Intelligent Computing Proceedings of the 2021 Computing Conference Volume 3 Lecture Notes in Networks and Systems 285 Kohei Arai (Editor) - Download the complete ebook in PDF format and read freely
Intelligent Computing Proceedings of the 2021 Computing Conference Volume 3 Lecture Notes in Networks and Systems 285 Kohei Arai (Editor) - Download the complete ebook in PDF format and read freely
com
https://ebookmeta.com/product/intelligent-computing-
proceedings-of-the-2021-computing-conference-
volume-3-lecture-notes-in-networks-and-systems-285-kohei-
arai-editor/
OR CLICK HERE
DOWLOAD EBOOK
https://ebookmeta.com/product/intelligent-computing-proceedings-of-
the-2021-computing-conference-volume-1-1st-edition-kohei-arai/
ebookmeta.com
https://ebookmeta.com/product/all-you-knead-is-love-3rd-edition-
guerrero-tanya/
ebookmeta.com
Digital Anthropology Second Edition Haidy Geismar (Editor)
https://ebookmeta.com/product/digital-anthropology-second-edition-
haidy-geismar-editor/
ebookmeta.com
https://ebookmeta.com/product/cherishing-her-a-mc-biker-instalove-
romance-skin-sins-tattoo-shop-book-1-1st-edition-jailaa-west/
ebookmeta.com
https://ebookmeta.com/product/patent-pending-in-24-hours-8th-edition-
richard-stim/
ebookmeta.com
https://ebookmeta.com/product/building-behavior-the-educator-s-guide-
to-evidence-based-initiatives-1st-edition-jessica-hannigan/
ebookmeta.com
Theories of International Relations 6th Edition Scott
Burchill
https://ebookmeta.com/product/theories-of-international-relations-6th-
edition-scott-burchill/
ebookmeta.com
Lecture Notes in Networks and Systems 285
Intelligent
Computing
Proceedings of the 2021 Computing
Conference, Volume 3
Lecture Notes in Networks and Systems
Volume 285
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering,
University of Alberta, Alberta, Canada; Systems Research Institute,
Polish Academy of Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of
Science.
Intelligent Computing
Proceedings of the 2021 Computing
Conference, Volume 3
123
Editor
Kohei Arai
Faculty of Science and Engineering
Saga University
Saga, Japan
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Editor’s Preface
v
vi Editor’s Preface
Hope to see you in 2022, in our next Computing Conference, with the same
amplitude, focus and determination.
Kohei Arai
Contents
vii
viii Contents
1 Introduction
Among the contributions of the study here reported are the following. Some
core TBI-language feature sets were identified, leading to similar efficacy values
of learning algorithms to those achieved when evaluating with the complete ini-
tial TBI-attribute set with a variety of schemes. An analytical exploration based
in correlation in the starting feature set under analysis is presented. Moreover,
a possible relation between impurity quality as a convenient evaluator directly
grading, or together with learning algorithms based on it, was found.
The paper is organized as follows. Section 2 discusses briefly some of the
relevant results reached in previous investigations, the methodologies they tried
and introduced, as well as, potential language features to describe the subject
of study in turn. Section 3 is summing up the steps carried out to complete the
present analysis. Section 4 is subdivided to include specific information about
the Corpus (4.1), implementation (4.2), preliminary results (4.3), ending the
section, and the work, with a discussion of the results presented (4.4), and some
additional observations (4.5).
2 Related Work
After Linguistics researchers started extensive investigations in this problem de-
cades ago, mainly doing their analysis and computation by hand, computational
techniques have been gradually incorporated. For instance, the application of
natural language processing (NLP) of [12] examines disabilities in the language
of a heterogeneous group of participants with different diagnostics, having a
variety of causes. A language analysis was completed based on transcripts created
by automatic speech recognition (ASR) in which three sets of characteristics were
extracted, from a Linguistic Content Analysis (LCA), Part-of-Speech (POS)
tags, and Linguistic Inquiry and Word Count (LIWC) processing.
Each of the above mentioned techniques provides a variety of characteris-
tics. The first set contributes a quantitative view of the word pattern usage.
Then from the next group, for instance, nouns by verb frequencies are extracted.
Among the categories that LIWC provides are psychology processes, linguistic
dimensions (articles, negations, and so on), relative to time and space from which
also frequencies are obtained. After ranking characteristics through an analysis
of variance (ANOVA), they were explored with varied learning algorithms in
WEKA, such as SimpleLogistic, J48 (decision tree), and Multilayered Percep-
tron (neural networks) [12].
On the same line, further investigations were conducted [4–6, 13]. Such works
incorporated statistical criteria to qualify features combined with ablation exper-
iments [5, 6]. Also, some efforts [13] were done to avoid overfitting occurring
in earlier investigations (given the limited size of datasets), and tried some
other learning algorithms, such as Naı̈ve Bayes, Support Vector Machine, besides
Logistic Regression.
Observing that the data entry quality is a cornerstone in the complexity of
these types of studies, a knowledge model [11] was introduced to work on the
feature filtering based on an ACT-R [10] architecture. Furthermore, language
Feature Analysis for Aphasic or Abnormal Language Caused by Injury 3
models (LMs) were employed in [3, 14] which were trained on Part-Of-Speech
tag sequences. The selected resulting feature sets were tested with SVM [3, 11],
Naı̈ve Bayes [3, 11], Decision Trees [11], Neural Networks [3, 11], and Boosting
with Decision Stumps [3]. These last two works are focused on discriminating
specific language impairment (SLI) among infants or teenagers.
3 Methodology
The methodology behind our findings is illustrated in Fig. 1, and consists of the
following phases. After extracting the initial set of characteristics proper to the
language samples, a set of valuators are incorporated to analyze the features,
leading to a ranking. Parallel to this analysis, root nodes are generated and
selected employing a tree-based algorithm, to compare both criteria and then
identify the promising candidates feature sets. For evaluating these promising
features sets, a phase of wrapping which involves setting up of learning algo-
rithms, training and testing steps. According to the assessment of the results,
we can go back to valuator selection or to consider a new feature set.
4 Experiments
Next, we report details of the analysis conducted in our reported work. The
Corpus source, considered tasks, employed tools, feature set, steps, and achieved
results.
Table 1. Demographics
First two sets described in Table 1 refer to subjects in recovery after suffering
a brain injury that caused some kind of language impairment (e.g. aphasia,
dysarthria, or apraxia), registered after three and six months, respectively. Also,
notice that the transcriptions analyzed in our TBI-study group is the retelling
of Cinderella story, while for our contrastive (negative) set is the narration of a
story based on The Runaway picture, a piece authored by Norman Rockwell.
Transcripts are files created with a special format that synthesizes the whole
information that CLAN [8] requires to generate the different indices available.
They are organized into levels, for example gems (@G), among other, supports
the identification of the task being referred by the lines following the tier. The
tag (*PAR) indicates the participant layer, and that corresponding to the inves-
tigator is marked by (*INV). Also we have the morphem (%mor) and grammar
(%gra) tiers. Next, lines of a short example of the transcripts referred to, are
given.
@G: Cinderella
*PAR: &-um the two wicked stepsisters &-um up to these old tricks.
\%mor: det:art|the det:num|two adj|wicked step#n|sister-PL adv|up
prep|to det:dem|these adj|old n|trick-PL .
