Archive for the ‘Machine Learning’ Category

MVTec further expands HALCON functionality with new deep … – Robotics Tomorrow

New version 23.05 extends HALCON's comprehensive software libraryNew Deep Counting feature for counting large quantitiesRelease on May 23, 2023

Munich, April 13, 2023 - MVTec Software GmbH (www.mvtec.com), a leading international software manufacturer for machine vision worldwide, will launch version 23.05 of the standard machine vision software HALCON on May 23, 2023. The focus of the new release is deep learning methods. The main feature here is Deep Counting, a deep-learning-based method that can robustly count large quantities of objects. In addition, improvements for the training of the deep learning technologies 3D Gripping Point Detection as well as Deep OCR have been integrated into the new HALCON version. With HALCON 23.05, it is now possible to further optimize the underlying deep learning networks, which are already pre-trained on industry-related images, for the user's own application. This allows even more robust recognition rates for Deep OCR applications as well as an even more reliable detection of suitable gripping surfaces for applications using 3D Gripping Point Detection technology. In addition, there are many other helpful improvements, such as the fact that external code can now be integrated into HALCON more easily.

Training for Deep OCRDeep OCR reads texts in a very robust way, even regardless of their orientation and font. For this purpose, the technology first detects the relevant text within the image and then reads it. With HALCON 23.05, it's now also possible to fine-tune the text detection by retraining the pretrained network with application-specific images. This provides even more robust results and opens new application possibilities. For example: the detection of text with arbitrary printing type or unseen character types as well as an improved readability in noisy, low contrast environments.

Training for 3D Gripping Point Detection3D Gripping Point Detection can be used to robustly detect surfaces on any object that is suitable for gripping with suction. In HALCON 23.05 there is now the possibility to retrain the pretrained model with own application-specific image data. The grippable surfaces are thus recognized even more robustly. The necessary labeling is done easily and efficiently via the MVTec Deep Learning Tool.

Easy Extensions InterfaceWith the help of HALCON extension packages the integration of external programming languages is possible. The advantage for customers: Functionalities that go beyond pure image processing can thus be covered by HALCON. In HALCON 23.05, the integration of external code has become much easier with the Easy Extensions Interface. This allows users to make their own functions written in .NET code usable in HDevelop and HDevEngine in just a few steps, while benefiting from the wide range of functionalities offered by the .NET framework. Even the data types and HALCON operators known from the HALCON/.NET language interface can be used. This increases both the flexibility and the application possibilities of HALCON.

About MVTec Software GmbHMVTec is a leading manufacturer of standard software for machine vision. MVTec products are used in all demanding areas of imaging: semiconductor industry, surface inspection, automatic optical inspection systems, quality control, metrology, as well as medicine and surveillance. By providing modern technologies such as 3D vision, deep learning, and embedded vision, software by MVTec also enables new automation solutions for the Industrial Internet of Things aka Industry 4.0. With locations in Germany, the USA, and China, as well as an established network of international distributors, MVTec is represented in more than 35 countries worldwide. http://www.mvtec.com

About MVTec HALCONMVTec HALCON is the comprehensive standard software for machine vision with an integrated development environment (HDevelop) that is used worldwide. It enables cost savings and improved time to market. HALCON's flexible architecture facilitates rapid development of any kind of machine vision application. MVTec HALCON provides outstanding performance and a comprehensive support of multi-core platforms, special instruction sets like AVX2 and NEON, as well as GPU acceleration. It serves all industries, with a library used in hundreds of thousands of installations in all areas of imaging like blob analysis, morphology, matching, measuring, and identification. The software provides the latest state-of-the-art machine vision technologies, such as comprehensive 3D vision and deep learning algorithms. The software secures your investment by supporting a wide range of operating systems and providing interfaces to hundreds of industrial cameras and frame grabbers, in particular by supporting standards like GenICam, GigE Vision, and USB3 Vision. By default, MVTec HALCON runs on Arm-based embedded vision platforms. It can also be ported to various target platforms. Thus, the software is ideally suited for the use within embedded and customized systems. http://www.halcon.com, http://www.embedded-vision-software.com

Originally posted here:
MVTec further expands HALCON functionality with new deep ... - Robotics Tomorrow

Multimodal Deep Learning – A Fusion of Multiple Modalities – NASSCOM Community

Multimodal Deep Learning and its Applications

As humans, our perception of the world is through our senses. We identify objects or anything through vision, sound, touch, and odor. Our way of processing this sensory information is multimodal. Modality refers to the way something is recognized, experienced, and recorded. Multimodal deep learning is an extensive research branch in Deep learning that works on the fusion of multimodal data.

