Exploring the potential to use low cost imaging and an open source convoluted neural network detector to support stock assessment of the king scallop (Pecten maximus)

2021 ◽  
pp. 101233
Author(s):  
Katja Ovchinnikova ◽  
Mark A. James ◽  
Tania Mendo ◽  
Matthew Dawkins ◽  
Jon Crall ◽  
...  
2022 ◽  
Vol 31 (1) ◽  
pp. 1-27
Author(s):  
Yaqin Zhou ◽  
Jing Kai Siow ◽  
Chenyu Wang ◽  
Shangqing Liu ◽  
Yang Liu

Security patches in open source software, providing security fixes to identified vulnerabilities, are crucial in protecting against cyber attacks. Security advisories and announcements are often publicly released to inform the users about potential security vulnerability. Despite the National Vulnerability Database (NVD) publishes identified vulnerabilities, a vast majority of vulnerabilities and their corresponding security patches remain beyond public exposure, e.g., in the open source libraries that are heavily relied on by developers. As many of these patches exist in open sourced projects, the problem of curating and gathering security patches can be difficult due to their hidden nature. An extensive and complete security patches dataset could help end-users such as security companies, e.g., building a security knowledge base, or researcher, e.g., aiding in vulnerability research. To efficiently curate security patches including undisclosed patches at large scale and low cost, we propose a deep neural-network-based approach built upon commits of open source repositories. First, we design and build security patch datasets that include 38,291 security-related commits and 1,045 Common Vulnerabilities and Exposures (CVE) patches from four large-scale C programming language libraries. We manually verify each commit, among the 38,291 security-related commits, to determine if they are security related. We devise and implement a deep learning-based security patch identification system that consists of two composite neural networks: one commit-message neural network that utilizes pretrained word representations learned from our commits dataset and one code-revision neural network that takes code before revision and after revision and learns the distinction on the statement level. Our system leverages the power of the two networks for Security Patch Identification. Evaluation results show that our system significantly outperforms SVM and K-fold stacking algorithms. The result on the combined dataset achieves as high as 87.93% F1-score and precision of 86.24%. We deployed our pipeline and learned model in an industrial production environment to evaluate the generalization ability of our approach. The industrial dataset consists of 298,917 commits from 410 new libraries that range from a wide functionalities. Our experiment results and observation on the industrial dataset proved that our approach can identify security patches effectively among open sourced projects.


2019 ◽  
Vol 9 (10) ◽  
pp. 2010 ◽  
Author(s):  
Ning Yu ◽  
Kyle Darling

CAPTCHA authentication has been challenged by recent technology advances in AI. However, many of the AI advances challenging CAPTCHA are either restricted by a limited amount of labeled CAPTCHA data or are constructed in an expensive or complicated way. In contrast, this paper illustrates a low-cost approach that takes advantage of the nature of open source libraries for an AI-based chosen-plaintext attack. The chosen-plaintext attack described here relies on a deep learning model created and trained on a simple personal computer in a low-cost way. It shows an efficient cracking rate over two open-source Python CAPTCHA Libraries, Claptcha and Captcha. This chosen-plaintext attack method has raised a potential security alert in the era of AI, particularly to small-business owners who use the open-source CAPTCHA libraries. The main contributions of this project include: (1) it is the first low-cost method based on chosen-plaintext attack by using the nature of open-source Python CAPTCHA libraries; (2) it is a novel way to combine TensorFlow object detection and our proposed peak segmentation algorithm with convolutional neural network to improve the recognition accuracy.


2020 ◽  
Vol 52 ◽  
pp. 55-61
Author(s):  
Ettore Potente ◽  
Cosimo Cagnazzo ◽  
Alessandro Deodati ◽  
Giuseppe Mastronuzzi

2018 ◽  
Author(s):  
Rizki Eka Putri ◽  
Denny Darlis

This article was under review for ICELTICS 2018 -- In the medical world there is still service dissatisfaction caused by lack of blood type testing facility. If the number of tested blood arise, a lot of problems will occur so that electronic devices are needed to determine the blood type accurately and in short time. In this research we implemented an Artificial Neural Network on Xilinx Spartan 3S1000 Field Programable Gate Array using XSA-3S Board to identify the blood type. This research uses blood sample image as system input. VHSIC Hardware Discription Language is the language to describe the algorithm. The algorithm used is feed-forward propagation of backpropagation neural network. There are 3 layers used in design, they are input, hidden1, and output. At hidden1layer has two neurons. In this study the accuracy of detection obtained are 92%, 92%, 92%, 90% and 86% for 32x32, 48x48, 64x64, 80x80, and 96x96 pixel blood image resolution, respectively.