\%gra: 1|2|DET 2|4|QUANT 3|4|MOD 4|0|INCROOT 5|4|JCT
6|4|JCT 7|9|DET 8|9|MOD 9|6|POBJ 10|4|PUNCT
Feature Analysis for Aphasic or Abnormal Language Caused by Injury 5
Selecting the More Discriminative Feature Subset. There are two main
approaches [17] regarding an attribute filtering process. When this is done prior
to the learning phase, it is called filter method. On the contrary, when the learning
algorithm in fact encompasses the selection stage, this is called wrapper method.
Usually, they are combined in a cycle of feature nomination, closely related to
the subject under analysis.
FN Feature Description
Starting with one of the most extensively used criteria, i.e. information gain,
the statistics reveals that features propVerbsPerWords and nounPerVerbs, cor-
responding to feature numbers (FN) 15 and 16, are the only important compo-
nents in the group, with average merit values of 0.013 ± 0.039 and 0.013 ± 0.038
respectively. However, we observed that they appear in the last places in the
ranking column.
Additionally, several preliminary data explorations revealed openClass and
closedClass as noisy or non discriminative attribute in this 25-feature set, and
placed on top of the corresponding ranking. In consequence, we opted to try
Feature Analysis for Aphasic or Abnormal Language Caused by Injury 7
Outlier Case. Regarding the TBI language samples, the group of interest, it
is not possible to deal with an outlier conception because we are interested in
recognizing and modeling each alteration that language is presenting. However,
regarding the negative sample information, the notion is plausible, and the con-
tinuation of the data exploration led us to identify an outlier instance in it, given
that the sample was presenting some indexes doubling the next minimum in the
set.
We tried a set of learning algorithms to test the discriminative capability of
the selected feature group. The viability of Naı̈ve Bayes (NB) in a variety of
language studies led us to consider it as one of the first options for the analysis.
Given that Impurity indicator seems to be applicable in our context, it was
natural to consider SPAARC and Random Forest (RF) algorithms. Although
RF works on boosting, we included AdaBoostM1 too, and we considered also a
learning algorithm based on regression, i.e. ClassificationViaRegression.
Based on the observation that impurity metric was applicable to reveal some
discriminating features, and considering that the tree learning algorithm basis
to branch is to reduce the impurity grade in the new nodes created, we pro-
ceed as follows. We trained a tree learning algorithm over a random sample
split of 60% from the 25-CNNLA feature set to then analyze the root node clus-
ters generated. Recognizing potential prospects based on impurity grading along
with their Pearson correlation, we determined a part of the selected feature set.
Table 3 enumerates the selected feature group.
FN Feature Description
3 TotalUtts # of Utterances
4 TotalWords # of Words
5 MLUWords Mean Length Utterance
13 propNounsPerWords %Nouns/Words
16 nounPerVerb Nouns/Verbs
21 aux # of auxiliaries
Tables 4 and 5 summarize the results for the first two recovery stages samples
once the outlier was removed. Every learning algorithm was applied with a leave-
one-out cross validation, given the reduced number of instances. In order to
8 M. Roldán-Palacios and A. López-López
compare our findings, we evaluate the full 25-CNNLA feature set with the whole
proposed group of learning algorithms and we set as baseline the highest value
of the overall evaluation for each recovery data set.
Table 4. Testing selected feature group once outlier was excluded - TBI03.
FN Feature Description
6 UttsPerMin Utterances/Min
7 openClass Open-Class .
8 propOpenClassPerWords %open-class/Words
10 propClosedClassPerWords %close-class/Words
FN Feature Description
8 propOpenClassPerWords %open-class/Words
10 propClosedClassPerWords %close-class/Words
14 Verbs # of Verbs
16 nounPerVerb Nouns/Verbs
17 adj # of Adjectives
24 modals # of Modals
10 M. Roldán-Palacios and A. López-López
40 5
(True-Positive) (False-Positive)
5 38
(False-Negative) (True-Negative)
Outlier case
Feature Analysis for Aphasic or Abnormal Language Caused by Injury 11
Given that when testing with this last 4-feature set with the second recov-
ery phase data sample produced poor results, a new representative feature set
(Table 7) was explored. This time, it was necessary to incorporate a new grading
test weighting instances in a neighbor based on its inverse square distance, in
reference to the evaluated instance, this along with impurity evaluation guided
the selection of the feature set (Table 7). Notice that this is a new composition
but shares a couple of elements with the 4-feature set (Table 6), and one with
the first group presented (Table 3).
12 M. Roldán-Palacios and A. López-López
Efficacy also decreases in these conditions, the accuracy baseline was deter-
mined to be 84.71, obtained with RF, which was surpassed only by CVR achiev-
ing values of 90.59, but showing a drop in the correctly discriminated samples
balance (3), charged to the negative sample.
36 6
(3)
2 41
Regarding the whole feature set F as the union of component subsets (4),
where 0 < n ≤ m and m ≤ size(F), the idea behind finding the more descriptive
feature set, FW (5), consists of uncovering
the more positively weighted feature,
Fw , of each subset fj . Notice that fk fl = ∅ for k = l.
m
F= fj (4)
j=n
m
FW = fw (5)
w=1
Based on that, we are extending the discussion for the selected 6-feature
set (Table 7) corresponding to the second recovery stage. Figure 2 exhibits the
strong inverse relation existing between attributes propOpenClassPerWord and
propClosedClassPerWords with a diagonal instance distribution having a nega-
tive slope, that indicates in our context that they are quite descriptive features.
Charts in Fig. 3 show the null or partial relation existing among propOpen-
ClassPerWord and the remaining attributes in the selected 6-feature set.
5 Conclusions
The inherent relationships among features in the sets are complex and are
strongly related to the subject of study, and the larger the feature sets the more
complex the way they behave. In addition, frequently we have to handle het-
erogeneous group of features that convey still more elaborated connections. The
presented work is summarizing the results of an addressed micro-level analysis,
which means, an inspection bounded to a lexical level, a piece of a larger work in
the direction of understanding how TBI-abnormal language evolves during the
post-traumatic recovery stages.
Attaining reasonable efficacy measures with a quarter of the 25-feature set,
we have to keep in mind the stability of the CVR algorithm as a wrapping
method in feature selection and its steadiness, along with that of RF throughout
the whole analysis. In addition to the support that the tree-based algorithm
and ImpurityEuclid analysis, as filter methods, represent to this methodology to
guide some others examinations. Having acceptable efficacy higher or equal to
the baseline does not allow to assert that the reported results are conclusive. It
is evident that there are intrinsic relationship at the interior of the feature set
still unrevealed.
Further research basically aims for extension on three directions: (i) we will
cover a wider range of features than that considered here; (ii) we will expand
the analysis to a macro-level, i.e. incorporating syntactic components, and (iii)
additionally we plan to work on further stages of recovery to understand its
evolution. Besides it, each step unavoidable implies the revision of techniques,
methods, and methodology to better understand the results and the studied
impaired language.
