首页 > 最新文献

Int. Arab J. Inf. Technol.最新文献

英文 中文
Deep learning based mobilenet and multi-head attention model for facial expression recognition 基于深度学习的mobilenet和多头注意模型的面部表情识别
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/3a/6
Aicha Nouisser, Ramzi Zouari, M. Kherallah
Facial expressions is an intuitive reflection of a person’s emotional state, and it is one of the most important forms of interpersonal communication. Due to the complexity and variability of human facial expressions, traditional methods based on handcrafted feature extraction have shown insufficient performances. For this purpose, we proposed a new system of facial expression recognition based on MobileNet model with the addition of skip connections to prevent the degradation in performance in deeper architectures. Moreover, multi-head attention mechanism was applied to concentrate the processing on the most relevant parts of the image. The experiments were conducted on FER2013 database, which is imbalanced and includes ambiguities in some images containing synthetic faces. We applied a pre-processing step of face detection to eliminate wrong images, and we implemented both SMOTE and Near-Miss algorithms to get a balanced dataset and prevent the model to being biased. The experimental results showed the effectiveness of the proposed framework which achieved the recognition rate of 96.02% when applying multi-head attention mechanism
面部表情是一个人情绪状态的直观反映,是人际交往的重要形式之一。由于人类面部表情的复杂性和可变性,传统的基于手工特征提取的方法表现出不足的性能。为此,我们提出了一种新的基于MobileNet模型的面部表情识别系统,并增加了跳跃连接,以防止在更深层次的架构中性能下降。此外,采用多头注意机制,将处理集中在图像最相关的部分。实验是在FER2013数据库上进行的,该数据库不平衡,并且在一些包含合成人脸的图像中存在歧义。我们采用人脸检测的预处理步骤来消除错误的图像,我们实现了SMOTE和Near-Miss算法来获得一个平衡的数据集,并防止模型偏差。实验结果表明,采用多头注意机制时,该框架的识别率达到96.02%
{"title":"Deep learning based mobilenet and multi-head attention model for facial expression recognition","authors":"Aicha Nouisser, Ramzi Zouari, M. Kherallah","doi":"10.34028/iajit/20/3a/6","DOIUrl":"https://doi.org/10.34028/iajit/20/3a/6","url":null,"abstract":"Facial expressions is an intuitive reflection of a person’s emotional state, and it is one of the most important forms of interpersonal communication. Due to the complexity and variability of human facial expressions, traditional methods based on handcrafted feature extraction have shown insufficient performances. For this purpose, we proposed a new system of facial expression recognition based on MobileNet model with the addition of skip connections to prevent the degradation in performance in deeper architectures. Moreover, multi-head attention mechanism was applied to concentrate the processing on the most relevant parts of the image. The experiments were conducted on FER2013 database, which is imbalanced and includes ambiguities in some images containing synthetic faces. We applied a pre-processing step of face detection to eliminate wrong images, and we implemented both SMOTE and Near-Miss algorithms to get a balanced dataset and prevent the model to being biased. The experimental results showed the effectiveness of the proposed framework which achieved the recognition rate of 96.02% when applying multi-head attention mechanism","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73473723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image segmentation with multi-feature fusion in compressed domain based on region-based graph 基于区域图的压缩域多特征融合图像分割
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/2/2
Hongchuan Luo, Bo Sun, Hang Zhou, Wenyuan Cao
Image segmentation plays a significant role in image processing and scientific research. In this paper, we develop a novel approach, which provides effective and robust performances for image segmentation based on the region-based (block-based) graph instead of pixel-based graph. The modified Discrete Cosine Transform (DCT) is applied to obtain the Square Block Structures (DCT-SBS) of the image in the compressed domain together with the coefficients, due to its low memory requirement and high processing efficiency on extracting the block feature. A novel weight computation approach focusing on multi-feature fusion from the location, texture and RGB-color information is employed to efficiently obtain weights between the DCT-SBS. The energy function is redesigned to meet the region-based requirement and can be easily transformed into the traditional Normalized cuts (Ncuts). The proposed image segmentation algorithm is applied to the salient region detection database and Corel1000 database. The performance results are compared with the state-of-the-art segmentation algorithms. Experimental results clearly show that our method outperforms other algorithms, and demonstrate good segmentation precision and high efficiency.
