Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650543
P. Suresh, K. Radhika
Security and user privacy are areas of concern in digital transactions over a network. Integration of biometric pattern matching into an identity management system (IMS) enhances security of transactions and improves ease of use. Privacy of users in a biometric based system is improved by using keys generated directly from feature sets instead of conventional stored templates. This paper proposes a framework for integrating biometric key based authentication into an IMS. The generated keys need to be consistent. Consistency of keys is attained if the same key is generated for every instance of biometric input. Generation of long and consistent keys directly from feature sets poses a challenge due to intra and inter user variations inherent to biometric data. A novel methodology for generating consistent keys using principles of vector quantization and cluster based learning is introduced. 15-bit keys have been extracted from handwritten signature datasets. The results are promising and can be extended to multi-modal biometric feature sets.
{"title":"Biometric based Consistent Key Generation for IMS","authors":"P. Suresh, K. Radhika","doi":"10.1109/TENCON.2018.8650543","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650543","url":null,"abstract":"Security and user privacy are areas of concern in digital transactions over a network. Integration of biometric pattern matching into an identity management system (IMS) enhances security of transactions and improves ease of use. Privacy of users in a biometric based system is improved by using keys generated directly from feature sets instead of conventional stored templates. This paper proposes a framework for integrating biometric key based authentication into an IMS. The generated keys need to be consistent. Consistency of keys is attained if the same key is generated for every instance of biometric input. Generation of long and consistent keys directly from feature sets poses a challenge due to intra and inter user variations inherent to biometric data. A novel methodology for generating consistent keys using principles of vector quantization and cluster based learning is introduced. 15-bit keys have been extracted from handwritten signature datasets. The results are promising and can be extended to multi-modal biometric feature sets.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650121
R. Embong, Siti Rohani Anuar
Reading mammography images has always been a challenging task even for experienced radiologists. With the advancements in computer technology, machine tools such as the Computer Aided Detection and Diagnosis (CAD) systems are widely engaged as a second reader to assist radiologists in image reading. One of the important processes in the CAD machine is the segmentation process. The morphological watershed algorithm is one of the hybrid technique that combines boundary and region criteria, but this algorithm has several drawbacks such as over-segmentation and sensitive to noise. In this research, the denoising method applies the Principal Component Analysis (PCA) filtering. Prior to the segmentation by the watershed algorithm, the Fuzzy C-Means (FCM) clustering algorithm is used to identify the image foreground, which is the region of interest (abnormality region). A marker-controlled watershed algorithm is implemented to overcome the over-segmentation drawback. Furthermore, applying a suitable shape of structuring element in the watershed algorithm has the same effect of reducing the over-segmentation problem. Thus, three shapes of structuring elements, which are the disk, diamond, and octagon are tested and compared. The aim of this research is to find a suitable shape of structuring element for the marker-controlled watershed algorithm. For the evaluation of the segmentation performance, three evaluation methods are used, which are the Jaccard Index (JI), Dice Similarity Coefficient (DSC) and Figure of Merit (FOM). The result of the comparison shows that the diamond-shaped structuring element is a suitable shape for the segmentation of mammography images.
即使对经验丰富的放射科医生来说,阅读乳房x光检查图像也一直是一项具有挑战性的任务。随着计算机技术的进步,诸如计算机辅助检测和诊断(CAD)系统之类的机床被广泛用作辅助放射科医生阅读图像的第二阅读器。在CAD机器中,一个重要的过程是分割过程。形态分水岭算法是一种边界准则和区域准则相结合的混合算法,但该算法存在过度分割和对噪声敏感等缺点。在本研究中,降噪方法采用主成分分析(PCA)滤波。在分水岭算法分割之前,使用模糊c均值(FCM)聚类算法识别图像前景,即感兴趣的区域(异常区域)。为了克服过度分割的缺点,提出了一种标记控制分水岭算法。此外,在分水岭算法中采用合适的结构元素形状,同样可以减少过度分割问题。因此,对三种形状的结构单元,即盘形、菱形和八角形进行了测试和比较。本研究的目的是为标记控制分水岭算法寻找合适的结构元素形状。对于分割效果的评价,采用了三种评价方法:Jaccard Index (JI)、Dice Similarity Coefficient (DSC)和Figure of Merit (FOM)。对比结果表明,菱形结构单元是一种适合于乳房x线图像分割的形状。
