User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 12
 Downloands 3
Hash Code Generation using Deep Feature Selection Guided Siamese Network for Content-Based Medical Image Retrieval
2021
Journal:  
Gazi University Journal of Science
Author:  
Abstract:

It is very pleasing for human health that medical knowledge has increased and the technological infrastructure improves medical systems. The widespread use of medical imaging devices has been instrumental in saving lives by allowing early diagnosis of many diseases. These medical images are stored in large databases for many purposes. These datasets are used when a suspicious diagnostic case is encountered or to gain experience for inexperienced radiologists. To fulfill these tasks, images similar to one query image are searched from within the large dataset. Accuracy and speed are vital for this process, which is called content-based image retrieval (CBIR). In the literature, the best way to perform a CBIR system is by using hash codes. This study provides an effective hash code generation method based on feature selection-based downsampling of deep features extracted from medical images. Firstly, pre-hash codes of 256-bit length for each image are generated using a pairwise siamese network architecture that works based on the similarity of two images. Having a pre-hash code between -1 and 1 makes it very easy to generate hash code in hashing algorithms. For this reason, all activation functions of the proposed convolutional neural network (CNN) architecture are selected as hyperbolic tanh. Finally, neighborhood component analysis (NCA) feature selection methods are used to convert pre-hash code to binary hash code. This also downsamples the hash code length to 32-bit, 64-bit, or 96-bit levels. The performance of the proposed method is evaluated using NEMA MRI and NEMA CT datasets.

Keywords:

null
2021
Author:  
0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles










Gazi University Journal of Science

Field :   Fen Bilimleri ve Matematik; Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 1.843
Cite : 1.744
2023 Impact : 0.165
Gazi University Journal of Science