Journal of King Saud University-Computer and Information Sciences最新文献

筛选
英文 中文
Low-light image enhancement: A comprehensive review on methods, datasets and evaluation metrics 弱光图像增强:方法、数据集和评估指标综合评述
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-05 DOI: 10.1016/j.jksuci.2024.102234
Zhan Jingchun , Goh Eg Su , Mohd Shahrizal Sunar
{"title":"Low-light image enhancement: A comprehensive review on methods, datasets and evaluation metrics","authors":"Zhan Jingchun ,&nbsp;Goh Eg Su ,&nbsp;Mohd Shahrizal Sunar","doi":"10.1016/j.jksuci.2024.102234","DOIUrl":"10.1016/j.jksuci.2024.102234","url":null,"abstract":"<div><div>Enhancing low-light images in computer vision is a significant challenge that requires innovative methods to improve its robustness. Low-light image enhancement (LLIE) enhances the quality of images affected by poor lighting conditions by implementing various loss functions such as reconstruction, perceptual, smoothness, adversarial, and exposure. This review analyses and compares different methods, ranging from traditional to cutting-edge deep learning methods, showcasing the significant advancements in the field. Although similar reviews have been studied on LLIE, this paper not only updates the knowledge but also focuses on recent deep learning methods from various perspectives or interpretations. The methodology used in this paper compares different methods from the literature and identifies the potential research gaps. This paper highlights the recent advancements in the field by classifying them into three classes, demonstrated by the continuous enhancements in LLIE methods. These improved methods use different loss functions showing higher efficacy through metrics such as Peak Signal-to-Noise Ratio, Structural Similarity Index Measure, and Naturalness Image Quality Evaluator. The research emphasizes the significance of advanced deep learning techniques and comprehensively compares different LLIE methods on various benchmark image datasets. This research is a foundation for scientists to illustrate potential future research directions.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102234"},"PeriodicalIF":5.2,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binocular camera-based visual localization with optimized keypoint selection and multi-epipolar constraints 通过优化关键点选择和多极性约束进行基于双目摄像头的视觉定位
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-05 DOI: 10.1016/j.jksuci.2024.102228
Guanyuan Feng, Yu Liu, Weili Shi, Yu Miao
{"title":"Binocular camera-based visual localization with optimized keypoint selection and multi-epipolar constraints","authors":"Guanyuan Feng,&nbsp;Yu Liu,&nbsp;Weili Shi,&nbsp;Yu Miao","doi":"10.1016/j.jksuci.2024.102228","DOIUrl":"10.1016/j.jksuci.2024.102228","url":null,"abstract":"<div><div>In recent years, visual localization has gained significant attention as a key technology for indoor navigation due to its outstanding accuracy and low deployment costs. However, it still encounters two primary challenges: the requirement for multiple database images to match the query image and the potential degradation of localization precision resulting from the keypoints clustering and mismatches. In this research, a novel visual localization framework based on a binocular camera is proposed to estimate the absolute positions of the query camera. The framework integrates three core methods: the multi-epipolar constraints-based localization (MELoc) method, the Optimal keypoint selection (OKS) method, and a robust measurement method. MELoc constructs multiple geometric constraints to enable absolute position estimation with only a single database image, while OKS and the robust measurement method further enhance localization accuracy by refining the precision of these geometric constraints. Experimental results demonstrate that the proposed system consistently outperforms existing visual localization systems across various scene scales, database sampling intervals, and lighting conditions</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102228"},"PeriodicalIF":5.2,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time semantic segmentation for autonomous driving: A review of CNNs, Transformers, and Beyond 用于自动驾驶的实时语义分割:CNN、变形器及其他技术综述
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-04 DOI: 10.1016/j.jksuci.2024.102226
Mohammed A.M. Elhassan , Changjun Zhou , Ali Khan , Amina Benabid , Abuzar B.M. Adam , Atif Mehmood , Naftaly Wambugu