图像分割在图像处理和科学研究中有着重要的作用。在本文中,我们开发了一种新的方法,该方法基于基于区域(基于块)的图而不是基于像素的图,为图像分割提供了有效和鲁棒的性能。采用改进的离散余弦变换(DCT)在压缩域中获得图像的方形块结构(DCT- sbs)及其系数,由于其对内存的要求低,提取块特征的处理效率高。采用一种基于位置、纹理和rgb颜色信息的多特征融合的权重计算方法,有效地获得DCT-SBS之间的权重。对能量函数进行了重新设计,以满足基于区域的需求,并且可以很容易地转换为传统的归一化切割(Ncuts)。将所提出的图像分割算法应用于显著区域检测数据库和Corel1000数据库。性能结果与最先进的分割算法进行了比较。实验结果清楚地表明,该方法优于其他算法,具有良好的分割精度和高效率。
{"title":"Image segmentation with multi-feature fusion in compressed domain based on region-based graph","authors":"Hongchuan Luo, Bo Sun, Hang Zhou, Wenyuan Cao","doi":"10.34028/iajit/20/2/2","DOIUrl":"https://doi.org/10.34028/iajit/20/2/2","url":null,"abstract":"Image segmentation plays a significant role in image processing and scientific research. In this paper, we develop a novel approach, which provides effective and robust performances for image segmentation based on the region-based (block-based) graph instead of pixel-based graph. The modified Discrete Cosine Transform (DCT) is applied to obtain the Square Block Structures (DCT-SBS) of the image in the compressed domain together with the coefficients, due to its low memory requirement and high processing efficiency on extracting the block feature. A novel weight computation approach focusing on multi-feature fusion from the location, texture and RGB-color information is employed to efficiently obtain weights between the DCT-SBS. The energy function is redesigned to meet the region-based requirement and can be easily transformed into the traditional Normalized cuts (Ncuts). The proposed image segmentation algorithm is applied to the salient region detection database and Corel1000 database. The performance results are compared with the state-of-the-art segmentation algorithms. Experimental results clearly show that our method outperforms other algorithms, and demonstrate good segmentation precision and high efficiency.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81771404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the complex landscape of IoT forensics: challenges and emerging solutions 驾驭物联网取证的复杂格局:挑战和新兴解决方案
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/3a/7
Nurashidah Musa, N. Mirza, Adnan Ali
With the increasing proliferation of the Internet of Things (IoT) devices, digital forensics professionals face numerous challenges whilst investigating cybercrimes. The vast number of IoT devices, the heterogeneity of their formats, and the diversity of the data they generate make the identification and collection of relevant evidence a daunting task. In this research paper, we explore the complex landscape of IoT forensics, highlighting the major challenges and emerging solutions. We start by listing the available digital forensics models and frameworks. We then delve into evidence management during different IoT forensic investigation stages such as Identification, Acquisition, Preservation and Protection, Analysis and Correlation, Attack and Deficit Attribution and lastly Presentation. Furthermore, we highlight the current challenges, open issues and major security and privacy concerns related to IoT forensics. Finally, we review the state-of-the-art in IoT forensics, exploring the possible solutions proposed in recent literature. Overall, this paper provides a comprehensive overview of the current IoT forensics ecosystem, the challenges, and proposes the latest possible solutions, which is critical for ensuring the security and integrity of IoT-enabled critical infrastructures and can serves as a valuable resource for researchers and practitioners in the field
随着物联网(IoT)设备的日益普及,数字取证专业人员在调查网络犯罪时面临着许多挑战。物联网设备的数量庞大,其格式的异质性,以及它们产生的数据的多样性,使得识别和收集相关证据成为一项艰巨的任务。在本研究报告中,我们探讨了物联网取证的复杂格局,重点介绍了主要挑战和新兴解决方案。我们首先列出可用的数字取证模型和框架。然后,我们深入研究了不同物联网取证调查阶段的证据管理,如识别、获取、保存和保护、分析和关联、攻击和缺陷归因以及最后的呈现。此外,我们还强调了与物联网取证相关的当前挑战、开放问题以及主要安全和隐私问题。最后,我们回顾了物联网取证的最新进展,探索了最近文献中提出的可能解决方案。总体而言,本文全面概述了当前物联网取证生态系统、面临的挑战,并提出了最新的可能解决方案,这对于确保支持物联网的关键基础设施的安全性和完整性至关重要,可以作为该领域研究人员和从业者的宝贵资源