The human brain consists of millions of neural networks that process multiple modalities from the external world. It could be recognizing a persons body movements, tone of voice, or even mimicking sounds. For AI to interpret Human Intelligence, we need a reasonable fusion of multimodal data and this is done through Multimodal Deep Learning.

Multimodal Machine Learning is developing computer algorithms that learn and predict using Multimodal datasets.

Multimodal Deep learning is a subset of the machine learning branch. With this technology, AI models are trained to identify relationships between multiple modalities such as images, videos, and texts and provide accurate predictions. From identifying the relevant link between datasets, Deep Learning models will be able to capture any place's environment and a person's emotional state.

If we say, Unimodal models that interpret only a single dataset have proven efficient in computer vision and Natural Language Processing. Unimodal models have limited capabilities; in certain tasks, these models failed to recognize humor, sarcasm, and hate speech. Whereas, Multimodal learning models can be referred to as a combination of unimodal models.

Multimodal deep learning includes modalities like visual, audio, and textual datasets. 3D visual and LiDAR data are slightly used multimodal data.

Multimodal Learning models work on the fusion of multiple unimodal neural networks.

First unimodal neural networks process the data separately and encode them, later, the encoded data is extracted and fused. Multimodal data fusion is an important process carried out using multiple fusion techniques. Finally, with the fusion of multimodal data, neural networks recognize and predict the outcome of the input key.

For example, in any video, there might be two unimodal models visual data and audio data. The perfect synchronization of both unimodal datasets provides simultaneous working of both models.

Fusing multimodal datasets improves the accuracy and robustness of Deep learning models, enhancing their performance in real-time scenarios.

Multimodal Deep learning has potential applications in computer vision algorithms. Here are some of its applications;

The research to reduce human efforts and develop machines matching with human intelligence is enormous. This requires multimodal datasets that can be combined using Machine Learning and Deep Learning models, paving the way for more advanced AI tools.

The recent surge in the popularity of AI tools has brought more additional investments in Artificial Intelligence and Machine Learning technology. This is a great time to grab job opportunities by learning and upskilling yourself in Artificial Intelligence and Machine Learning.

Continue reading here:
Multimodal Deep Learning - A Fusion of Multiple Modalities - NASSCOM Community

Prediction prolonged mechanical ventilation in trauma patients of … – Nature.com

Esteban, A. et al. Evolution of mortality over time in patients receiving mechanical ventilation. Am. J. Respir. Crit. Care Med. 188, 220230. https://doi.org/10.1164/rccm.201212-2169OC (2013).

Article PubMed Google Scholar

Divo, M. J., Murray, S., Cortopassi, F. & Celli, B. R. Prolonged mechanical ventilation in Massachusetts: The 2006 prevalence survey. Respir. Care 55, 16931698 (2010).

PubMed Google Scholar

Hsu, C. L. et al. Timing of tracheostomy as a determinant of weaning success in critically ill patients: A retrospective study. Crit. Care 9, R46-52. https://doi.org/10.1186/cc3018 (2005).

Article PubMed Google Scholar

Wang, C. H. et al. Predictive factors of in-hospital mortality in ventilated intensive care unit: A prospective cohort study. Medicine (Baltimore) 96, e9165. https://doi.org/10.1097/md.0000000000009165 (2017).

Article MathSciNet PubMed Google Scholar

Clark, P. A. & Lettieri, C. J. Clinical model for predicting prolonged mechanical ventilation. J. Crit. Care 28, 880.e881-880.e887 (2013).

Article Google Scholar

Sheikhbardsiri, H., Esamaeili Abdar, Z., Sheikhasadi, H., Ayoubi Mahani, S. & Sarani, A. Observance of patients rights in emergency department of educational hospitals in south-east Iran. Int. J. Hum. Rights Healthcare. 13, 435444 (2020).