References
1. Linnik, A., Bastiaanse, R., Höhle, B.: Discourse production in aphasia: a current
review of theoretical and methodological challenges. Aphasiology 30(7), 765–800
(2015). https://doi.org/10.1080/02687038.2015.1113489
Feature Analysis for Aphasic or Abnormal Language Caused by Injury 15
2. Coelho, C.A., Grela, B., Corso, M., Gamble, A., Feinn, R.: Microlinguistic deficits
in the narrative discourse of adults with traumatic brain injury. Brain Inj. 19(13),
1139–1145 (2005)
3. Gabani, K., Sherman, M., Solorio, T., Liu, Y., Bedore L.M., Peña, E.D.: A corpus-
based approach for the prediction of language impairment in monolingual English
and Spanish-English bilingual children. Human language technologies. In: The 2009
Annual Conference of the North American Chapter of the ACL, Boulder, Colorado,
June 2009, pp. 46–55 (2009). c 2009 Association for Computational Linguistics
4. Fraser, K.C., et al.: (2012). Automated classification of primary progressive aphasia
subtypes from narrative speech transcripts. Cortex. 55, 43–60 (2013). https://doi.
org/10.1016/j.cortex.2012.12.006
5. Kathleen, C.F., Hirst, G., Graham, N.L., Meltzer, J.A., Black, S.E., Rochon, E.:
Comparison of different feature sets for identification of variants in progressive
aphasia. Workshop on Computational Linguistics and Clinical Psychology: From
Linguistic Signal to Clinical Reality, Baltimore, Maryland USA, 27 June 2014, pp.
17–26 (2014). c 2014 Association for Computational Linguistics
6. Fraser, K.C., Hirst, G., Meltzer, J.A., Mack, J.E., Thompson, C.K.: Using statis-
tical parsing to detect agrammatic aphasia. In: Proceedings of the 2014 Workshop
on Biomedical Natural Language Processing (BioNLP 2014), Baltimore, Maryland,
USA, 26–27 June 2014, pp. 134–142 (2014). c 2014 Association for Computational
Linguistics
7. Bryant, L., Ferguson, A., Spencer, E.: Linguistic analysis of discourse in aphasia: a
review of the literature. Clin. Linguist. Phonetics (2016). https://doi.org/10.3109/
02699206.2016.1145740
8. MacWhinney, B.: The CHILDES Project: Tools for Analyzing Talk, 3rd edn.
Lawrence Erlbaum Associates, Mahwah (2000)
9. Marini, A., Andreetta, S., del Tin, S., Carlomagno, S.: A multi-level approach
to the analysis of narrative language in aphasia. Aphasiology 25(11), 1372–1392
(2011). https://doi.org/10.1080/02687038.2011.584690
10. Oliva, J., Serrano, J.I., Del Castillo, M.D., Iglesias, A.: Cognitive modeling of the
acquisition of a highly inflected verbal system. In: Salvucci, D., Gunzelmann, G.
(eds.) Proceedings of the 10th International Conference on Cognitive Modeling,
pp. 181–186. Drexel University, Philadelphia (2010)
11. Oliva, J., Serrano, J.I., del-Castillo, M.D., Iglesias, A.: A methodology for the
characterization and diagnosis of cognitive impairment - application to specific
language impairment. Artif. Intell. Med. 61(2014), 89–96 (2014)
12. Peintner, B., Jarrold, W., Vergyri, D., Richey, C., Gorno-Tempini, M.A., Ogar, J.:
Learning diagnostic models using speech and language measures. In: 30th Annual
International IEEE EMBS Conference Vancouver, British Columbia, Canada, 20–
24 August (2008)
13. Rentoumi, V., et al.: Automatic detection of linguistic indicators as a means of
early detection of Alzheimer’s disease and of related dementias: A Computational
Linguistics analysis. 8th IEEE International Conference on Cognitive Infocommu-
nications (CogInfoCom 2017), 11–14 September 2017 (2017)
14. Solorio, T., Yamg, L.: Using language models to identify language impairment in
Spanish-English bilingual children. In: BioNLP 2008: Current Trends in Biomedi-
cal Natural Language Processing, pp. 116–117, Columbus, Ohio, USA, June 2008
(2008). c 2008 Association for Computational Linguistics
15. Stubbs, E., et al.: Procedural discourse performance in adults with severe traumatic
brain injury at 3 and 6 months post injury. Brain Inj. 32(2), 167–181 (2018).
https://doi.org/10.1080/02699052.2017.1291989
16 M. Roldán-Palacios and A. López-López
16. Thompson C.K.: Northwestern Narrative Language Analysis (NNLA) Theory And
Methodology. Aphasia and Neurolinguistics Research Laboratory Northwestern
University, Evanston, IL (2013)
17. Witten, I.H., Frank, E.: Data Mining - Practical Machine Learning Tools and
Techniques. Elsevier, Morgan Kaufmann Publishers, Burlington (2005)
Automatic Detection and Segmentation of Liver
Tumors in Computed Tomography Images:
Methods and Limitations
rklein@toh.ca
1 Introduction
The main challenge for tumor detection and segmentation is the wide variation of tumors
with respect to size, shape, intensity, contrast, and location. This creates a complex diver-
sity for an observer, human or machine, to handle. In addition, there are variations in
the global image presentation such as image acquisition and reconstruction methods,
voxel size, anatomical region coverage and many other parameters. Therefore, minimiz-
ing these image variations helps focus on tumor specific variations. In a previous work
[1], we showed that image standardization significantly improved organ (liver) segmen-
tation in computed tomography (CT) scans by reducing the image specific variations.
Our method consisted of a series of steps to localize the abdominal region, then set a
fixed size and coverage for that region, and finally conduct the organ segmentation. The
segmented region is then inverse-standardized, so it corresponds to the original image
coordinates. Similarly, a system that standardizes/inverse-standardizes both imaging and
tumor variations may boost tumor detection and segmentation performance. In this work
we build on the liver organ segmentation framework to detect and segment liver tumors.
An intuitive approach is to design two modules: the first eliminates imaging-related
variations, and the second handles tumor variations. However, since tumor and imaging-
related variations are interdependent, their separation is not trivial. For instance, stan-
dardizing slice thickness may cause some tumors to disappear due to loss of axial reso-
lution when down-sampling. On the other hand, up-sampling may stretch some tumors
in a way that the image interpolation algorithms will make some tumors’ masks lose
shape information. Moreover, interpolation algorithms introduce blur, compromising
potentially useful texture information. Using interpolation based on nearest value also
does not help if specifically intended for 3D processing, where tumors can take pixelated
shapes along the axial dimension. In other words, applying any morphing standardization
may cause loss of information regarding tumors specifications, critically needed for their
detection or segmentation, especially for 3D processing. Considering the above factors,
it is important to avoid applying these morphing operations and better limit focus on stan-
dardizing only common information the images naturally share. Fortunately, crop/pad
operations can be used to standardize image representation while preserving the image
texture.
Following such option necessitates using 2D processing instead of 3D as an initial
step. Amongst CT images, the transversal view is the most consistent. Even though the
field-of-view (FOV) may vary, its impact is not harmful compared to slice thickness
variations and can be handled by copping/padding as shown by [1]. With slice thickness
being the most harmful factor requiring morphing operations to be standardized, it is
avoided by eliminating its axial dimension through processing one transversal slice
at a time. Of course, this means losing contextual information along that dimension.
Therefore, analytical post-processing context-based correction can be useful [2].
In the context of liver tumor detection and segmentation, a good starting point would
be to focus on the segmented organ rather than including other regions in the image
field-of-view. This way, the model may learn to distinguish tumors from normal tissue
specific to the organ of interest with a simplified task of producing only two major
classes, normal tissue vs. tumor tissue. This work implements such strategy, where the
preprocessing stage replaces all region outside the liver with normal tissue imitating
voxel values on a standardized image intensity scale, hence reducing intensity variation
impact.