{"title":"Real-time semantic segmentation for autonomous driving: A review of CNNs, Transformers, and Beyond","authors":"Mohammed A.M. Elhassan ,&nbsp;Changjun Zhou ,&nbsp;Ali Khan ,&nbsp;Amina Benabid ,&nbsp;Abuzar B.M. Adam ,&nbsp;Atif Mehmood ,&nbsp;Naftaly Wambugu","doi":"10.1016/j.jksuci.2024.102226","DOIUrl":"10.1016/j.jksuci.2024.102226","url":null,"abstract":"<div><div>Real-time semantic segmentation is a crucial component of autonomous driving systems, where accurate and efficient scene interpretation is essential to ensure both safety and operational reliability. This review provides an in-depth analysis of state-of-the-art approaches in real-time semantic segmentation, with a particular focus on Convolutional Neural Networks (CNNs), Transformers, and hybrid models. We systematically evaluate these methods and benchmark their performance in terms of frames per second (FPS), memory consumption, and CPU runtime. Our analysis encompasses a wide range of architectures, highlighting their novel features and the inherent trade-offs between accuracy and computational efficiency. Additionally, we identify emerging trends, and propose future directions to advance the field. This work aims to serve as a valuable resource for both researchers and practitioners in autonomous driving, providing a clear roadmap for future developments in real-time semantic segmentation. More resources and updates can be found at our GitHub repository: <span><span>https://github.com/mohamedac29/Real-time-Semantic-Segmentation-Survey</span><svg><path></path></svg></span></div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102226"},"PeriodicalIF":5.2,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TFDNet: A triple focus diffusion network for object detection in urban congestion with accurate multi-scale feature fusion and real-time capability TFDNet:用于城市拥堵路段物体检测的三重聚焦扩散网络,具有精确的多尺度特征融合和实时能力
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102223
Caoyu Gu , Xiaodong Miao , Chaojie Zuo
{"title":"TFDNet: A triple focus diffusion network for object detection in urban congestion with accurate multi-scale feature fusion and real-time capability","authors":"Caoyu Gu ,&nbsp;Xiaodong Miao ,&nbsp;Chaojie Zuo","doi":"10.1016/j.jksuci.2024.102223","DOIUrl":"10.1016/j.jksuci.2024.102223","url":null,"abstract":"<div><div>Vehicle detection in congested urban scenes is essential for traffic control and safety management. However, the dense arrangement and occlusion of multi-scale vehicles in such environments present considerable challenges for detection systems. To tackle these challenges, this paper introduces a novel object detection method, dubbed the triple focus diffusion network (TFDNet). Firstly, the gradient convolution is introduced to construct the C2f-EIRM module, replacing the original C2f module, thereby enhancing the network’s capacity to extract edge information. Secondly, by leveraging the concept of the Asymptotic Feature Pyramid Network on the foundation of the Path Aggregation Network, the triple focus diffusion module structure is proposed to improve the network’s ability to fuse multi-scale features. Finally, the SPPF-ELA module employs an Efficient Local Attention mechanism to integrate multi-scale information, thereby significantly reducing the impact of background noise on detection accuracy. Experiments on the VisDrone 2021 dataset reveal that the average detection accuracy of the TFDNet algorithm reached 38.4%, which represents a 6.5% improvement over the original algorithm; similarly, its mAP50:90 performance has increased by 3.7%. Furthermore, on the UAVDT dataset, the TFDNet achieved a 3.3% enhancement in performance compared to the original algorithm. TFDNet, with a processing speed of 55.4 FPS, satisfies the real-time requirements for vehicle detection.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102223"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Effective and scalable black-box fuzzing approach for modern web applications” [J. King Saud Univ. Comp. Info. Sci. 34(10) (2022) 10068–10078] 现代网络应用的有效和可扩展黑盒模糊方法"[J. King Saud Univ. Comp. Info. Sci. 34(10) (2022) 10068-10078] 更正
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102216
Aseel Alsaedi, Abeer Alhuzali, Omaimah Bamasag
{"title":"Corrigendum to “Effective and scalable black-box fuzzing approach for modern web applications” [J. King Saud Univ. Comp. Info. Sci. 34(10) (2022) 10068–10078]","authors":"Aseel Alsaedi,&nbsp;Abeer Alhuzali,&nbsp;Omaimah Bamasag","doi":"10.1016/j.jksuci.2024.102216","DOIUrl":"10.1016/j.jksuci.2024.102216","url":null,"abstract":"","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102216"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142721482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNE-YOLO: A method for apple fruit detection in Diverse Natural Environments DNE-YOLO:在多样化自然环境中检测苹果果实的方法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102220
Haitao Wu , Xiaotian Mo , Sijian Wen , Kanglei Wu , Yu Ye , Yongmei Wang , Youhua Zhang
{"title":"DNE-YOLO: A method for apple fruit detection in Diverse Natural Environments","authors":"Haitao Wu ,&nbsp;Xiaotian Mo ,&nbsp;Sijian Wen ,&nbsp;Kanglei Wu ,&nbsp;Yu Ye ,&nbsp;Yongmei Wang ,&nbsp;Youhua Zhang","doi":"10.1016/j.jksuci.2024.102220","DOIUrl":"10.1016/j.jksuci.2024.102220","url":null,"abstract":"<div><div>The apple industry, recognized as a pivotal sector in agriculture, increasingly emphasizes the mechanization and intelligent advancement of picking technology. This study innovatively applies a mist simulation algorithm to apple image generation, constructing a dataset of apple images under mixed sunny, cloudy, drizzling and foggy weather conditions called DNE-APPLE. It introduces a lightweight and efficient target detection network called DNE-YOLO. Building upon the YOLOv8 base model, DNE-YOLO incorporates the CBAM attention mechanism and CARAFE up-sampling operator to enhance the focus on apples. Additionally, it utilizes GSConv and the dynamic non-monotonic focusing