Article Google Scholar

Parreco, J., Hidalgo, A., Parks, J. J., Kozol, R. & Rattan, R. Using artificial intelligence to predict prolonged mechanical ventilation and tracheostomy placement. J. Surg. Res. 228, 179187 (2018).

Article PubMed Google Scholar

Agle, S. C. et al. Early predictors of prolonged mechanical ventilation in major torso trauma patients who require resuscitation. Am. J. Surg. 192, 822827 (2006).

Article PubMed Google Scholar

Dimopoulou, I. et al. Prediction of prolonged ventilatory support in blunt thoracic trauma patients. Intensive Care Med. 29, 11011105 (2003).

Article PubMed Google Scholar

Figueroa-Casas, J. B. et al. Predictive models of prolonged mechanical ventilation yield moderate accuracy. J. Crit. Care 30, 502505 (2015).

Article PubMed Google Scholar

Davarani, E. R., Tavan, A., Amiri, H. & Sahebi, A. Response capability of hospitals to an incident caused by mass gatherings in southeast Iran. Injury 53, 17221726 (2022).

Article PubMed Google Scholar

Young, D., Harrison, D. A., Cuthbertson, B. H. & Rowan, K. Effect of early vs late tracheostomy placement on survival in patients receiving mechanical ventilation: The TracMan randomized trial. JAMA 309, 21212129. https://doi.org/10.1001/jama.2013.5154 (2013).

Article CAS PubMed Google Scholar

Gomes Silva, B. N., Andriolo, R. B., Saconato, H., Atallah, A. N. & Valente, O. Early versus late tracheostomy for critically ill patients. Cochrane Database Syst. Rev. 3 144 (2012).

Google Scholar

Rose, L. et al. Variation in definition of prolonged mechanical ventilation. Respir. Care 62, 13241332 (2017).

Article PubMed Google Scholar

Clark, P. A. & Lettieri, C. J. Clinical model for predicting prolonged mechanical ventilation. J. Crit. Care 28, 880-e881 (2013).

Article Google Scholar

Brook, A. D., Sherman, G., Malen, J. & Kollef, M. H. Early versus late tracheostomy in patients who require prolonged mechanical ventilation. Am. J. Crit. Care 9, 352 (2000).

Article CAS PubMed Google Scholar

Chang, Y.-C. et al. Ventilator dependence risk score for the prediction of prolonged mechanical ventilation in patients who survive sepsis/septic shock with respiratory failure. Sci. Rep. 8, 111 (2018).

ADS Google Scholar

Lone, N. I. & Walsh, T. S. Prolonged mechanical ventilation in critically ill patients: Epidemiology, outcomes and modelling the potential cost consequences of establishing a regional weaning unit. Crit. Care 15, 110 (2011).

Article Google Scholar

Dunn, H. et al. Mobilization of prolonged mechanical ventilation patients: An integrative review. Heart Lung 46, 221233. https://doi.org/10.1016/j.hrtlng.2017.04.033 (2017).

Article PubMed PubMed Central Google Scholar

Abujaber, A. et al. Using trauma registry data to predict prolonged mechanical ventilation in patients with traumatic brain injury: Machine learning approach. PLoS ONE 15, e0235231 (2020).

Article CAS PubMed PubMed Central Google Scholar

Zolbanin, H. M., Delen, D. & Zadeh, A. H. Predicting overall survivability in comorbidity of cancers: A data mining approach. Decis. Support Syst. 74, 150161 (2015).

Article Google Scholar

Shaikhina, T. et al. Decision tree and random forest models for outcome prediction in antibody incompatible kidney transplantation. Biomed. Signal Process. Control 52, 456462 (2019).

Article ADS Google Scholar

Archer, K. J. & Kimes, R. V. Empirical characterization of random forest variable importance measures. Comput. Stat. Data Anal. 52, 22492260 (2008).

Article MathSciNet MATH Google Scholar

Dag, A., Oztekin, A., Yucel, A., Bulur, S. & Megahed, F. M. Predicting heart transplantation outcomes through data analytics. Decis. Support Syst. 94, 4252 (2017).