{"title":"Navigating the complex landscape of IoT forensics: challenges and emerging solutions","authors":"Nurashidah Musa, N. Mirza, Adnan Ali","doi":"10.34028/iajit/20/3a/7","DOIUrl":"https://doi.org/10.34028/iajit/20/3a/7","url":null,"abstract":"With the increasing proliferation of the Internet of Things (IoT) devices, digital forensics professionals face numerous challenges whilst investigating cybercrimes. The vast number of IoT devices, the heterogeneity of their formats, and the diversity of the data they generate make the identification and collection of relevant evidence a daunting task. In this research paper, we explore the complex landscape of IoT forensics, highlighting the major challenges and emerging solutions. We start by listing the available digital forensics models and frameworks. We then delve into evidence management during different IoT forensic investigation stages such as Identification, Acquisition, Preservation and Protection, Analysis and Correlation, Attack and Deficit Attribution and lastly Presentation. Furthermore, we highlight the current challenges, open issues and major security and privacy concerns related to IoT forensics. Finally, we review the state-of-the-art in IoT forensics, exploring the possible solutions proposed in recent literature. Overall, this paper provides a comprehensive overview of the current IoT forensics ecosystem, the challenges, and proposes the latest possible solutions, which is critical for ensuring the security and integrity of IoT-enabled critical infrastructures and can serves as a valuable resource for researchers and practitioners in the field","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84326649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T-LBERT with Domain Adaptation for Cross-Domain Sentiment Classification 基于领域自适应的T-LBERT跨领域情感分类
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/15
Hongye Cao, Qianru Wei, Jiangbin Zheng
Cross-domain sentiment classification transfers the knowledge from the source domain to the target domain lacking supervised information for sentiment classification. Existing cross-domain sentiment classification methods establish connections by extracting domain-invariant features manually. However, these methods have poor adaptability to bridge connections across different domains and ignore important sentiment information. Hence, we propose a Topic Lite Bidirectional Encoder Representations from Transformers (T-LBERT) model with domain adaption to improve the adaptability of cross-domain sentiment classification. It combines the learning content of the source domain and the topic information of the target domain to improve the domain adaptability of the model. Due to the unbalanced distribution of information in the combined data, we apply a two-layer attention adaptive mechanism for classification. A shallow attention layer is applied to weigh the important features of the combined data. Inspired by active learning, we propose a deep domain adaption layer, which actively adjusts model parameters to balance the difference and representativeness between domains. Experimental results on Amazon review datasets demonstrate that the T-LBERT model considerably outperforms other state-of-the-art methods. T-LBERT shows stable classification performance on multiple metrics.
跨领域情感分类将缺乏监督信息的知识从源领域转移到目标领域进行情感分类。现有的跨领域情感分类方法通过人工提取领域不变特征来建立联系。然而,这些方法对跨领域连接的适应性较差,并且忽略了重要的情感信息。因此,我们提出了一种具有领域自适应的话题精简双向编码器表示(T-LBERT)模型,以提高跨领域情感分类的适应性。将源领域的学习内容与目标领域的主题信息相结合,提高了模型的领域适应性。由于组合数据中的信息分布不平衡,我们采用了两层注意力自适应机制进行分类。使用一个浅关注层来权衡组合数据的重要特征。受主动学习的启发,我们提出了一种深度域自适应层,该层主动调整模型参数以平衡域间的差异和代表性。在亚马逊评论数据集上的实验结果表明,T-LBERT模型大大优于其他最先进的方法。T-LBERT在多个指标上表现出稳定的分类性能。
{"title":"T-LBERT with Domain Adaptation for Cross-Domain Sentiment Classification","authors":"Hongye Cao, Qianru Wei, Jiangbin Zheng","doi":"10.34028/iajit/20/1/15","DOIUrl":"https://doi.org/10.34028/iajit/20/1/15","url":null,"abstract":"Cross-domain sentiment classification transfers the knowledge from the source domain to the target domain lacking supervised information for sentiment classification. Existing cross-domain sentiment classification methods establish connections by extracting domain-invariant features manually. However, these methods have poor adaptability to bridge connections across different domains and ignore important sentiment information. Hence, we propose a Topic Lite Bidirectional Encoder Representations from Transformers (T-LBERT) model with domain adaption to improve the adaptability of cross-domain sentiment classification. It combines the learning content of the source domain and the topic information of the target domain to improve the domain adaptability of the model. Due to the unbalanced distribution of information in the combined data, we apply a two-layer attention adaptive mechanism for classification. A shallow attention layer is applied to weigh the important features of the combined data. Inspired by active learning, we propose a deep domain adaption layer, which actively adjusts model parameters to balance the difference and representativeness between domains. Experimental results on Amazon review datasets demonstrate that the T-LBERT model considerably outperforms other state-of-the-art methods. T-LBERT shows stable classification performance on multiple metrics.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87195718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network IPv4网络向虚拟化下一代IPv6网络过渡的挑战与缓解策略
