resonator topology. In this letter, the inherent square-law nonlinearity of the voltage-to-force transfer function of a cantilever resonator's capacitive transducer has been employed for the realization of frequency doubling effect. Using this concept, frequency doubling of input signals of 500 kHz to 1 MHz, and 227.5 kHz to 455 kHz has been experimentally demonstrated for two cantilever beams of length 51.75 and 76.75 micrometer respectively. The MEMS cantilevers have been fabricated with polysilicon using the PolyMUMPs surface micromachining process, and their testing has been performed using Laser Doppler Vibrometry. The test results obtained are in reasonable compliance with the analytical and CoventorWare finite-element simulation results. The high efficiency demonstrated by the cantilever frequency doubler makes it a promising choice for signal generation at high frequencies.
△ Less
Submitted 12 October, 2012;
originally announced October 2012.
-
Design and Fabrication of Micromachined Resonators
Authors:
Ritesh Ray Chaudhuri,
Joydeep Basu,
Tarun Kanti Bhattacharyya
Abstract:
Microelectromechanical system (MEMS) based on-chip resonators offer great potential for sensing and high frequency signal processing applications due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption etc. This work is mainly aimed at the design, modeling, simulation, and fabrication of micromachined polysilicon…
▽ More
Microelectromechanical system (MEMS) based on-chip resonators offer great potential for sensing and high frequency signal processing applications due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption etc. This work is mainly aimed at the design, modeling, simulation, and fabrication of micromachined polysilicon disk resonators exhibiting radial-contour mode vibrations. A few other bulk mode modified resonator geometries are also being explored. The resonator structures have been designed and simulated in CoventorWare finite-element platform and fabricated by the PolyMUMPs surface micromachining process.
△ Less
Submitted 14 February, 2012;
originally announced February 2012.
-
A Comparative Study Between a Micromechanical Cantilever Resonator and MEMS-based Passives for Band-pass Filtering Application
Authors:
J. Basu,
A. Bhattacharya,
S. Chakraborty,
T. K. Bhattacharyya
Abstract:
Over the past few years, significant growth has been observed in using MEMS based passive components in the RF microelectronics domain, especially in transceiver components. This is due to some excellent properties of the MEMS devices like low loss, excellent isolation etc. in the microwave frequency domain where the on-chip passives normally tend to become leakier and degrades the transceiver per…
▽ More
Over the past few years, significant growth has been observed in using MEMS based passive components in the RF microelectronics domain, especially in transceiver components. This is due to some excellent properties of the MEMS devices like low loss, excellent isolation etc. in the microwave frequency domain where the on-chip passives normally tend to become leakier and degrades the transceiver performance. This paper presents a comparative analysis between MEMS-resonator based and MEMS-passives based band-pass filter configurations for RF applications, along with their design, simulation, fabrication and characterization. The filters were designed to have a center frequency of 455 kHz, meant for use as the intermediate frequency (IF) filter in superheterodyne receivers. The filter structures have been fabricated in PolyMUMPs process, a three-polysilicon layer surface micromachining process.
△ Less
Submitted 9 June, 2011;
originally announced June 2011.
-
An Effective Fingerprint Verification Technique
Authors:
Minakshi Gogoi,
D K Bhattacharyya
Abstract:
This paper presents an effective method for fingerprint verification based on a data mining technique called minutiae clustering and a graph-theoretic approach to analyze the process of fingerprint comparison to give a feature space representation of minutiae and to produce a lower bound on the number of detectably distinct fingerprints. The method also proving the invariance of each individual fi…
▽ More
This paper presents an effective method for fingerprint verification based on a data mining technique called minutiae clustering and a graph-theoretic approach to analyze the process of fingerprint comparison to give a feature space representation of minutiae and to produce a lower bound on the number of detectably distinct fingerprints. The method also proving the invariance of each individual fingerprint by using both the topological behavior of the minutiae graph and also using a distance measure called Hausdorff distance.The method provides a graph based index generation mechanism of fingerprint biometric data. The self-organizing map neural network is also used for classifying the fingerprints.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
ANN-based Innovative Segmentation Method for Handwritten text in Assamese
Authors:
Kaustubh Bhattacharyya,
Kandarpa Kumar Sarma
Abstract:
Artificial Neural Network (ANN) s has widely been used for recognition of optically scanned character, which partially emulates human thinking in the domain of the Artificial Intelligence. But prior to recognition, it is necessary to segment the character from the text to sentences, words etc. Segmentation of words into individual letters has been one of the major problems in handwriting recogni…
▽ More
Artificial Neural Network (ANN) s has widely been used for recognition of optically scanned character, which partially emulates human thinking in the domain of the Artificial Intelligence. But prior to recognition, it is necessary to segment the character from the text to sentences, words etc. Segmentation of words into individual letters has been one of the major problems in handwriting recognition. Despite several successful works all over the work, development of such tools in specific languages is still an ongoing process especially in the Indian context. This work explores the application of ANN as an aid to segmentation of handwritten characters in Assamese- an important language in the North Eastern part of India. The work explores the performance difference obtained in applying an ANN-based dynamic segmentation algorithm compared to projection- based static segmentation. The algorithm involves, first training of an ANN with individual handwritten characters recorded from different individuals. Handwritten sentences are separated out from text using a static segmentation method. From the segmented line, individual characters are separated out by first over segmenting the entire line. Each of the segments thus obtained, next, is fed to the trained ANN. The point of segmentation at which the ANN recognizes a segment or a combination of several segments to be similar to a handwritten character, a segmentation boundary for the character is assumed to exist and segmentation performed. The segmented character is next compared to the best available match and the segmentation boundary confirmed.
△ Less
Submitted 4 November, 2009;
originally announced November 2009.