In this work we present a novel approach for standardizing CT images including
anatomical and liver-organ segmentation, removal of region outside the liver, and image
intensity normalization. Following standardization, liver tumors are then segmented. We
Automatic Detection and Segmentation of Liver Tumors 19
2 Related Work
L. Chen et al. [3] proposed a cascaded approach to segment the liver first by fusing
segmentation results from three networks (coronal, sagittal and transversal views) and
then segment tumors within the fused liver region. For tumor segmentation, they used
adversarial neural networks to discriminate tumors from normal tissue. They used the
Liver Tumor Segmentation dataset (LiTS) [4], where they achieved a dice of 68% for
liver tumors.
G. Chlebus et al. [5] proposed using U-Net [6] to segment tumors in 2D slices.
Following tumor segmentation, they developed an object-based false-positives reduction
algorithm to achieve an overall dice score of 69% on the LiTS dataset.
L. Bi et al. [7] proposed an approach that utilizes 2D slice-based segmentation using
two ResNets [8]. The first network is fed CT image slices to produce two probability
heatmaps (normal and tumor tissues) for each slice. Then, a CT slice is stacked with its
segmentation results and fed to the second network. This means that the second network
takes segmentation estimates for further enhancement. In their work, they present two
dice scores. The first, which is relatively low (~50%) was obtained for a development
set that was taken from the training set. On the other hand, the score that they were
able to obtain on the test set reached up to 64%, raking the 4th position in the LiTS
challenge. This might indicate that training set contains more difficult images than those
in the testing set. Unfortunately, challenge coordinators do not offer ground-truth labels
for the testing set. Hence, developers who conduct research using this dataset tend to
dedicate a portion of the training set for testing.
W. Li et al. [9] used 2D patch-based voxel segmentation by classifying voxels based
on their neighborhood contents. From tumor ground-truth, they selected a patch centered
at each voxel. They trained AdaBoost [10], random forest (RF) [11] and support vector
machines (SVMs) [12] using patch’s handcrafted features, and convolutional neural
network (CNN) [13] using the patch itself to classify tumor vs. normal. They showed
that CNN achieved the highest dice of 80% on a locally acquired dataset. One major
draw-back to such approach is that it requires classifying many patches to segment a
slice (patch for each voxel), which can be computationally too expensive when having
high resolution images (e.g. small voxel size and/or thin slices). In their paper, they
state that their method has limitation in capability of segmenting heterogeneous-texture
tumors and tumors with fuzzy boundaries. Given their results, we speculate that that their
dataset may have contained these limitations at lower frequency than that encountered
in the LiTS dataset.
L. Meng et al. [14] proposed a 3D dual path convolutional neural network, where
segmentation results at the end of the architecture are fused together. They also used
20 O. S. Salman and R. Klein
3 Method
Our overall strategy consists of two main components. Module 1 is a segmentation
module that processes 2D transversal slices one at a time. This module provides initial
tumor segmentation, and it is expected to include false-positive regions. Module 2 is
a patch-based approach designed to classify tumor regions identified in the first step
into true-positive and false-positive regions. This article is solely dedicated to covering
Module 1, with Module 2 to be covered in future work. We explore the limitations of
Module 1 to identify the range of improvements that may be expected from Module 2.
The workflow diagram is illustrated in Fig. 1.
3.1 Dataset
For this study, the LiTS [4] segmentation dataset was used, consisting of 131 CT scans.
Of these, 81 were randomly selected for training, and 50 for testing. Generally, this
dataset consists of images with a tight FOV around the patient. Slice thicknesses varied
as 1.51 ± 1.18 [0.70, 5.00] mm (Mean ± Std [min, max]) as did the number of slices
per image 447 ± 275 [74, 987]. With respect to anatomical region coverage in the FOV,
of the 131 images, 109 contain pelvis, 52 contain chest, 1 contains legs, and 2 contain
head-neck.
3.2 Preprocessing
Each image was automatically preprocessed to include the liver and mask out all other
regions as previously described. Regions outside the liver ROI were subsequently erased
Automatic Detection and Segmentation of Liver Tumors 21
Fig. 1. CT preprocessing.
by replacing them with voxel intensities resembling normal liver tissues as detailed
below. Two volumes were generated. The first was contrast improved CT (CICT) by
windowing to Hounsfield values ranging [–100, 400]. In the second volume (CICT-
Hist), histogram equalization was applied exclusively to the liver voxels of the first
volume, maximizing tumor to liver contrast. However, this has the undesired effect of
also increasing contrast between normal liver voxels in the absence of tumors. The two
volumes were then combined on the slice level, forming a multi-channel 2D slice stacks.
This configuration maintains actual intensity and emphasizes contrast for the subsequent
tumor segmentation stages.
Reducing Dataset Intensity Diversity: For such purpose, intensity standardization
was applied. However, rather than subtracting the mean and dividing by standard devi-
ation for all images of the training set, the mean and standard deviation used for this
adjustment were those of liver’s normal tissue. Each image voxels were rescaled to
a standard intensity based on intensity distribution derived from normal tissue voxel
intensities in the training images. Since the training set contains diverse tumor contrast,
relying on the absolute liver intensity without standardization can create some instabil-
ity due to absence of intensity reference. Thus, standard intensity was obtained for each
voxel by subtracting the normal tissue mean (μ) and dividing by its standard-deviation
(σ) and finally scaling to range [0, 1], representing [μ − σ, μ + σ]. Hence, normal tissue
voxel intensity distribution was considered as reference to standardize upon. This helps
22 O. S. Salman and R. Klein
to relatively map tumor intensity as abnormality on the normal tissue statistical distri-
bution. Two means and two standard deviations were used (for CICT and CICT-Hist
respectively).
Neutralizing Impact of Contributions from Outside the Liver ROI: Given the pro-
cedure in which an image is convolved, and that the system is divided into two classes
(tumor vs. background), most voxels outside the liver region will significantly contribute
to the background class. The values within this region should be carefully set. In general,
the intensity of tumors is lower than for normal tissue. Setting the background black can
harm the learning because it is closer to tumor intensity. Therefore, to avoid texture bias
in the learning, it is essential that the region outside the liver’s ROI shares similar texture
properties to normal tissue (where both belong to the “background” class). Therefore,
the background for CICT was set to solid intensity of 0.5 (after image intensity scaling)
while CICT-Hist’s was set to uniform noise with intensity values 0, 0.5 and 1; Fig. 1
shows the scheme. Once both volumes were prepared, their corresponding slices were
stacked, and the 2D slices were passed to U-Net to segment tumor regions.
same. To minimize and stabilize the volatility of this effect, post-segmentation height was
normalized into a common scale that reflects an approximate average amongst dataset
images. Height was normalized using nearest pixel method. Hence, the dice can now be
more representative to true segmentation performance with no bias caused by the image
resolution. The dice score was calculated for the whole test set following the definition
of the first metric.
To study the dependence of dice performance on tumor size, these were plotted with
respect to one-another. Segmented tumors were grouped into three, arbitrarily selected
size groups: small, medium, and large corresponding to (x ≤ 5000), (5000 < x ≤ 20,000)
and (x > 20,000), respectively, where x is the number of voxels in the segmented tumor
region. For each size range, the plot included scattered distribution with each point
presenting the dice for a single segmented region. In addition, an “approximate” dice
was calculated as a size-based weighted average of all singular regions’ dices within the
group. We considered this average as approximate in relation to the overall dice defined
above. The range dice can indicate the behavior of the group in relation to the overall
dice.