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/9
Z. Ashraf, Adnan Sohail, Sohaib Latif, Abdul Hameed Pitafi, Muhammad Yousaf Malik
The rapid proliferation of the Internet has exhausted Internet Protocol version 4 (IPv4) addresses offered by Internet Assigned Number Authority (IANA). The new version of the IP i.e. IPv6 was launched by Internet Engineering Task Force (IETF) with new features, such as a simpler packet header, larger address space, new anycast addressing type, integrated security, efficient segment routing, and better Quality of Services (QoS). Virtualized network architectures such as Network Function Virtualization (NFV) and Software Defined Network (SDN) have been introduced. These new paradigms have entirely changed the way of internetworking and provide a lot of benefits in multiple domains of applications that have used SDN and NFV. ISPs are trying to move from existing IPv4 physical networks to virtualized next-generation IPv6 networks gradually. The transition from physical IPv4 to software-based IPv6 is very slow due to the usage of IPv4 addresses by billions of devices around the globe. IPv4 and IPv6 protocols are different in format and behaviour. Therefore, direct communication between IPv4 and IPv6 is not possible. Both protocols will co-exist for a long time during transition despite the incompatibility issues. The core issues between IPv4 and IPv6 protocols are compatibility, interoperability, and security. The transition creates many challenges for ISPs during shifting the network toward a software-based IPv6 network. Packet traversing, routing scalability, the guarantee of performance, and security are the main challenges faced by ISPs. In this research, we focused on a qualitative and comprehensive survey. We summarize the challenges during the transition process, recommended appropriate solutions, and an in-depth analysis of their mitigations during moving towards the next-generation virtual IPv6 network
互联网的快速增长已经耗尽了互联网号码分配机构(IANA)提供的互联网协议版本4 (IPv4)地址。新版本的IP即IPv6是由互联网工程任务组(IETF)推出的,具有新特性,如更简单的数据包头,更大的地址空间,新的任播寻址类型,集成安全性,高效的段路由和更好的服务质量(QoS)。虚拟化网络架构,如网络功能虚拟化(NFV)和软件定义网络(SDN)已经被引入。这些新的范例完全改变了互连网络的方式,并为使用SDN和NFV的多个应用领域提供了很多好处。互联网服务提供商正试图逐步从现有的IPv4物理网络转向虚拟化的下一代IPv6网络。由于全球数十亿设备使用IPv4地址,从物理IPv4到基于软件的IPv6的过渡非常缓慢。IPv4和IPv6协议在格式和行为上是不同的。因此,IPv4和IPv6之间不可能直接通信。尽管存在不兼容性问题,但两种协议将在过渡期间长期共存。IPv4和IPv6协议的核心问题是兼容性、互操作性和安全性。在将网络转向基于软件的IPv6网络的过程中,这种转变给isp带来了许多挑战。报文的遍历、路由的可扩展性、性能的保证和安全性是网络服务提供商面临的主要挑战。在本研究中,我们着重于定性和全面的调查。我们总结了过渡过程中的挑战,推荐了适当的解决方案,并深入分析了在迈向下一代虚拟IPv6网络期间的缓解措施
{"title":"Challenges and Mitigation Strategies for Transition from IPv4 Network to Virtualized Next-Generation IPv6 Network","authors":"Z. Ashraf, Adnan Sohail, Sohaib Latif, Abdul Hameed Pitafi, Muhammad Yousaf Malik","doi":"10.34028/iajit/20/1/9","DOIUrl":"https://doi.org/10.34028/iajit/20/1/9","url":null,"abstract":"The rapid proliferation of the Internet has exhausted Internet Protocol version 4 (IPv4) addresses offered by Internet Assigned Number Authority (IANA). The new version of the IP i.e. IPv6 was launched by Internet Engineering Task Force (IETF) with new features, such as a simpler packet header, larger address space, new anycast addressing type, integrated security, efficient segment routing, and better Quality of Services (QoS). Virtualized network architectures such as Network Function Virtualization (NFV) and Software Defined Network (SDN) have been introduced. These new paradigms have entirely changed the way of internetworking and provide a lot of benefits in multiple domains of applications that have used SDN and NFV. ISPs are trying to move from existing IPv4 physical networks to virtualized next-generation IPv6 networks gradually. The transition from physical IPv4 to software-based IPv6 is very slow due to the usage of IPv4 addresses by billions of devices around the globe. IPv4 and IPv6 protocols are different in format and behaviour. Therefore, direct communication between IPv4 and IPv6 is not possible. Both protocols will co-exist for a long time during transition despite the incompatibility issues. The core issues between IPv4 and IPv6 protocols are compatibility, interoperability, and