{"title":"Structuring Elements in the Watershed Algorithm for the Segmentation of Mammography Images","authors":"R. Embong, Siti Rohani Anuar","doi":"10.1109/TENCON.2018.8650121","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650121","url":null,"abstract":"Reading mammography images has always been a challenging task even for experienced radiologists. With the advancements in computer technology, machine tools such as the Computer Aided Detection and Diagnosis (CAD) systems are widely engaged as a second reader to assist radiologists in image reading. One of the important processes in the CAD machine is the segmentation process. The morphological watershed algorithm is one of the hybrid technique that combines boundary and region criteria, but this algorithm has several drawbacks such as over-segmentation and sensitive to noise. In this research, the denoising method applies the Principal Component Analysis (PCA) filtering. Prior to the segmentation by the watershed algorithm, the Fuzzy C-Means (FCM) clustering algorithm is used to identify the image foreground, which is the region of interest (abnormality region). A marker-controlled watershed algorithm is implemented to overcome the over-segmentation drawback. Furthermore, applying a suitable shape of structuring element in the watershed algorithm has the same effect of reducing the over-segmentation problem. Thus, three shapes of structuring elements, which are the disk, diamond, and octagon are tested and compared. The aim of this research is to find a suitable shape of structuring element for the marker-controlled watershed algorithm. For the evaluation of the segmentation performance, three evaluation methods are used, which are the Jaccard Index (JI), Dice Similarity Coefficient (DSC) and Figure of Merit (FOM). The result of the comparison shows that the diamond-shaped structuring element is a suitable shape for the segmentation of mammography images.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132784457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650083
Himanshi Sharma, Akash Sachan, Kandarp Gupta, V. Sreejith
Activity detection using radio signals has attracted a lot of research interest lately. A useful smart-healthcare application lies in monitoring an elderly person and anticipating possibly alarming situations. This paper proposes an elderly fall detection using radio frequency with cognitive sensing. The proposed approach uses cognitive sensing to identify the least used Wi-Fi channel and subsequently switches to that particular channel for least disturbances. The proposed method uses Wi-Fi (IEEE 802.11) to detect a person’s activity in a non-invasive manner. The system uses Received Signal Strength to trace the movements of the person. Using machine learning techniques, patterns associated with the person’s activities are identified. The experiments performed to demonstrate that the system can detect a human fall with an accuracy of around 70%.
{"title":"A Received Signal Strength Based Fall Detection System Using Cognitive Sensing","authors":"Himanshi Sharma, Akash Sachan, Kandarp Gupta, V. Sreejith","doi":"10.1109/TENCON.2018.8650083","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650083","url":null,"abstract":"Activity detection using radio signals has attracted a lot of research interest lately. A useful smart-healthcare application lies in monitoring an elderly person and anticipating possibly alarming situations. This paper proposes an elderly fall detection using radio frequency with cognitive sensing. The proposed approach uses cognitive sensing to identify the least used Wi-Fi channel and subsequently switches to that particular channel for least disturbances. The proposed method uses Wi-Fi (IEEE 802.11) to detect a person’s activity in a non-invasive manner. The system uses Received Signal Strength to trace the movements of the person. Using machine learning techniques, patterns associated with the person’s activities are identified. The experiments performed to demonstrate that the system can detect a human fall with an accuracy of around 70%.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650078
Mar Francis D. De Guzman, C. G. Hilario, J. Marciano
Propagation in maritime environment dynamically change due to the direct impact of ocean wave undulation to the antenna position and orientation. This paper presents an approach in characterizing signal propagation in a maritime environment by replicating ocean wave-induced antenna motions in a semi-anechoic chamber. The proposed setup may also be used to test mismatch and misalignment mitigating techniques in a controlled environment. The effect on the received signal power of angular motions such as roll, and pitch due to ocean wave undulation, which causes polarization mismatch and antenna misalignment, were investigated in this study. Different setup configurations were applied by varying the tilting orientation, tilting period and tilting range of the antenna in order to replicate various sea state conditions. Measurements reveal the extent of signal degradation due to polarization mismatch and antenna misalignment, and how received signal power degrades with the tilting range. Signal power deviation was measured to reach up to 3 dB and signal power was measured to swing up to 10dB.