2019 ◽  
Vol 17 (1) ◽  
pp. 69-76
Author(s):  
Mohammad Shiddiq Ghozali

Perkembangan Teknologi Informasi dan Komunikasi begitu pesat di zaman sekarang ini. Diikuti pula dengan perkembangan di bidang Artificial Intelligence (AI) atau Kecerdasan Buatan. Di Indonesia sendiri masih belum begitu populer dikalangan masyarakat akan tetapi perusahaan-perusahaan IT berlomba-lomba menciptakan inovasi dibidang Kecerdasan Buatan dan penerapan Kecerdasan Buatan disegala aspek kehidupan. Contoh kasus di Automated Teller Machine (ATM), seringkali terjadi kejahatan di ATM seperti pengintaian nomor pin, skimming, lebanese loop dan kejahatan lainnya. Walaupun di ATM sudah terdapat CCTV akan tetapi penjahat menggunakan alat bantu untuk menutupi wajahnya seperti helm, topi, masker dan kacamata hitam. Biasanya didepan pintu masuk ATM terpampang larangan untuk tidak menggunakan helm, topi, masker dan kacamata hitam serta tidak membawa rokok. Akan tetapi larangan itu masih tetap ada yang melanggar, dikarenakan tidak ada tindak lanjut ketika seseorang menggunakan benda-benda yang dilarang dibawa kedalam ATM. Oleh karena itu penulis membuat sistem pendeteksi obyek di bidang Kecerdasan Buatan untuk mendeteksi benda-benda yang dilarang digunakan ketika berada di ATM. Salah satu metode yang digunakan untuk menciptakan Object Detection yaitu You Only Look Once (YOLO). Implementasi ide ini tersedia pada DARKNET (open source neural network). Cara kerja YOLO yaitu dengan melihat seluruh gambar sekali, kemudian melewati jaringan saraf sekali langsung mendeteksi object yang ada. Oleh karena itu disebut You Only Look Once (YOLO). Pada penelitian ini, penulis membuat sistem yang masih dalam bentuk pengembangan, sehingga menjalankannya masih menggunakan command prompt. Keywords : Automated Teller Machine (ATM), Kecerdasan Buatan, Pendeteksi Obyek, You Only Look Once (YOLO)  


2020 ◽  
Author(s):  
Andrew Fang ◽  
Jonathan Kia-Sheng Phua ◽  
Terrence Chiew ◽  
Daniel De-Liang Loh ◽  
Lincoln Ming Han Liow ◽  
...  

BACKGROUND During the Coronavirus Disease 2019 (COVID-19) outbreak, community care facilities (CCF) were set up as temporary out-of-hospital isolation facilities to contain the surge of cases in Singapore. Confined living spaces within CCFs posed an increased risk of communicable disease spread among residents. OBJECTIVE This inspired our healthcare team managing a CCF operation to design a low-cost communicable disease outbreak surveillance system (CDOSS). METHODS Our CDOSS was designed with the following considerations: (1) comprehensiveness, (2) efficiency through passive reconnoitering from electronic medical record (EMR) data, (3) ability to provide spatiotemporal insights, (4) low-cost and (5) ease of use. We used Python to develop a lightweight application – Python-based Communicable Disease Outbreak Surveillance System (PyDOSS) – that was able perform syndromic surveillance and fever monitoring. With minimal user actions, its data pipeline would generate daily control charts and geospatial heat maps of cases from raw EMR data and logged vital signs. PyDOSS was successfully implemented as part of our CCF workflow. We also simulated a gastroenteritis (GE) outbreak to test the effectiveness of the system. RESULTS PyDOSS was used throughout the entire duration of operation; the output was reviewed daily by senior management. No disease outbreaks were identified during our medical operation. In the simulated GE outbreak, PyDOSS was able to effectively detect an outbreak within 24 hours and provided information about cluster progression which could aid in contact tracing. The code for a stock version of PyDOSS has been made publicly available. CONCLUSIONS PyDOSS is an effective surveillance system which was successfully implemented in a real-life medical operation. With the system developed using open-source technology and the code made freely available, it significantly reduces the cost of developing and operating CDOSS and may be useful for similar temporary medical operations, or in resource-limited settings.