security. The transition creates many challenges for ISPs during shifting the network toward a software-based IPv6 network. Packet traversing, routing scalability, the guarantee of performance, and security are the main challenges faced by ISPs. In this research, we focused on a qualitative and comprehensive survey. We summarize the challenges during the transition process, recommended appropriate solutions, and an in-depth analysis of their mitigations during moving towards the next-generation virtual IPv6 network","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88586792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative study on deep learning and machine learning models for human action recognition in aerial videos 航拍视频中人体动作识别的深度学习与机器学习模型比较研究
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/4/2
Surbhi Kapoor, Akashdeep Sharma, Aman Verma, Vishal Dhull, Chahat Goyal
Unmanned Aerial Vehicle )UAV( finds its significant application in video surveillance due to its low cost, high portability and fast-mobility. In this paper, the proposed approach focuses on recognizing the human activity in aerial video sequences through various keypoints detected on the human body via OpenPose. The detected keypoints are passed onto machine learning and deep learning classifiers for classifying the human actions. Experimental results demonstrate that multilayer perceptron and SVM outperformed all the other classifiers by reporting an accuracy of 87.80% and 87.77% respectively whereas LSTM did not produce very good results as compared to other classifiers. Stacked Long Short-Term Memory networks (LSTM( produced an accuracy of 71.30% and Bidirectional LSTM yielded an accuracy of 76.04%. The results also indicate that machine learning models performed better than deep learning models. The major reason for this finding is the lesser availability of data and the deep learning models being data hungry models require a large amount of data to work upon. The paper also analyses the failure cases of OpenPose by testing the system on aerial videos captured by a drone flying at a higher altitude. This work provides a baseline for validating machine learning classifiers and deep learning classifiers against recognition of human action from aerial videos.
无人机(Unmanned Aerial Vehicle, UAV)以其低成本、高便携性和快速机动性在视频监控中得到了广泛的应用。本文提出的方法侧重于通过OpenPose在人体上检测到的各种关键点来识别航拍视频序列中的人体活动。检测到的关键点被传递给机器学习和深度学习分类器,用于对人类行为进行分类。实验结果表明,多层感知器和支持向量机的准确率分别为87.80%和87.77%,优于所有其他分类器,而LSTM的准确率则不如其他分类器。堆叠长短期记忆网络(LSTM)的准确率为71.30%,双向LSTM的准确率为76.04%。结果还表明,机器学习模型比深度学习模型表现得更好。这一发现的主要原因是数据的可用性较低,而深度学习模型是数据饥渴型模型,需要大量的数据来处理。通过对无人机在高空拍摄的航拍视频进行测试,分析了OpenPose系统的故障情况。这项工作为验证机器学习分类器和深度学习分类器对航空视频中人类行为的识别提供了基线。
{"title":"A comparative study on deep learning and machine learning models for human action recognition in aerial videos","authors":"Surbhi Kapoor, Akashdeep Sharma, Aman Verma, Vishal Dhull, Chahat Goyal","doi":"10.34028/iajit/20/4/2","DOIUrl":"https://doi.org/10.34028/iajit/20/4/2","url":null,"abstract":"Unmanned Aerial Vehicle )UAV( finds its significant application in video surveillance due to its low cost, high portability and fast-mobility. In this paper, the proposed approach focuses on recognizing the human activity in aerial video sequences through various keypoints detected on the human body via OpenPose. The detected keypoints are passed onto machine learning and deep learning classifiers for classifying the human actions. Experimental results demonstrate that multilayer perceptron and SVM outperformed all the other classifiers by reporting an accuracy of 87.80% and 87.77% respectively whereas LSTM did not produce very good results as compared to other classifiers. Stacked Long Short-Term Memory networks (LSTM( produced an accuracy of 71.30% and Bidirectional LSTM yielded an accuracy of 76.04%. The results also indicate that machine learning models performed better than deep learning models. The major reason for this finding is the lesser availability of data and the deep learning models being data hungry models require a large amount of data to work upon. The paper also analyses the failure cases of OpenPose by testing the system on aerial videos captured by a drone flying at a higher altitude. This work provides a baseline for validating machine learning classifiers and deep learning classifiers against recognition of human action from aerial videos.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81242970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial pyramid pooling and adaptively feature fusion based yolov3 for traffic sign detection 基于空间金字塔池和自适应特征融合的yolov3交通标志检测