{"title":"Empirical Measurements of Antenna Polarization Mismatch and Misalignment Due to Angular Motion","authors":"Mar Francis D. De Guzman, C. G. Hilario, J. Marciano","doi":"10.1109/TENCON.2018.8650078","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650078","url":null,"abstract":"Propagation in maritime environment dynamically change due to the direct impact of ocean wave undulation to the antenna position and orientation. This paper presents an approach in characterizing signal propagation in a maritime environment by replicating ocean wave-induced antenna motions in a semi-anechoic chamber. The proposed setup may also be used to test mismatch and misalignment mitigating techniques in a controlled environment. The effect on the received signal power of angular motions such as roll, and pitch due to ocean wave undulation, which causes polarization mismatch and antenna misalignment, were investigated in this study. Different setup configurations were applied by varying the tilting orientation, tilting period and tilting range of the antenna in order to replicate various sea state conditions. Measurements reveal the extent of signal degradation due to polarization mismatch and antenna misalignment, and how received signal power degrades with the tilting range. Signal power deviation was measured to reach up to 3 dB and signal power was measured to swing up to 10dB.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650326
Md. Tareq Mahmud, Md. Obaidur Rahman, M. Hassan
In this era of Internet of Things (IoT), most of the contemporary researches provide a new dimension of cooperation called Control Channel cooperation to eliminate hidden terminal problem, as well as deafness problem while using directional antenna in a multichannel environment for wireless networks. However, only using such concept of cooperation may increase the communication latency for iterative control channel negotiation. Therefore, cooperation may not only use in information sharing, can be used for relaying data frame to improve throughput and minimize the data transmission delay. In this paper, we have proposed a Two-Dimensional Cooperation-based Asynchronous Multichannel Directional MAC protocol (2D-CMD MAC) that combines both of these cooperation and multi-channel directional concepts of cooperation. This joint concept of cooperation solves the multichannel directional hidden terminal and deafness problems using cooperative information sharing. In addition, cooperation for relaying data in data channel increases the throughput by minimizing the data transmission delay and enhances the channel bandwidth utilization by obtaining parallel transmission in the same data channel. The simulation results show that 2D-CMD MAC improves the network performance in terms of throughput obtained from cooperative data transmission and parallel transmission in same data channel and packet delivery ratio.
{"title":"Two-Dimensional Cooperation-based Asynchronous Multichannel Directional MAC Protocol for Wireless Networks","authors":"Md. Tareq Mahmud, Md. Obaidur Rahman, M. Hassan","doi":"10.1109/TENCON.2018.8650326","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650326","url":null,"abstract":"In this era of Internet of Things (IoT), most of the contemporary researches provide a new dimension of cooperation called Control Channel cooperation to eliminate hidden terminal problem, as well as deafness problem while using directional antenna in a multichannel environment for wireless networks. However, only using such concept of cooperation may increase the communication latency for iterative control channel negotiation. Therefore, cooperation may not only use in information sharing, can be used for relaying data frame to improve throughput and minimize the data transmission delay. In this paper, we have proposed a Two-Dimensional Cooperation-based Asynchronous Multichannel Directional MAC protocol (2D-CMD MAC) that combines both of these cooperation and multi-channel directional concepts of cooperation. This joint concept of cooperation solves the multichannel directional hidden terminal and deafness problems using cooperative information sharing. In addition, cooperation for relaying data in data channel increases the throughput by minimizing the data transmission delay and enhances the channel bandwidth utilization by obtaining parallel transmission in the same data channel. The simulation results show that 2D-CMD MAC improves the network performance in terms of throughput obtained from cooperative data transmission and parallel transmission in same data channel and packet delivery ratio.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650212
Hiroyuki Kobayashi, Kazuo Kumamoto, Tsutomu Yoshimura, T. Haga, M. Iyota, M. Katoh
This paper deals with the educational scheme of PBL (project based learning), in which student groups build autonomous robotic vehicles for a competition game.In their scheme, students are split into 4 expert groups which consist of mechanism, actuator/power, sensor/communication, and embedded system groups. Students are given lectures in each group at first to be "experts", then form teams to build vehicles.One of the most challenging point is to provide appropriate tools for embedded system group because students (freshmen) are very beginner. For this purpose, the authors decided to employ "mbed" microcontroller development board and on-line development tools. In addition, studentes are given some fundamental function circuit boards such as motor driver board to build vehicle easily without soldering.This PBL was held as a lecture of nearly 400 students and its results are also discussed in this paper.