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1715
Author(s):  
Michele Alessandrini ◽  
Giorgio Biagetti ◽  
Paolo Crippa ◽  
Laura Falaschetti ◽  
Claudio Turchetti

Photoplethysmography (PPG) is a common and practical technique to detect human activity and other physiological parameters and is commonly implemented in wearable devices. However, the PPG signal is often severely corrupted by motion artifacts. The aim of this paper is to address the human activity recognition (HAR) task directly on the device, implementing a recurrent neural network (RNN) in a low cost, low power microcontroller, ensuring the required performance in terms of accuracy and low complexity. To reach this goal, (i) we first develop an RNN, which integrates PPG and tri-axial accelerometer data, where these data can be used to compensate motion artifacts in PPG in order to accurately detect human activity; (ii) then, we port the RNN to an embedded device, Cloud-JAM L4, based on an STM32 microcontroller, optimizing it to maintain an accuracy of over 95% while requiring modest computational power and memory resources. The experimental results show that such a system can be effectively implemented on a constrained-resource system, allowing the design of a fully autonomous wearable embedded system for human activity recognition and logging.


2021 ◽  
Vol 7 (2) ◽  
pp. 356-362
Author(s):  
Harry Coppock ◽  
Alex Gaskell ◽  
Panagiotis Tzirakis ◽  
Alice Baird ◽  
Lyn Jones ◽  
...  

BackgroundSince the emergence of COVID-19 in December 2019, multidisciplinary research teams have wrestled with how best to control the pandemic in light of its considerable physical, psychological and economic damage. Mass testing has been advocated as a potential remedy; however, mass testing using physical tests is a costly and hard-to-scale solution.MethodsThis study demonstrates the feasibility of an alternative form of COVID-19 detection, harnessing digital technology through the use of audio biomarkers and deep learning. Specifically, we show that a deep neural network based model can be trained to detect symptomatic and asymptomatic COVID-19 cases using breath and cough audio recordings.ResultsOur model, a custom convolutional neural network, demonstrates strong empirical performance on a data set consisting of 355 crowdsourced participants, achieving an area under the curve of the receiver operating characteristics of 0.846 on the task of COVID-19 classification.ConclusionThis study offers a proof of concept for diagnosing COVID-19 using cough and breath audio signals and motivates a comprehensive follow-up research study on a wider data sample, given the evident advantages of a low-cost, highly scalable digital COVID-19 diagnostic tool.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2944
Author(s):  
Benjamin James Ralph ◽  
Marcel Sorger ◽  
Benjamin Schödinger ◽  
Hans-Jörg Schmölzer ◽  
Karin Hartl ◽  
...  

Smart factories are an integral element of the manufacturing infrastructure in the context of the fourth industrial revolution. Nevertheless, there is frequently a deficiency of adequate training facilities for future engineering experts in the academic environment. For this reason, this paper describes the development and implementation of two different layer architectures for the metal processing environment. The first architecture is based on low-cost but resilient devices, allowing interested parties to work with mostly open-source interfaces and standard back-end programming environments. Additionally, one proprietary and two open-source graphical user interfaces (GUIs) were developed. Those interfaces can be adapted front-end as well as back-end, ensuring a holistic comprehension of their capabilities and limits. As a result, a six-layer architecture, from digitization to an interactive project management tool, was designed and implemented in the practical workflow at the academic institution. To take the complexity of thermo-mechanical processing in the metal processing field into account, an alternative layer, connected with the thermo-mechanical treatment simulator Gleeble 3800, was designed. This framework is capable of transferring sensor data with high frequency, enabling data collection for the numerical simulation of complex material behavior under high temperature processing. Finally, the possibility of connecting both systems by using open-source software packages is demonstrated.


Sign in / Sign up

Export Citation Format

Share Document