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/4/5
Shimin Xiong, Bin Li, Shiao Zhu, Dongfei Cui, Xiaonan Song
Traffic sign detection is a key part of intelligent assisted driving, but also a challenging task due to the small size and different scales of objects in foreground and closed range. In this paper, we propose a new traffic sign detection scheme: Spatial Pyramid Pooling and Adaptively Spatial Feature Fusion based Yolov3 (SPP and ASFF-Yolov3). In order to integrate the target detail features and environment context features in the feature extraction stage of Yolov3 network, the Spatial Pyramid Pooling module is introduced into the pyramid network of Yolov3. Additionally, Adaptively Spatial Feature Fusion module is added to the target detection phase of the pyramid network of Yolov3 to avoid the interference of different scale features with the process of gradient calculation. Experimental results show the effectiveness of the proposed SPP and ASFF-Yolov3 network, which achieves better detection results than the original Yolov3 network. It can archive real-time inference speed despite inferior to the original Yolov3 network. The proposed scheme will add an option to the solutions of traffic sign detection with real-time inference speed and effective detection results.
交通标志检测是智能辅助驾驶的关键部分,但由于前景和近距离物体体积小、尺度不一,也是一项具有挑战性的任务。本文提出了一种新的交通标志检测方案:基于空间金字塔池和自适应空间特征融合的Yolov3 (SPP和ASFF-Yolov3)。为了在Yolov3网络的特征提取阶段整合目标细节特征和环境上下文特征,在Yolov3的金字塔网络中引入了空间金字塔池模块。此外,在Yolov3金字塔网络的目标检测阶段增加了自适应空间特征融合模块,避免了梯度计算过程中不同尺度特征的干扰。实验结果表明了本文提出的SPP和ASFF-Yolov3网络的有效性,取得了比原Yolov3网络更好的检测效果。它可以存档实时推理速度,尽管不如原来的Yolov3网络。该方案将以实时推理速度和有效的检测结果为交通标志检测的解决方案增加一种选择。
{"title":"Spatial pyramid pooling and adaptively feature fusion based yolov3 for traffic sign detection","authors":"Shimin Xiong, Bin Li, Shiao Zhu, Dongfei Cui, Xiaonan Song","doi":"10.34028/iajit/20/4/5","DOIUrl":"https://doi.org/10.34028/iajit/20/4/5","url":null,"abstract":"Traffic sign detection is a key part of intelligent assisted driving, but also a challenging task due to the small size and different scales of objects in foreground and closed range. In this paper, we propose a new traffic sign detection scheme: Spatial Pyramid Pooling and Adaptively Spatial Feature Fusion based Yolov3 (SPP and ASFF-Yolov3). In order to integrate the target detail features and environment context features in the feature extraction stage of Yolov3 network, the Spatial Pyramid Pooling module is introduced into the pyramid network of Yolov3. Additionally, Adaptively Spatial Feature Fusion module is added to the target detection phase of the pyramid network of Yolov3 to avoid the interference of different scale features with the process of gradient calculation. Experimental results show the effectiveness of the proposed SPP and ASFF-Yolov3 network, which achieves better detection results than the original Yolov3 network. It can archive real-time inference speed despite inferior to the original Yolov3 network. The proposed scheme will add an option to the solutions of traffic sign detection with real-time inference speed and effective detection results.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76717774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heart Disease Classification for Early Diagnosis based on Adaptive Hoeffding Tree Algorithm in IoMT Data 基于IoMT数据自适应Hoeffding树算法的心脏病早期诊断分类
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/5
E. Elbasi, A. Zreikat
Heart disease is a rapidly increasing disease that causes death worldwide. Therefore, scientists around the globe start studying this issue from a different perspective to assure early prediction of diagnosis to save patients' life from bad consequences that cause death. In this regard, Internet of Medical Things (IoMT) applications and algorithms should be utilized effectively to overcome this problem. Hoeffding Tree Algorithm (HTA) is a standard decision tree algorithm to handle large sizes of data sets. In this paper, an Adaptive Hoeffding Tree (AHT) algorithm is suggested to carry out classifications of data sets for early diagnosis of heart disease-related factors, and the obtained results by this algorithm are compared with other suggested Machine Learning (ML) algorithms in the literature. Therefore, a total of 3000 records of data sets are used in the classification, 33% of the data are utilized for female patient information, and the rest