Article Google Scholar

Cui, S., Wang, D., Wang, Y., Yu, P.-W. & Jin, Y. An improved support vector machine-based diabetic readmission prediction. Comput. Methods Programs Biomed. 166, 123135 (2018).

Article PubMed Google Scholar

Hale, A. T. et al. Machine-learning analysis outperforms conventional statistical models and CT classification systems in predicting 6-month outcomes in pediatric patients sustaining traumatic brain injury. Neurosurg. Focus 45, E2 (2018).

Article PubMed Google Scholar

Shi, H.-Y., Hwang, S.-L., Lee, K.-T. & Lin, C.-L. In-hospital mortality after traumatic brain injury surgery: A nationwide population-based comparison of mortality predictors used in artificial neural network and logistic regression models. J. Neurosurg. 118, 746752 (2013).

Article PubMed Google Scholar

Das, A. et al. Prediction of outcome in acute lower-gastrointestinal haemorrhage based on an artificial neural network: Internal and external validation of a predictive model. Lancet 362, 12611266 (2003).

Article PubMed Google Scholar

Han, J., Kamber, M. & Pei, J. Data Mining Concepts and Techniques 3rd edn. (University of Illinois at Urbana-Champaign Micheline Kamber Jian Pei Simon Fraser University, 2012).

MATH Google Scholar

Zolbanin, H. M., Delen, D. & Zadeh, A. H. Predicting overall survivability in comorbidity of cancers: A data mining approach. Decis Support Syst 74, 150161 (2015).

Article Google Scholar

Lakshmi, B. N., Indumathi, T. S. & Ravi, N. A study on C.5 decision tree classification algorithm for risk predictions during pregnancy. Procedia Technol. 24, 15421549 (2016).

Article Google Scholar

Rivers, E. et al. Early goal-directed therapy in the treatment of severe sepsis and septic shock. N. Engl. J. Med. 345, 13681377 (2001).

Article CAS PubMed Google Scholar

Weil, M. H. Functional Hemodynamic Monitoring 917 (Springer, 2005).

Book Google Scholar

Sevransky, J. Clinical assessment of hemodynamically unstable patients. Curr. Opin. Crit. Care 15, 234 (2009).

Article PubMed PubMed Central Google Scholar

Scheeren, T. W. L. et al. Current use of vasopressors in septic shock. Ann. Intensive Care 9, 112 (2019).

Article Google Scholar

Hidalgo, D. C., Patel, J., Masic, D., Park, D. & Rech, M. A. Delayed vasopressor initiation is associated with increased mortality in patients with septic shock. J. Crit. Care 55, 145148 (2020).

Article Google Scholar

Li, Y., Li, H. & Zhang, D. Timing of norepinephrine initiation in patients with septic shock: a systematic review and meta-analysis. Crit. Care 24, 19 (2020).

Article Google Scholar

Sellers, B. J., Davis, B. L., Larkin, P. W., Morris, S. E. & Saffle, J. R. Early prediction of prolonged ventilator dependence in thermally injured patients. J. Trauma 43, 899903 (1997).

Article CAS PubMed Google Scholar

Rachmale, S., Li, G., Wilson, G., Malinchoc, M. & Gajic, O. Practice of excessive FiO2 and effect on pulmonary outcomes in mechanically ventilated patients with acute lung injury. Respir. Care 57, 18871893 (2012).

Article PubMed Google Scholar

de Jonge, E. et al. Association between administered oxygen, arterial partial oxygen pressure and mortality in mechanically ventilated intensive care unit patients. Crit. Care 12, 18 (2008).

Article Google Scholar

Esan, A., Hess, D. R., Raoof, S., George, L. & Sessler, C. N. Severe hypoxemic respiratory failure: Part 1Ventilatory strategies. Chest 137, 12031216 (2010).

Article PubMed Google Scholar

Gajic, O. et al. Prediction of death and prolonged mechanical ventilation in acute lung injury. Crit. Care 11, 17 (2007).

Article Google Scholar

Seeley, E. et al. Predictors of mortality in acute lung injury during the era of lung protective ventilation. Thorax 63, 994998 (2008).

Article CAS PubMed Google Scholar

Nash, G., Blennerhassett, J. B. & Pontoppidan, H. Pulmonary lesions associated with oxygen therapy and artificial ventilation. Laval. Med. 276, 368374 (1967).