mechanism loss function WIOU to reduce model parameters and decrease reliance on dataset quality. Extensive experimental results underscore the efficacy of the DNE-YOLO model, which achieves a detection accuracy (precision) of 90.7%, a recall of 88.9%, a mean accuracy (mAP50) of 94.3%, a computational complexity (GFLOPs) of 25.4G, and a parameter count of 10.46M across various environmentally diverse datasets. Compared to YOLOv8, it exhibits superior detection accuracy and robustness in sunny, drizzly, cloudy, and misty environments, making it especially suitable for practical applications such as apple picking for agricultural robots. The code for this model is open source at <span><span>https://github.com/wuhaitao2178827/DNE-YOLO</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102220"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient resource allocation for UAV-aided full-duplex OFDMA wireless powered IoT communication networks 无人机辅助全双工 OFDMA 无线供电物联网通信网络的高能效资源分配
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102225
Tong Wang
{"title":"Energy-efficient resource allocation for UAV-aided full-duplex OFDMA wireless powered IoT communication networks","authors":"Tong Wang","doi":"10.1016/j.jksuci.2024.102225","DOIUrl":"10.1016/j.jksuci.2024.102225","url":null,"abstract":"<div><div>The rapid development of wireless-powered Internet of Things (IoT) networks, supported by multiple unmanned aerial vehicles (UAVs) and full-duplex technologies, has opened new avenues for simultaneous data transmission and energy harvesting. In this context, optimizing energy efficiency (EE) is crucial for ensuring sustainable and efficient network operation. This paper proposes a novel approach to EE optimization in multi-UAV-aided wireless-powered IoT networks, focusing on balancing the uplink data transmission rates and total system energy consumption within an orthogonal frequency-division multiple access (OFDMA) framework. This involves formulating the EE optimization problem as a Multi-Objective Optimization Problem (MOOP), consisting of the maximization of the uplink total rate and the minimization of the total system energy consumption, which is then transformed into a Single-Objective Optimization Problem (SOOP) using the Tchebycheff method. To address the non-convex nature of the resulting SOOP, characterized by combinatorial variables and coupled constraints, we developed an iterative algorithm that combines Block Coordinate Descent (BCD) with Successive Convex Approximation (SCA). This algorithm decouples the subcarrier assignment and power control subproblems, incorporates a penalty term to relax integer constraints, and alternates between solving each subproblem until convergence is reached. Simulation results demonstrate that our proposed method outperforms baseline approaches in key performance metrics, highlighting the practical applicability and robustness of our framework for enhancing the efficiency and sustainability of real-world UAV-assisted wireless networks. Our findings provide insights for future research on extending the proposed framework to scenarios involving dynamic UAV mobility, multi-hop communication, and enhanced energy management, thereby supporting the development of next-generation sustainable communication systems.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102225"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142578585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
General secure encryption algorithm for separable reversible data hiding in encrypted domain 加密域中可分离可逆数据隐藏的通用安全加密算法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102217
Hongli Wan, Minqing Zhang, Yan Ke, Zongbao Jiang, Fuqiang Di
{"title":"General secure encryption algorithm for separable reversible data hiding in encrypted domain","authors":"Hongli Wan,&nbsp;Minqing Zhang,&nbsp;Yan Ke,&nbsp;Zongbao Jiang,&nbsp;Fuqiang Di","doi":"10.1016/j.jksuci.2024.102217","DOIUrl":"10.1016/j.jksuci.2024.102217","url":null,"abstract":"<div><div>The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out the embedding space for the information before or after encryption and makes the operation of extracting the information and restoring the image not interfere with each other. The encryption method employed not only affects the embedding space of the information and separability, but is more crucial for ensuring security. However, the commonly used XOR, scram-bling or combination methods fall short in security, especially against known plaintext attack (KPA). Therefore, in order to improve the security of RDH-ED and be widely applicable, this paper proposes a high-security RDH-ED encryption algorithm that can be used to reserve space before encryption (RSBE) and free space after encryption (FSAE). During encryption, the image undergoes block XOR, global intra-block bit-plane scrambling (GIBS) and inter-block scrambling sequentially. The GIBS key is created through chaotic mapping transformation. Subsequently, two RDH-ED algorithms based on this encryption are proposed. Experimental results indicate that the algorithm outlined in this paper maintains consistent key communication traffic post key conversion. Additionally, its computational complexity remains at a constant level, satisfying separability criteria, and is suitable for both RSBE and FSAE methods. Simultaneously, while satisfying the security of a single encryption technique, we have expanded the key space to 2<span><math><mrow><msup><mrow></mrow><mrow><mn>8</mn><mi>N</mi><mi>p</mi></mrow></msup><mo>×</mo><mi>N</mi><mi>p</mi><mo>!