of the data are utilized for male patient information. In the original data set, each patient record includes 76 attributes, however only the most important 16 patient attributes are used for the classification. Data are retrieved from the University of California Irvine (UCI) Machine Learning Repository, which is collected from the Hungarian Institute of Cardiology, University Hospital at Zurich, University Hospital at Basel, and V.A. Medical Center. The obtained results from this study and the provided comparative results show the effectiveness of the AHT algorithm over other ML algorithms. Compared to other ML algorithms, AHT outperforms other algorithms with 95.67% accuracy for early estimation of diagnosis of heart disease.
心脏病是一种迅速增加的疾病,在世界范围内导致死亡。因此,世界各地的科学家开始从不同的角度研究这个问题,以确保早期预测诊断,以挽救患者的生命,避免导致死亡的不良后果。在这方面,应该有效利用医疗物联网(IoMT)的应用和算法来克服这一问题。Hoeffding树算法(HTA)是一种用于处理大数据集的标准决策树算法。本文提出一种自适应Hoeffding树(Adaptive Hoeffding Tree, AHT)算法对数据集进行分类,用于心脏病相关因素的早期诊断,并将该算法得到的结果与文献中其他推荐的机器学习(Machine Learning, ML)算法进行比较。因此,在分类中总共使用了3000条数据集的记录,其中33%的数据用于女性患者信息,其余数据用于男性患者信息。在原始数据集中,每个患者记录包含76个属性,但仅使用最重要的16个患者属性进行分类。数据从加州大学欧文分校(UCI)机器学习存储库中检索,该存储库从匈牙利心脏病研究所、苏黎世大学医院、巴塞尔大学医院和va医疗中心收集。本研究获得的结果和提供的比较结果表明,AHT算法比其他ML算法更有效。与其他ML算法相比,AHT在心脏病诊断的早期估计准确率为95.67%,优于其他算法。
{"title":"Heart Disease Classification for Early Diagnosis based on Adaptive Hoeffding Tree Algorithm in IoMT Data","authors":"E. Elbasi, A. Zreikat","doi":"10.34028/iajit/20/1/5","DOIUrl":"https://doi.org/10.34028/iajit/20/1/5","url":null,"abstract":"Heart disease is a rapidly increasing disease that causes death worldwide. Therefore, scientists around the globe start studying this issue from a different perspective to assure early prediction of diagnosis to save patients' life from bad consequences that cause death. In this regard, Internet of Medical Things (IoMT) applications and algorithms should be utilized effectively to overcome this problem. Hoeffding Tree Algorithm (HTA) is a standard decision tree algorithm to handle large sizes of data sets. In this paper, an Adaptive Hoeffding Tree (AHT) algorithm is suggested to carry out classifications of data sets for early diagnosis of heart disease-related factors, and the obtained results by this algorithm are compared with other suggested Machine Learning (ML) algorithms in the literature. Therefore, a total of 3000 records of data sets are used in the classification, 33% of the data are utilized for female patient information, and the rest of the data are utilized for male patient information. In the original data set, each patient record includes 76 attributes, however only the most important 16 patient attributes are used for the classification. Data are retrieved from the University of California Irvine (UCI) Machine Learning Repository, which is collected from the Hungarian Institute of Cardiology, University Hospital at Zurich, University Hospital at Basel, and V.A. Medical Center. The obtained results from this study and the provided comparative results show the effectiveness of the AHT algorithm over other ML algorithms. Compared to other ML algorithms, AHT outperforms other algorithms with 95.67% accuracy for early estimation of diagnosis of heart disease.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77084595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generating embedding features using deep learning for ethnics recognition 使用深度学习生成嵌入特征用于种族识别
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/4/13
Mohammed Alghaili, Zhiyong Li, Ahmed Jawad A. AlBdairi, Malasy Katiyalath
Although significant advances have been made recently in the field of ethnics recognition through face recognition, there is still a lack of studies of ethnics recognition through facial recognition. This study is concerned with ethnics recognition through facial representation using a few images used as samples for any selected group of ethnics using a deep neural network with a Variational Feature Learning (VFL) loss function that has been used to increase the performance accuracy during the evaluation process. The output of a deep neural network is an embedding of 128 bytes for each face image in each group of ethnics. After that, all embeddings of every face in each group of ethnics pass to a machine learning classification method like a Support Vector Machine (SVM). We achieved state-of-the-art ethnic recognition. The system achieved a classification accuracy of 97.3% on a collected group of image dataset collected from three different countries.
