scholarly journals A machine learning approach to automatic detection of irregularity in skin lesion border using dermoscopic images

2020 ◽  
Vol 6 ◽  
pp. e268 ◽  
Author(s):  
Abder-Rahman Ali ◽  
Jingpeng Li ◽  
Guang Yang ◽  
Sally Jane O’Shea

Skin lesion border irregularity is considered an important clinical feature for the early diagnosis of melanoma, representing the B feature in the ABCD rule. In this article we propose an automated approach for skin lesion border irregularity detection. The approach involves extracting the skin lesion from the image, detecting the skin lesion border, measuring the border irregularity, training a Convolutional Neural Network and Gaussian naive Bayes ensemble, to the automatic detection of border irregularity, which results in an objective decision on whether the skin lesion border is considered regular or irregular. The approach achieves outstanding results, obtaining an accuracy, sensitivity, specificity, and F-score of 93.6%, 100%, 92.5% and 96.1%, respectively.

2019 ◽  
Vol 112 (3) ◽  
pp. e272-e273 ◽  
Author(s):  
Pietro Bortoletto ◽  
Manoj Kumar Kanakasabapathy ◽  
Prudhvi Thirumalaraju ◽  
Raghav Gupta ◽  
Rohan Pooniwala ◽  
...  

Geophysics ◽  
2021 ◽  
pp. 1-48
Author(s):  
Jan-Willem Vrolijk ◽  
Gerrit Blacquiere

It is well known that source deghosting can best be applied to common-receiver gathers, while receiver deghosting can best be applied to common-shot records. The source-ghost wavefield observed in the common-shot domain contains the imprint of the subsurface, which complicates source deghosting in common-shot domain, in particular when the subsurface is complex. Unfortunately, the alternative, i.e., the common-receiver domain, is often coarsely sampled, which complicates source deghosting in this domain as well. To solve the latter issue, we propose to train a convolutional neural network to apply source deghosting in this domain. We subsample all shot records with and without the receiver ghost wavefield to obtain the training data. Due to reciprocity this training data is a representative data set for source deghosting in the coarse common-receiver domain. We validate the machine-learning approach on simulated data and on field data. The machine learning approach gives a significant uplift to the simulated data compared to conventional source deghosting. The field-data results confirm that the proposed machine-learning approach is able to remove the source-ghost wavefield from the coarsely-sampled common-receiver gathers.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Idris Kharroubi ◽  
Thomas Lim ◽  
Xavier Warin

AbstractWe study the approximation of backward stochastic differential equations (BSDEs for short) with a constraint on the gains process. We first discretize the constraint by applying a so-called facelift operator at times of a grid. We show that this discretely constrained BSDE converges to the continuously constrained one as the mesh grid converges to zero. We then focus on the approximation of the discretely constrained BSDE. For that we adopt a machine learning approach. We show that the facelift can be approximated by an optimization problem over a class of neural networks under constraints on the neural network and its derivative. We then derive an algorithm converging to the discretely constrained BSDE as the number of neurons goes to infinity. We end by numerical experiments.


2019 ◽  
Vol 47 (1) ◽  
pp. 216-248
Author(s):  
Annelen Brunner

Abstract This contribution presents a quantitative approach to speech, thought and writing representation (ST&WR) and steps towards its automatic detection. Automatic detection is necessary for studying ST&WR in a large number of texts and thus identifying developments in form and usage over time and in different types of texts. The contribution summarizes results of a pilot study: First, it describes the manual annotation of a corpus of short narrative texts in relation to linguistic descriptions of ST&WR. Then, two different techniques of automatic detection – a rule-based and a machine learning approach – are described and compared. Evaluation of the results shows success with automatic detection, especially for direct and indirect ST&WR.


Sign in / Sign up

Export Citation Format

Share Document