{"title":"A Design of Engineering PBL on Embedded System for Novice Freshmen Students","authors":"Hiroyuki Kobayashi, Kazuo Kumamoto, Tsutomu Yoshimura, T. Haga, M. Iyota, M. Katoh","doi":"10.1109/TENCON.2018.8650212","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650212","url":null,"abstract":"This paper deals with the educational scheme of PBL (project based learning), in which student groups build autonomous robotic vehicles for a competition game.In their scheme, students are split into 4 expert groups which consist of mechanism, actuator/power, sensor/communication, and embedded system groups. Students are given lectures in each group at first to be \"experts\", then form teams to build vehicles.One of the most challenging point is to provide appropriate tools for embedded system group because students (freshmen) are very beginner. For this purpose, the authors decided to employ \"mbed\" microcontroller development board and on-line development tools. In addition, studentes are given some fundamental function circuit boards such as motor driver board to build vehicle easily without soldering.This PBL was held as a lecture of nearly 400 students and its results are also discussed in this paper.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650302
Ukrist Srisamarn, L. Pradittasnee
Recently, computer networks become one of the main components of the business processes in most organizations in the world. The size and complexity of network systems also continue to rapidly grow every year. When the networks become larger, many traffic flows are likely to propagate in the network at the same time. This event can lead to multiple performance problems, such as congestion, and slow response time. Traffic distribution mechanism is one of the main solutions for solving congestion problem. It aims to reduce the probability of congestion by splitting the traffic load into multiple paths. Furthermore, applying traffic distribution technique with Software-Defined Networking (SDN) is a promising solution that can effectively support both large-scale network implementation and also does not add high level of complexity to the network system. In this paper, the traffic distribution mechanism based on modified OpenFlow is proposed. The proposed method aims to decrease response time that a SDN switch must wait for the control message back from the SDN controller. It can be achieved by allowing the SDN controller to add the new flow entries for distributing the traffic load before the packet arrives at the SDN switch. The simulation experiments are conducted in Mininet to compare the performance between the proposed traffic distribution mechanism (TDm) and the traffic distribution mechanism based on OpenFlow (TDo). The results from the experiments show that TDm can provide much better performance in term of End-to-End delay (E2E delay) and Packet delivery ratio (PDR) than TDo in most of the experiment scenarios. However, both traffic distribution mechanisms (TDo and TDm) cannot provide good performance in term of E2E delay and PDR when the data transmission rate equals or higher than 500 Mbps. As a result, Time-Sleep mechanism is proposed to implement in SDN controller. The results from the simulation experiments show that Time-Sleep mechanism can notably improve the overall performance of both TDo and TDm even when the data transmission rate is high.
{"title":"A Study of Improving Traffic Distribution Mechanism in Software-Defined Networking","authors":"Ukrist Srisamarn, L. Pradittasnee","doi":"10.1109/TENCON.2018.8650302","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650302","url":null,"abstract":"Recently, computer networks become one of the main components of the business processes in most organizations in the world. The size and complexity of network systems also continue to rapidly grow every year. When the networks become larger, many traffic flows are likely to propagate in the network at the same time. This event can lead to multiple performance problems, such as congestion, and slow response time. Traffic distribution mechanism is one of the main solutions for solving congestion problem. It aims to reduce the probability of congestion by splitting the traffic load into multiple paths. Furthermore, applying traffic distribution technique with Software-Defined Networking (SDN) is a promising solution that can effectively support both large-scale network implementation and also does not add high level of complexity to the network system. In this paper, the traffic distribution mechanism based on modified OpenFlow is proposed. The proposed method aims to decrease response time that a SDN switch must wait for the control message back from the SDN controller. It can be achieved by allowing the SDN controller to add the new flow entries for distributing the traffic load before the packet arrives at the SDN switch. The simulation experiments are conducted in Mininet to compare the performance between the proposed traffic distribution mechanism (TDm) and the traffic distribution mechanism based on OpenFlow (TDo). The results from the experiments show that TDm can provide much better performance in term of End-to-End delay (E2E delay) and Packet delivery ratio (PDR) than TDo in most of the experiment scenarios. However, both traffic distribution mechanisms (TDo and TDm) cannot provide good performance in term of E2E delay and PDR when the data transmission rate equals or higher than 500 Mbps. As a result, Time-Sleep mechanism is proposed to implement in SDN controller. The results from the simulation experiments show that Time-Sleep mechanism can notably improve the overall performance of both TDo and TDm even when the data transmission rate is high.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128885058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650533
C. Hsieh
This paper presents a remedy for the recently proposed (time) distributed multi-step delayed input and state estimation (DMSDISE) using a modified unknown input reconstruction model. It shows how, using this new input reconstruction model, the DMSDISE filtering deterioration problem can be solved, and its performance restored to the optimal solution. A comprehensive study on the filtering degradation of the DMSDISE is conducted, and a new design using the delayed elimination technique is also proposed. Simulation results are given to show the effectiveness of the proposed results.