The other metric was the tumor detection accuracy, which is the ratio of the detected
ground-truth positives to the total ground-truth positives for the test set. A segment
that intersected a ground-truth region was considered a true-positive. A false-positive
tumor is a segmented region that has no intersection with ground-truth. The number
of true-positive segmented regions was less than the actual positives due to network’s
detection capacity and segmentation efficiency for this problem, where in the latter
multiple ground-truth regions may intersect with a single true-positive segmented region.
To study limitations of the segmentation module, for each tumor size group we measured
the dice using four consecutive stages of tumor exclusion conditions:
1) Base value–included all detected tumors within the liver region, representing results
without any false-positive removal.
2) False-positive exclusion–excluded all false-positive detected tumors, representing
best possible dice if all false-positives were removed.
3) Speckle exclusion–excluded all detected tumors less than 500 voxels in size, rep-
resenting a simple criterion by which tumors that are most likely to be noise are
removed.
4) Low-overlap exclusion–excluded detected tumors that had a relatively low dice (poor
overlap with ground-truth), representing detected tumors that disagreed with the
ground-truth and hence may be harder to detect (e.g. low contrast). The aim of this
exclusion is to isolate regions with bad performance to study their properties. This
can be useful to designing a system that is specialized in processing similar instances.
Such properties may include contrast, intensity, and location.
We reported the number of removed and remaining regions after applying each exclusion
condition.
24 O. S. Salman and R. Klein
Table 1. Tumor dice and detection accuracy values following manual and automatic (trained
network) liver segmentation methods. For both methods, results were presented in presence and
absence of applying binary erosion.
(n = 50 test images) Dice (%) Dice limit (%) Detection accuracy (%)
All positive FPs removed
Manual liver 76.17 81.83 87.31
segmentation
Manual liver 77.50 81.34 87.31
segmentation-erosion
Automatic liver 69.20 76.53 83.40
segmentation
Automatic liver 71.11 76.44 79.25
segmentation-erosion
In some sense we have dealt with the false-positives as a separate independent prob-
lem. With all false-positives included, the result gives a lower limit to the performance and
when all are removed, the dice gives an upper limit to the segmentation performance of
the segmentation module, independent of how a false-positive removal module operates.
In other words, the test reflects the segmentation learning capacity for true tumors.
Table 2 shows the number of detected tumors and false-positives based on size and
segmented region exclusion conditions. The table shows the amounts removed, and the
remaining ones for each exclusion applied as explained in the following figures. Table
3 shows the dice under various conditions. The dice improved from 25.67% to 60.61%
for the small tumors when false-positives were removed, reflecting their large number
for that range. By contrast, when removing 157 extremely small tumors (<500 voxels),
which dominate this range, the dice improved to 63.52%. Removing all regions with
dice less than the moving average-sigma dramatically improved performance by ~10%
points.
Automatic Detection and Segmentation of Liver Tumors 25
Table 2. Number of detected tumors and number of false-positives grouped by size and based
on consecutive stages of region exclusions (Rmv.: no. removed regions, Rmn.: no. remaining
regions).
For medium and large sizes, removing false-positives improved dice ~9% and ~5%
points, respectively. Removing regions with dice less than the moving average-sigma
further improved dice ~4% points for medium, and ~4% for the large. Considering only
false-positive exclusion, the total approximate dice improved from ~68% to ~80%. With
all exclusions applied (≤500 and <moving average-sigma), the overall dice reached
~85%.
The histograms of false-positive tumors in Fig. 2 show that very small size segmented
tumors are much more common than medium and large false-positive tumors with >92%
of these having fewer than 500 voxels regardless of the liver segmentation method.
Without false-positive exclusion, removing them improved the mean dice for the small
size category by ~8% and ~6% for automatic and manual liver segmentation, respectively
(Table 3).
26 O. S. Salman and R. Klein
Table 3. Average dice for different tumors sizes under certain exclusions.
The behavior of the tumor dice following manual and automatic liver segmentation
is summarized in Tables 1, 2 and 3 and compared with respect to the moving average
exclusion condition in detail in the Figs. 3, 4, 5, 6, 7, 8, 9 and 10. The numbers of
detected tumors differ between the manual and automatic liver segmentation, because
tumor segmentation may combine two regions from the ground-truth or vice versa. With
different liver ROI, the tumor segmentation algorithm is expected to act differently.
Another more likely reason is that the automatic segmentation could have missed portions
of the liver, which was reflected in the lower tumor detection accuracies (Table 1).
Exploring the Variety of Random
Documents with Different Content
climbed up to the ramparts to look at the sunset from the heights of
the Burg, while the lines of a ballad by Uhland rang in his memory,
he did not think that evil masters and false prophets would twice in
a quarter of a century unchain the lightning over Europe and the
rest of the world, and that through them so many treasures of art
and beauty would be destroyed, so many human lives sacrificed, so
much suffering piled up. Indeed, when one studies the genesis of
this unheard-of drama there can be no question of romanticism;
what we have to deal with rather is a perverted romanticism, a
morbid perversion of the sense of greatness, and the mind is baffled
by the true significance of the ideas of National Socialism—ideas
which I shall touch upon only in passing to show how they led the
Defendant Rosenberg, since it is he of whom I am speaking, and his
codefendants to commit the crimes which are held against them:
The concept of race, to begin with, which we see arising in a
country which in other respects resembles any other but where the
intermingling of ethnic types of every variety took place through the
centuries on a gigantic scale; this anti-scientific confusion which
mixes the physiological features of man with the concept of nations;
this neo-paganism which aims at abolishing the moral code, the
justice, and security which 20 centuries of Christianity have brought
to the world; this myth of blood which attempts to justify racial
discrimination and its consequences: slavery, massacre, looting, and
the mutilation of living beings!
I shall not dwell, Mr. President, on what we consider a jumble of
nonsense which claims to be philosophy and in which may be found
to be the most heterogeneous fragments of all kinds taken from
every source, from the megalomaniac concepts of Mussolini, Hindu
legends, and the Japan of the samurai, the cradle of fascism, which
swept over the world like a tidal wave. The previous presentations
have already adequately dealt with these conceptions. I shall simply
stress today that these pseudo-philosophic conceptions tended solely
to set back humanity thousands of years by reviving the clan
conception, which assumes the law of might as the supreme law—
the Faustrecht already formulated by the Iron Chancellor, the right to
cheat others, the right to take the property of others, the right to
reduce man to slavery, the right to kill, the right to torture.
But homo sapiens refuses to return to the state of homo lupus.
International law is not morality without obligation or sanction. The
Charter of 8 August has recalled and specified the obligation; it is for
you, Gentlemen, to apply the sanction.
One of the consequences of these theories of the superiority of
the race or of the so-called “Germanic Race” was to lead certain of
the conspirators, particularly the Defendant Rosenberg, of whom we
are speaking, to become plunderers; and it is this aspect of the
activities of the Defendant Rosenberg which I should like very briefly
to stress, for it concerns France and the occupied countries of the
West and had deeply harmful consequences for their artistic,
intellectual, or merely utilitarian heritage.