</mo><mo>×</mo><mn>8</mn><msup><mrow><mo>!</mo></mrow><mrow><mi>N</mi><mi>p</mi></mrow></msup></mrow></math></span>, enabling resilience against various existing attack methods. Notably, particularly in KPA testing scenarios, the average decryption success rate is a mere 0.0067% and 0.0045%, highlighting its exceptional security. Overall, this virtually unbreakable system significantly enhances image security while preserving an appropriate embedding capacity.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102217"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142578586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum computing enhanced knowledge tracing: Personalized KT research for mitigating data sparsity 量子计算增强知识追踪:缓解数据稀疏性的个性化 KT 研究
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102224
Chengke Bao , Qianxi Wu , Weidong Ji , Min Wang , Haoyu Wang
{"title":"Quantum computing enhanced knowledge tracing: Personalized KT research for mitigating data sparsity","authors":"Chengke Bao ,&nbsp;Qianxi Wu ,&nbsp;Weidong Ji ,&nbsp;Min Wang ,&nbsp;Haoyu Wang","doi":"10.1016/j.jksuci.2024.102224","DOIUrl":"10.1016/j.jksuci.2024.102224","url":null,"abstract":"<div><div>With the development of artificial intelligence in education, knowledge tracing (KT) has become a current research hotspot and is the key to the success of personalized instruction. However, data sparsity remains a significant challenge in the KT domain. To address this challenge, this paper applies quantum computing (QC) technology to KT for the first time. It proposes two personalized KT models incorporating quantum mechanics (QM): quantum convolutional enhanced knowledge tracing (QCE-KT) and quantum variational enhanced knowledge tracing (QVE-KT). Through quantum superposition and entanglement properties, QCE-KT and QVE-KT effectively alleviate the data sparsity problem in the KT domain through quantum convolutional layers and variational quantum circuits, respectively, and significantly improve the quality of the representation and prediction accuracy of students’ knowledge states. Experiments on three datasets show that our models outperform ten benchmark models. On the most sparse dataset, QCE-KT and QVE-KT improve their performance by 16.44% and 14.78%, respectively, compared to DKT. Although QC is still in the developmental stage, this study reveals the great potential of QM in personalized KT, which provides new perspectives for solving personalized instruction problems and opens up new directions for applying QC in education.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102224"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DA-Net: A classification-guided network for dental anomaly detection from dental and maxillofacial images DA-Net:从牙科和颌面部图像中检测牙科异常的分类指导网络
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-11-01 DOI: 10.1016/j.jksuci.2024.102229
Jiaxing Li
{"title":"DA-Net: A classification-guided network for dental anomaly detection from dental and maxillofacial images","authors":"Jiaxing Li","doi":"10.1016/j.jksuci.2024.102229","DOIUrl":"10.1016/j.jksuci.2024.102229","url":null,"abstract":"<div><div>Dental abnormalities (DA) are frequent signs of disorders of the mouth that cause discomfort, infection, and loss of teeth. Early and reasonably priced treatment may be possible if defective teeth in the oral cavity are automatically detected. Several research works have endeavored to create a potent deep learning model capable of identifying DA from pictures. However, because of the following problems, aberrant teeth from the oral cavity are difficult to detect: 1) Normal teeth and crowded dentition frequently overlap; 2) The lesion area on the tooth surface is tiny. This paper proposes a professional dental anomaly detection network (DA-Net) to address such issues. First, a multi-scale dense connection module (MSDC) is designed to distinguish crowded teeth from normal teeth by learning multi-scale spatial information of dentition. Then, a pixel differential convolution (PDC) module is designed to perform pathological tooth recognition by extracting small lesion features. Finally, a multi-stage convolutional attention module (MSCA) is developed to integrate spatial information and channel information to obtain abnormal teeth in small areas. Experiments on benchmarks show that DA-Net performs well in dental anomaly detection and can further assist doctors in making treatment plans. Specifically, the DA-Net method performs best on multiple detection evaluation metrics: IoU, PRE, REC, and mAP. In terms of REC and mAP indicators, the proposed DA-Net method is 1.1% and 1.3% higher than the second-ranked YOLOv7 method.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 9","pages":"Article 102229"},"PeriodicalIF":5.2,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142578584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信