{"title":"A Remedy for Time Distributed Multi-Step Delayed Input and State Estimation","authors":"C. Hsieh","doi":"10.1109/TENCON.2018.8650533","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650533","url":null,"abstract":"This paper presents a remedy for the recently proposed (time) distributed multi-step delayed input and state estimation (DMSDISE) using a modified unknown input reconstruction model. It shows how, using this new input reconstruction model, the DMSDISE filtering deterioration problem can be solved, and its performance restored to the optimal solution. A comprehensive study on the filtering degradation of the DMSDISE is conducted, and a new design using the delayed elimination technique is also proposed. Simulation results are given to show the effectiveness of the proposed results.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134479724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650313
A. Paglinawan, F. Cruz, Nicko D. Casi, Paul Augustine B. Ingatan, Ariel Bastian C. Karganilla, Gio Vincent G. Moster
Concrete structures are subjected to crack formation over time. The causes of crack formation are shrinkage, thermal stress, weathering, etc. This paper is about the construction and application of a device that uses image processing to detect cracks. The system is carried by a drone and can be remotely accessed. The system has a graphical user interface for initializing the device, viewing real time video, taking pictures of a crack, measuring its width, and evaluating if safe or unsafe. The pictures and their results are stored for reference.
{"title":"Crack Detection Using Multiple Image Processing for Unmanned Aerial Monitoring of Concrete Structure","authors":"A. Paglinawan, F. Cruz, Nicko D. Casi, Paul Augustine B. Ingatan, Ariel Bastian C. Karganilla, Gio Vincent G. Moster","doi":"10.1109/TENCON.2018.8650313","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650313","url":null,"abstract":"Concrete structures are subjected to crack formation over time. The causes of crack formation are shrinkage, thermal stress, weathering, etc. This paper is about the construction and application of a device that uses image processing to detect cracks. The system is carried by a drone and can be remotely accessed. The system has a graphical user interface for initializing the device, viewing real time video, taking pictures of a crack, measuring its width, and evaluating if safe or unsafe. The pictures and their results are stored for reference.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133815764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TENCON.2018.8650358
Soumen Biswas, Ranjay Hazra
In pathology, the count of WBC is done manually which yields imperfect results and hematology devices may solve the issues of erroneous results but the cost is very high. The motivation of this work is to provide an automated computer aided system (CAS) which analyses the microscopic blood images. In analysis, the image segmentation is a vital step and if any error occurs in this step inaccurate results may be obtained during cell detection. Initially, the microscopic blood image is converted to a binary image. Next, the segmentation process is employed to detect the blood cells from blood-smeared images. The thresholding estimation method is used to identify the proper blood cells from the gradient image. The gradient based region growing method is applied to detect the boundary of cells so as to prevent any kind of contact between the cells. The watershed transformation is applied over the thresholding based gradient image. The thresholding estimation method is very much efficient to detect the connected cells in gradient image. Finally, Circular Hough (CH) transformation is used to identify and count the different blood cells i.e., WBCs, RBCs, platelets etc from the microscopic blood image. The accuracy of this method is found 91% using a database of 50 blood samples obtained from microscope. Statistical analysis of image quality analysis i.e., SSIM (Structural Similarity Index Measure) of outcome images using the proposed method is also found to be higher than the other existing methods.
{"title":"A Hybrid Technique for Blood Cell Detection","authors":"Soumen Biswas, Ranjay Hazra","doi":"10.1109/TENCON.2018.8650358","DOIUrl":"https://doi.org/10.1109/TENCON.2018.8650358","url":null,"abstract":"In pathology, the count of WBC is done manually which yields imperfect results and hematology devices may solve the issues of erroneous results but the cost is very high. The motivation of this work is to provide an automated computer aided system (CAS) which analyses the microscopic blood images. In analysis, the image segmentation is a vital step and if any error occurs in this step inaccurate results may be obtained during cell detection. Initially, the microscopic blood image is converted to a binary image. Next, the segmentation process is employed to detect the blood cells from blood-smeared images. The thresholding estimation method is used to identify the proper blood cells from the gradient image. The gradient based region growing method is applied to detect the boundary of cells so as to prevent any kind of contact between the cells. The watershed transformation is applied over the thresholding based gradient image. The thresholding estimation method is very much efficient to detect the connected cells in gradient image. Finally, Circular Hough (CH) transformation is used to identify and count the different blood cells i.e., WBCs, RBCs, platelets etc from the microscopic blood image. The accuracy of this method is found 91% using a database of 50 blood samples obtained from microscope. Statistical analysis of image quality analysis i.e., SSIM (Structural Similarity Index Measure) of outcome images using the proposed method is also found to be higher than the other existing methods.","PeriodicalId":132900,"journal":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}