CAS Google Scholar

Ghauri, S. K., Javaeed, A., Mustafa, K. J. & Khan, A. S. Predictors of prolonged mechanical ventilation in patients admitted to intensive care units: A systematic review. Int. J. Health Sci. (Qassim) 13, 3138 (2019).

PubMed Google Scholar

Pu, L. et al. Weaning critically ill patients from mechanical ventilation: A prospective cohort study. J. Crit. Care 30, 862.e867813. https://doi.org/10.1016/j.jcrc.2015.04.001 (2015).

Article Google Scholar

Sellares, J. et al. Predictors of prolonged weaning and survival during ventilator weaning in a respiratory ICU. Intensive Care Med. 37, 775784. https://doi.org/10.1007/s00134-011-2179-3 (2011).

Article PubMed Google Scholar

Clark, P. A. & Lettieri, C. J. Clinical model for predicting prolonged mechanical ventilation. J. Crit. Care 28(880), e881-887. https://doi.org/10.1016/j.jcrc.2013.03.013 (2013).

Article Google Scholar

Clark, P. A., Inocencio, R. C. & Lettieri, C. J. I-TRACH: Validating a tool for predicting prolonged mechanical ventilation. J. Intensive Care Med. 33, 567573. https://doi.org/10.1177/0885066616679974 (2018).

Article PubMed Google Scholar

Rojek-Jarmua, A., Hombach, R. & Krzych, J. APACHE II score cannot predict successful weaning from prolonged mechanical ventilation. Chron. Respir. Dis. 14, 270275. https://doi.org/10.1177/1479972316687100 (2017).

Article PubMed PubMed Central Google Scholar

Go here to read the rest:
Prediction prolonged mechanical ventilation in trauma patients of ... - Nature.com

More ‘machine learning’ cameras to track truckies through NSW – Big Rigs

Transport for NSW (TfNSW) is installing a number of machine learning traffic counting and classifying cameras across the state.

Images of heavy vehicles are taken by the cameras, which then classify the type of vehicle in transit and the type of cargo being transported.

In a bulletin to industry TfNSW said the information collected helps to shape the future of freight, to better understand freight movements, improve road safety, and enable more efficient deliveries.

The cameras are not used for enforcement or monitoring people or private vehicles, said TfNSW.

Truckies can expect to see cameras installed at the following locations over the coming weeks:

According to thefact sheet on the cameras webpage, there is a radar sensor and camera on the unit that takes a picture of the heavy vehicles when certain criteria are met.

After the picture is taken, artificial intelligence within the unit can tell the difference between different types of heavy vehicles, for example, a container carrying heavy vehicle, B-double or semi-trailer.

The units are also able to track changes in load. If a shipping container truck entered a location carrying one container and left with two containers the platform contains a record of this change.

Aside from the above locations, TfNSw says similar cameras can also be found at:

For more information, visit the Machine Learning cameras webpagewhich includes a factsheet with details about what these units are and what they do.

If you have any questions or would like more information, you can contact the TfNSW project team at freight@transport.nsw.gov.au.

Follow this link:
More 'machine learning' cameras to track truckies through NSW - Big Rigs

How machine learning can help crack the IT security problem – VentureBeat

Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More

Less than a decade ago, the prevailing wisdom was that every business should undergo digital transformations to boost internal operations and improve client relationships. Next, they were being told that cloud workloads are the future and that elastic computer solutions enabled them to operate in an agile and more cost-effective manner, scaling up and down as needed.

While digital transformations and cloud migrations are undoubtedly smart decisions that all organizations should make (and those that havent yet, what are you doing!), security systems meant to protect such IT infrastructures havent been able to keep pace with threats capable of undermining them.

As internal business operations become increasingly digitized, boatloads more data are being produced. With data piling up, IT and cloud security systems come under increased pressure because more data leads to greater threats of security breaches.

In early 2022, a cyber extortion gang known as Lapsus$ went on a hacking spree, stealing source code and other valuable data from prominent companies, including Nvidia, Samsung, Microsoft and Ubisoft. The attackers had originally exploited the companies networks using phishing attacks, which led to a contractor being compromised, giving the hackers all the access the contractor had via Okta (an ID and authentication service). Source code and other files were then leaked online.