I wish to speak of all the measures decreed or applied by
Rosenberg with the aim of removing from France and the western
countries cultural treasures, works of art, and property belonging to
groups or individuals, and transferring to Germany all these riches.
Gentlemen, owing to the limited time which we have at our
disposal, I shall limit myself today to recalling how certain organisms
were made to collaborate in this pillaging through orders from higher
quarters. I shall indicate, first of all, the part played by the Gestapo,
which was ordained by a decree issued by the Defendant Keitel,
dated 5 July 1940, which bears the Document Number 137-PS and
which was submitted by the American Delegation, under Exhibit
Number USA-379, on 18 December 1945 (Exhibit Number RF-1400).
I refer likewise to a second order dated 30 October 1940, which
reinforced and detailed the orders given in regard to pillaging by
what was known as the Einsatzstab Rosenberg. This is Exhibit
Number RF-1304 (Document Number 140-PS), which was quoted by
the Economic Section of the French Prosecution.
Thus, Keitel and Rosenberg went back to the conception of a
booty exacted by the triumphant German people from the Jewish
people with regard to whom it was not bound by the conditions of
the Compiègne Armistice. This intervention by the chief of the army,
as indicated by the orders to which I have just referred, suffices in
my opinion to prove the important part played by the German Army
in this looting; and the Tribunal will not fail to remember that when
it makes its decisions as to the guilt of the Defendant Keitel and the
Defendant Göring.
If I mention the Defendant Göring, it is because a third
document proves that this defendant gave the operation his full
support, inviting all the organizations of the Party, the State, and the
Army to afford the fullest possible support and assistance to
Reichsleiter Rosenberg and his collaborator Utikal, whom Rosenberg
himself had appointed Chief of the Einsatzstab on 1 April 1941. This
is the order of 1 May 1941, which we produced under our Exhibit
Number RF-1406 (Document Number 1614-PS). If we examine the
text of this decree carefully we cannot fail to be struck by the first
paragraph. The Tribunal will surely allow me to reread it rapidly:
“The struggle against the Jews, the Freemasons, and other
ideologically opposed forces allied to them, is a most urgent task of
National Socialism during the war.”
Thus, it was enough for one to have a philosophy of life different
from that described as the Nazi Weltanschauung, to be exposed to
the danger of seeing one’s cultural property seized and transferred
to Germany. But the Tribunal will surely remember from the
documents already presented to it, that not only cultural property
was involved, but that anything with any kind of value was taken
away.
The Defendant Rosenberg tried, in the course of an interrogation
carried out by the superior officers in charge of the preliminary
investigations to claim, without much conviction, it seems to me,
that the cultural property in question was intended solely to adorn
the collections of the National Socialist Hohen Schulen. We shall see
presently, in presenting the text of this interrogation, how we may
judge this. But it is a fact which I wish to present now that, from the
documents which we possess, at least, it does not seem that the
Defendant Rosenberg appropriated works of art, precious stones, or
other objects of value for himself. Consequently, in the light of the
proceedings as conducted thus far, no accusation of this kind can be
brought against him. We shall not say as much for the Defendant
Hermann Göring, of whom we shall speak a little later and who,
according to the documents that we possess, may be convicted of
having appropriated to his own use part of the objects of art taken
from the countries of the East and the West.
I shall not dwell on the discussion which might arise about these
misappropriations. I shall go straight on to the interrogatory of the
Defendant Rosenberg. This is the document that was introduced
yesterday by the Economic Section of the French Prosecution, which
bears the Exhibit Number RF-1331, and which we use today as
Document Number ECH-25.
I think that the Tribunal will easily be able to refer to this
interrogatory, but meanwhile I should like very briefly to summarize
the essential points which I think should be brought up.
Colonel Hinkel, questioning the Defendant Rosenberg, asked him
on what legal grounds such looting could be justified. The Defendant
Rosenberg first answered that these seizures were justified by the
hostility which certain groups had manifested toward the National
Socialist ideology. But a little further on, on Page 4, the Defendant
Rosenberg made the following verbatim statement:
“I considered them”—he is referring to the measures which he
himself had taken—“a necessity caused by the war and by the
reasons which caused the war.”
A few moments later, pressed by Colonel Hinkel, the Defendant
Rosenberg invoked the necessity of putting into safekeeping
property thus seized, a necessity which will certainly constitute one
of the main points of his defense. But Colonel Hinkel replied to the
Defendant Rosenberg:
“And so if your idea was to safeguard art objects, it sounds rather
strange, doesn’t it, that you were going to safeguard only some art
objects and not others?
“On the other hand, with regard to the maintenance of the objects,
there were objects at least equal in value to those which had been
removed, but to which no one paid any attention.”
Finally, the Defendant Rosenberg admitted that he had very often
given no receipt to those concerned, which in itself precluded any
idea of eventually returning the property to the legitimate owners.
The truth of the matter is that these were treasures of very
considerable value, and the Defendant Rosenberg in the end
admitted that he regarded these acquisitions as an accomplished
fact. We consider that the fact of having thus removed works of art
and objects of value is purely and simply what is known in civil law
as misappropriation. These misappropriations were made on a vast
scale with the grandiose means which the Third Reich had at its
disposal, means which were further facilitated by the intervention of
the Army and the Luftwaffe. But it is nonetheless true that the
criminal character of these misappropriations remains; and we urge
the Tribunal, when it delivers judgment, to declare that it was by
fraudulent seizure that the Defendant Rosenberg and his
codefendants robbed France and the western countries of all the
objects of value and all the art treasures and cultural treasures.
As to what the objects themselves consisted of, Mr. President and
Your Honors, I would respectfully refer the Tribunal to the report
submitted by the Economic Section yesterday, which was made by
Dr. Scholz, the associate of the Einsatzstab Rosenberg. This report
was submitted by the Economic Section under Exhibit Number RF-
1323 (Document Number 1015-PS), and in it the Tribunal will find
enumerated everything that the Einsatzstab took out of France. In
this connection I shall make an incidental remark in answer to the
question that the President asked my colleague yesterday about the
Rothschild collections. The President asked my colleague, “Have you
proof that certain collections and objects of value were taken from
the Rothschild collections?”
I should like, Mr. President, to point out that there are two proofs
of this. The first is the immediate result of the Rosenberg
interrogation of 23 September 1945. I have just spoken to the
Tribunal of the all-important questions put to the Defendant
Rosenberg as to the legitimacy and legal basis of these removals. I
beg the Tribunal to refer to Page 5 of these minutes. I read from the
text the question asked by the American officer in charge of the
interrogation, my eminent friend, Colonel Hinkel:
“Question: ‘How do you justify the confiscation of art treasures
belonging to the Rothschild family?’ ”—A very precise question. It
concerned the art treasures taken from the Rothschild family by
Rosenberg’s organization.
“Answer: ‘Still from the same general point of view.’ ”
That means that the Defendant Rosenberg claimed to justify the
confiscations made to the detriment of the Rothschilds by the
reasons which I had the honor of analyzing to the Tribunal a few
moments ago.
A second consequence: The Defendant Rosenberg thus admitted
with his own lips that the Rothschild family was among those
despoiled. That confession, Mr. President, Your Honors, can be
considered as one of the proofs, one of the main proofs. This is the
first answer, then, to the question that the President asked
yesterday.
