2022
DOI: 10.3389/fpubh.2022.858327
|View full text |Cite
|
Sign up to set email alerts
|

Retinal Vessel Extraction via Assisted Multi-Channel Feature Map and U-Net

Abstract: Early detection of vessels from fundus images can effectively prevent the permanent retinal damages caused by retinopathies such as glaucoma, hyperextension, and diabetes. Concerning the red color of both retinal vessels and background and the vessel's morphological variations, the current vessel detection methodologies fail to segment thin vessels and discriminate them in the regions where permanent retinopathies mainly occur. This research aims to suggest a novel approach to take the benefit of both traditio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
2
1

Relationship

4
6

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 45 publications
0
18
0
Order By: Relevance
“…The area beneath the Receiver Operating Characteristic (ROC) curve ( 38 ) is measured by AUC ( 39 ). True Positives (TP) and True Negatives (TN) are improved by a model with a higher AUC ( 40 ). Table 3 shows the AUC scores for all 15 labels, including the average, for various scales.…”
Section: Resultsmentioning
confidence: 99%
“…The area beneath the Receiver Operating Characteristic (ROC) curve ( 38 ) is measured by AUC ( 39 ). True Positives (TP) and True Negatives (TN) are improved by a model with a higher AUC ( 40 ). Table 3 shows the AUC scores for all 15 labels, including the average, for various scales.…”
Section: Resultsmentioning
confidence: 99%
“…Reference [26] analyzed the possible privacy information leakage problem in STIX network security threat intelligence sharing standard, and tried to solve the privacy information leakage problem by using an improved data sharing protocol. The above research work has played a role in privacy protection from a unilateral dimension, but cannot protect the privacy information of the intelligence sharing party, the intelligence user and the intelligence-related parties at the same time [27][28][29][30][31][32].…”
Section: Related Workmentioning
confidence: 99%
“…A competitive economy has likewise assures that the currencies assigned to equitably [16]. Nevertheless, cryptocurrency mining is energy-intensive since the process of manufacture a new set-top token requires use of big, mighty machines solve complex cryptographic issues [17]. Each transaction must be validated by the mining since Bitcoin is distributed networks that do not have substantial body.…”
Section: Cryptocurrency Miningmentioning
confidence: 99%