Transform 2023

Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.

This attack and numerous other data breaches target organizations of all types, ranging from large multinational corporations to small startups and growing firms. Unfortunately, in most organizations, there are simply too many data points for security engineers to locate, meaning current systems and methods to safeguard a network are fundamentally flawed.

Additionally, organizations are often overwhelmed by the various available tools to tackle these security challenges. Too many tools means organizations invest an exorbitant amount of time and energy not to mention resources in researching, purchasing and then integrating and running these tools. This puts added stress on executives and IT teams.

With so many moving parts, even the best security engineers are left helpless in trying to mitigate potential vulnerabilities in a network. Most organizations simply dont have the resources to make cybersecurity investments.

As a result, they are subject to a double-edged sword: Their business operations rely on the highest levels of security, but achieving that comes at a cost that most organizations simply cant afford.

A new approach to computer security is desperately needed to safeguard businesses and organizations sensitive data. The current standard approach comprises rules-based systems, usually with multiple tools to cover all bases. This practice leaves security analysts wasting time enabling and disabling rules and logging in and out of different systems in an attempt to establish what is and what isnt considered a threat.

The best option for organizations dealing with these ever-present pain points is to leverage machine learning (ML) algorithms. This way, algorithms can train a model based on behaviors, providing any business or organization a secure IT infrastructure. A tailored ML-based SaaS platform that operates efficiently and in a timely manner must be the priority of any organization or business seeking to revamp its security infrastructure.

Cloud-native application protection platforms (CNAPP), a security and compliance solution, can empower IT security teams to deploy and run secure cloud native applications in automated public cloud environments. CNAPPs can apply ML algorithms on cloud-based data to discover accounts with unusual permissions (one of the most common and undetected attack paths) and uncover potential threats including host and open source vulnerabilities.

ML can also knit together many anomalous data points to create rich stories of whats happening in a given network something that would take a human analyst days or weeks to uncover.

These platforms leverage ML through two primary practices. Cloud security posture management (CSPM) handles platform security by monitoring and delivering a full inventory to identify any deviations from customized security objectives and standard frameworks.

Cloud infrastructure entitlements management (CIEM) focuses on identity security by understanding all possible access to sensitive data through every identitys permission. On top of this, host and container vulnerabilities are also taken into account, meaning correct urgency can be applied to ongoing attacks. For example, anomalous behavior seen on a host with known vulnerabilities is far more pressing than on a host without known vulnerabilities.

Another ML-based SaaS option is to outsource the security operations center (SOC) and security incident and event management (SIEM) function to a third party and benefit from their ML algorithm. With dedicated security analysts investigating any and all threats, SaaS can use ML to handle critical security functions such as network monitoring, log management, single-sign on (SSO) and endpoint alerts, as well as access gateways.

SaaS ML platforms offer the most effective way to cover all the security bases. By applying ML to all behaviors, organizations can focus on their business objectives while algorithms pull all the necessary context and insights into a single security platform.

Running the complex ML algorithms to learn a baseline of what is normal in a given network and assessing risk is challenging even if an organization has the personnel to make it a reality. For the majority of organizations, using third-party platforms that have already built algorithms to be trained on data produces a more scalable and secure network infrastructure, doing so far more conveniently and effectively than home grown options.

Relying on a trusted third party to host a SaaS ML platform enables organizations to dedicate more time to internal needs, while the algorithms study the networks behavior to provide the highest levels of security.

When it comes to network security, relying on a trusted third party is no different than hiring a locksmith to repair the locks on your home. Most of us dont know how the locks on our homes work but we trust an outside expert to get the job done. Turning to third-party experts to run ML-algorithms enables businesses and organizations the flexibility and agility they need to operate in todays digital environment.

Maximizing this new approach to security allows all types of organizations to overcome their complex data problems without having to worry about the resources and tools needed to protect their network, providing unparalleled peace of mind.

Ganesh the Awesome (Steven Puddephatt) is a technical sales architect at GlobalDots.

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even considercontributing an articleof your own!

Read More From DataDecisionMakers

Visit link:
How machine learning can help crack the IT security problem - VentureBeat