The second proof which I wish to present to the Tribunal is the
following: I beg the Tribunal to refer to the report by Dr. Scholz
mentioned above and produced yesterday in the document book of
the Economic Section. This is Exhibit Number RF-1323 (Document
Number 1015-PS).
If the Tribunal will kindly refer to it, that is to say, the report by
Dr. Scholz, the second paragraph of Page 1, it will find the following
statement, “The special staff not only seized a very considerable part
of the collection. . . .”
THE PRESIDENT: [Interposing.] As I said the other day, we
cannot keep all the books before us; but it seems to me that, as you
have shown that the Defendant Rosenberg agreed that this
collection had been taken, that is quite sufficient.
M. MOUNIER: Mr. President, I understand perfectly your point of
view. I should like respectfully to point out to you that I was to
speak immediately after my colleague, and if I had done so you
would have had this document book before you. We had a delay of
one day, and I apologize for not having thought of asking you to
bring this document again this morning.
However, I respectfully ask the Tribunal to be good enough to
note this reference which it will easily find. It is a very short
passage, which I should like to read to the Tribunal. It will not take
very much time.
THE PRESIDENT: Certainly.
M. MOUNIER: This declaration is simply the following:
“The special staff”—that is to say, the Einsatzstab Rosenberg—“not
only seized a very considerable portion of the collection which the
Rothschilds had left behind in their Paris mansion. . . .”
I shall not read the rest.
Here then, Gentlemen, is an official report which cannot be
disputed and which demonstrates, like the previous proof, that the
Rothschild collection was among those pillaged.
I do not insist on these facts, which are known to you. It seems
to me that the two points on which I have just cast a ray of light
suffice to make it clear that illegal seizures—fraudulent seizures—
were really operated by the Defendant Rosenberg to the detriment
of France and to the detriment, likewise, of the western countries.
As for their importance, I do not want to abuse the patience of the
Tribunal by quoting statistics. I respectfully ask the Tribunal to refer
to the Scholz report which I have twice mentioned in the course of
my previous statements.
I should not, however, wish to leave the case of Rosenberg, for
the time being, without quoting to the Tribunal a passage from an
article by the French writer François Mauriac, of the French
Academy. François Mauriac was present on 7 November 1945 at the
inaugural session of the National Constituent Assembly at the Palais
Bourbon. On this occasion François Mauriac invoked a memory which
was recalled in Le Figaro of 6 November 1945 in the following terms:
“Almost five years ago to a day, from the height of this rostrum, the
most illustrious in Europe, a man spoke to other men dressed in field
grey. His name was Alfred Rosenberg. I can testify to the exact date.
It was 25 November 1940.
“Rosenberg leaned his elbows on this rostrum, where the voices of
Jaurès and of Albert De Mun were once heard and where, on 11
November 1918, Clemenceau nearly died of joy. Here are his words:
“ ‘In one gigantic revolutionary burst’—he said—‘the German nation
has reaped such a harvest as never before in its history. The French
will admit one day, if they are honest, that Germany has freed them
from the parasites of which they could not rid themselves unaided.’
“And the Nazi philosopher”—continues Mauriac—“then proclaimed
the victory of blood. He meant”—writes Mauriac—“the victory of
race; but it happens that a man may utter prophetic words
unwittingly and without realizing the full import of the words which
God places upon his lips. As Rosenberg predicted at the Palais
Bourbon on 25 November 1940, it was indeed blood that won the
victory. It was the blood of the martyrs which in the end choked the
executioners.”
M. President, with the approval of the Court, and with the same
brevity as heretofore—and I hope the Tribunal will appreciate the
care I am taking not to abuse its patience—I should like to say a few
words on the individual charge against the Defendant Fritz Sauckel.
Your Honors, the Tribunal is already acquainted with the really
remarkable work, the genuinely positive work, presented to it some
time ago by my colleague and friend, M. Jacques Bernard Herzog.
This is why, with your permission, I shall pass over the facts
themselves, which are known to you, and limit myself to the part
beginning on Page 3 of my brief; and we shall examine together, if it
please the Tribunal, the grounds for the pleas advanced up to now
by the Defendant Fritz Sauckel.
One question must be asked first of all: Was Fritz Sauckel acting
under orders when he carried out this recruiting—so-called voluntary
in part but compulsory in most cases—this recruiting of laborers
destined to supply the needs of the German Reich?
According to Sauckel, when he was appointed Plenipotentiary for
the Allocation of Labor on 27 March 1942, his initial program did not
include the conscription of foreign workers; and it is supposed to
have been Hitler who intervened then. For it is striking, Your Honors,
when you read the minutes of the interrogations and also, I am
sure, when the defendants speak before the Tribunal, you will see
that most of them take refuge behind two great shadows; the
shadow of the former Führer and the shadow of his accursed
second, Himmler. Here we can see Hitler intervening to tell Sauckel,
according to the latter, that the use of foreign workers in the
occupied territories is not contrary to the Hague Convention for two
reasons; firstly, the countries involved surrendered unconditionally
and consequently we can impose any kind of labor conditions on
them, and secondly because Russia has not signed this convention.
If, therefore, we use Russian workers on compulsory labor and make
them work to death, we are not violating the Hague Convention.
This, Your Honors, is the reasoning of the Defendant Sauckel on
this point, without the addition of a single word. Hitler is supposed
to have ordered him to recruit workers, at first using persuasion and
then all the means of compulsion which you already know;
suppression of ration cards, for instance, which compelled men, who
saw their wives and children starving, to volunteer for work which
would be used against their own fellow citizens and against the
soldiers of the Allied armies with whom all their sympathies lay.
The Tribunal will know how to deal with such an excuse for, in
the first place, Sauckel, by virtue of the powers conferred upon him
by his office, enjoyed full authority in regard to everything to do with
the labor necessary for the execution of the Four Year Plan. On the
other hand, on taking up his appointment as Plenipotentiary for
Labor Allocation, Sauckel knew that he would be unable to carry out
his mission without resorting sooner or later to means of coercion.
In any case, Sauckel, as well as most of the defendants who are
before you, enjoyed the most extensive powers, indeed autonomous
powers. Consequently, he cannot shelter behind orders received.
THE PRESIDENT: M. Mounier, you must forgive me if I interrupt
you; but as I pointed out yesterday, I think, we have already had an
opening statement which contained argument from the United
States, from Great Britain, and from M. De Menthon on behalf of
France, and we have, in the past, confined other counsel. . . .
Do you hear me? I was saying that after having heard the
opening statement from the United States, from Great Britain, and
from France, we have in the past, confined the counsel who have
followed them to a presentation of evidence and have not permitted
them to go into an argument.
I am not sure that that rule has been strictly carried out in all
cases because it is, perhaps, somewhat difficult to confine the
matter; but we have, on several occasions, pointed out to counsel
who have followed the counsel who made the leading statement that
they ought to confine themselves to a presentation of the evidence.
I think the Tribunal would wish you, if possible, to adhere to that
rule and, therefore, not to argue the case but to present the
evidence, that is to say, to refer us to the evidence insofar as it has
already been put in evidence; to refer us to it by its number, possibly
stating what the substance of the evidence is; and, in reference to
any document which has not yet been put in evidence, to read such
parts of that document as you think necessary.
M. MOUNIER: Very well, Mr. President, to meet the wishes of the
Tribunal, I shall limit myself, as concerns the Defendant Sauckel, to
referring to figures which, it seems to me, do not admit of
argument, since they are the figures given by the Defendant Sauckel
himself under interrogation. This does not seem to me to infringe
upon the rule which the President has just drawn to my attention.
The figures stated are the following: In 1942 there were already
a million foreign workers in Germany. In one year Sauckel
incorporated into the economy of the Reich some 1,600,000 war
prisoners to meet the needs of war economy.
I beg to refer the Tribunal to Exhibit Number RF-1411 in my
document book. This is an interrogation of the Defendant Speer
under the date of 18 October 1945, which has already been
submitted by the United States Prosecution on 12 December 1945,
under Exhibit Number USA-220 (Document Number 3720-PS). In this
interrogation the Defendant Speer states that 40 percent of all
prisoners of war were employed in the production of arms and
munitions and in related industries.
I likewise offer under Exhibit Number RF-1412 (Document
Number 1292-PS) of 13 December 1945, a memorandum signed by
Lammers, Secretary of the Reich Chancellery, giving an account of
the discussion which occurred at a conference held on 4 January
1944. On that date, 4 January 1944, in the course of a conference,
at which, in addition to the Defendant Sauckel, the Führer himself,
Himmler, Speer, Keitel, Field Marshal Milch, and others were present,
the number of new workers to be furnished by Sauckel was fixed at
four million.
I must mention in this connection that in the course of this
meeting, Sauckel expressed doubts as to the possibility of furnishing
this number of workers unless he were given sufficient police forces.
Himmler replied that he would try to help Sauckel to achieve this
objective by means of increased pressure.
Consequently, when the Defendant Sauckel claims, as he
probably will do, that he had absolutely nothing to do with the
institution now spurned by everyone, known as the Gestapo, we
may answer him by official German documents showing that for the
recruitment of labor he really did employ the police with all the more
or less condemned means already pointed out to you.
As for France alone, the demand for workers at the beginning of
1944 amounted to one million; and this figure was over and above
the number of men and women workers already sent to Germany,
who in June 1944 numbered one million to one and a half million.
The Defendant Sauckel, therefore, committed the offenses
already known to the Court. We have an old adage, an old slogan
we may say, according to which “The court is the law”; and it is
proper to present only the facts. I shall, therefore, abstain from
reading the passage on Page 9 of my presentation dealing with
those articles of the law under which the activities of the accused,
Sauckel, are punishable.
Mr. President, Your Honors, I should like now to summarize the
activity of the Defendant Speer, for as regards France and the
western countries the Defendant Speer incurs responsibilities of the
same nature as those of the Defendant Sauckel. Like the defendant
of whom I have just spoken, he permitted violations of the laws of
war, violations of the laws of humanity, in working towards the
drafting and carrying out of a vast program of forced deportation
and enslavement of the occupied countries.
Speer, Mr. President, first took part in working out the program of
forced labor and collaborated in its adoption. In the course of his
interrogatory, he stated under oath: First, that he took part in the
discussion at which the decision to use forced labor was made;
second, that he collaborated in the execution of this plan; third, that
the basis of this program was the removal to Germany by force of
foreign workers on the authority of Sauckel, Plenipotentiary for
Allocation of Labor under the Four Year Plan. The Tribunal will kindly
refer to Document Number 3720-PS, submitted by the United States
Delegation on 12 December 1945, which I quote under Exhibit
Number RF-1411 of our documentation.
As regards France, in particular, Hitler and the Defendant Speer
held a conference on 4 January 1943 in the course of which it was
decided that more severe measures would be taken to expedite the
recruiting of French civilian workers without discrimination between
skilled and unskilled workers. This is made clear by a note to which I
would ask the Tribunal to refer. That is a note signed by Fritz
Sauckel, himself. It has already been presented by the American
Prosecution under Document Number 556-PS (Exhibit Number RF-
67).
The Defendant Speer knew that the levies for forced labor in the
occupied territories were obtained by violence and terror. He
approved the continuation of these methods from September 1942
onward. He knew, for instance, that workers were deported by force
from the Ukraine to work in the Reich. He knew, likewise, that the
great majority of workers in the occupied regions of the West were
sent to Germany against their will. He even declared before the
American magistrate who was questioning him that he considered
these methods regular and legal.
The Defendant Speer, knowing that the foreign workers were
recruited and deported for forced labor in Germany, made specific
demands for foreign workers and provided for their employment in
the various branches of activity placed under his direction.
The preceding paragraphs summarize all the declarations made
by the defendant in the course of the interrogation already
mentioned and to which I have just referred.
I beg to remind you that Speer, in addition, was a member of the
Central Committee of the Four Year Plan. On account of this, and in
common with Field Marshal Milch, only Hitler and Göring were
superior to him as far as demands for labor were concerned. He
likewise took part, in this capacity, in discussions which took place
with Hitler to settle the numbers of foreign workers required. He
knew that most of these forces were obtained by means of
deportation, through coercion and enslavement of the occupied
countries. Proof of this is furnished by various passages of the
minutes of the Central Committee of the Plan and from Speer’s
conferences with Hitler. I refer to Document Numbers R-123 and R-
124 which have been submitted under Exhibit Number USA-179, on
12 December 1945 (Exhibit Number RF-1414).
Speer did not hesitate to resort to methods of terrorism and
brutality as a means of achieving a peak output from the forced
workers. He found justification for the action of the SS and of the
police and for the use of concentration camps to subdue
recalcitrants.
I beg to recall to the Tribunal the document relating to the
minutes of the 21st meeting of the Central Committee of the Four
Year Plan, 30 October 1942, Page 1059, already quoted. This is the
document which I quoted previously, Exhibit Number USA-179,
Document Numbers R-123 and R-124 on 12 December 1945 (Exhibit
Number RF-1414).
The Defendant Speer likewise bears responsibility for the use of
prisoners of war in military operations directed against their
countries; for in his capacity as chief of the Todt Organization, he
forced citizens of the Allied nations to work for this organization,
particularly, in the building of fortifications and, among other things,
the famous West Wall. He likewise forced Frenchmen, Belgians,
Luxembourgers, Dutchmen, Norwegians, and Danes to manufacture
arms to be utilized against the allies of the countries to which they
themselves belonged.
Finally—and this is a very important question regarding the
responsibility of the Defendant Speer—he participated directly in the
use of internees from the concentration camps. He proposed the use
of internees from the concentration camps in the armament
factories. Now, in view of the wretched physical condition of the
prisoners, no profit but only the extermination of the prisoners could
be expected from this measure. The use of internees from the
concentration camps in the factories had the effect of increasing the
demand for this type of labor; and this demand was satisfied in part,
at least, by sending to the concentration camps persons who, in
ordinary times, would never have been sent there.
Speer went so far as to establish, near the factories,
concentration camps which served solely to feed them with labor.
He knew the Mauthausen Camp. The Spanish witness, Boix,
whom the Tribunal heard a few days ago, attested under oath that
he had seen, with his own eyes, the Defendant Speer visit the camp
at Mauthausen and congratulate the directors of this camp. He even
declared that he had worked on the preparation of photographs of
this scene. Consequently this visit to the camp must be considered,
absolutely beyond doubt. He therefore saw for himself the barbarous
conditions in which the prisoners lived. Nevertheless, he persisted in
utilizing labor from the Camp of Mauthausen in the factories under
his authority.
I have concluded the case against Speer.
THE PRESIDENT: We will adjourn now for 10 minutes.
[A recess was taken.]