尽管近年来人脸识别在民族识别领域取得了重大进展,但人脸识别在民族识别方面的研究仍然不足。本研究关注的是通过面部表征进行种族识别,使用少量图像作为任何选定种族群体的样本,使用带有变分特征学习(VFL)损失函数的深度神经网络,该损失函数已用于提高评估过程中的性能准确性。深度神经网络的输出是对每个种族的每个人脸图像进行128字节的嵌入。之后,每个种族组中每个面孔的所有嵌入都传递给机器学习分类方法,如支持向量机(SVM)。我们实现了最先进的民族承认。该系统在收集的来自三个不同国家的图像数据集上实现了97.3%的分类准确率。
{"title":"Generating embedding features using deep learning for ethnics recognition","authors":"Mohammed Alghaili, Zhiyong Li, Ahmed Jawad A. AlBdairi, Malasy Katiyalath","doi":"10.34028/iajit/20/4/13","DOIUrl":"https://doi.org/10.34028/iajit/20/4/13","url":null,"abstract":"Although significant advances have been made recently in the field of ethnics recognition through face recognition, there is still a lack of studies of ethnics recognition through facial recognition. This study is concerned with ethnics recognition through facial representation using a few images used as samples for any selected group of ethnics using a deep neural network with a Variational Feature Learning (VFL) loss function that has been used to increase the performance accuracy during the evaluation process. The output of a deep neural network is an embedding of 128 bytes for each face image in each group of ethnics. After that, all embeddings of every face in each group of ethnics pass to a machine learning classification method like a Support Vector Machine (SVM). We achieved state-of-the-art ethnic recognition. The system achieved a classification accuracy of 97.3% on a collected group of image dataset collected from three different countries.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88247355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network 基于虚拟位置隐私保护的车载云地理围栏服务框架
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/8
Hani Al-Balasmeh, Maninder P. Singh, Raman Singh
With the increasing prevalence of different mobile apps, many applications require users to enable the location service on their devices. For example, the geofence service can be defined as establishing virtual geographical boundaries. Enabling this service triggers entering and exiting the boundary area and notifies the users and trusted third parties. The foremost concern of using geofence is the privacy of location coordinates shared among different applications. In this paper, a framework called ‘TIET-GEO’ is proposed that allows users to define the geofence boundary; in addition, it monitors Global Positioning System (GPS) devices in real-time when they enter/exit a specific area. The proposed framework also proposes a dummy privacy preservation algorithm to generate K-dummy locations around the real trajectories when the user requests the Point Of Interest (POI) from the Location-Based Services (LBS). This article aims to enhance the location privacy preservation in geofence service, by generating a k-dummy location around the user location based on the radius size of the geofence area. The proposed framework uses token keys authentication to authorize the users in the Vehicular Cloud Network (VCN) service by generating secret token keys authentication between the client and services. The results obtained show the effectiveness of the proposed framework was on parameters like flexibility and reliability of responses from different sources, such as smart IoT devices and datasets.
随着各种移动应用程序的日益普及,许多应用程序要求用户在其设备上启用位置服务。例如,地理防御服务可以定义为建立虚拟地理边界。启用此服务将触发进入和退出边界区域,并通知用户和受信任的第三方。使用地理围栏最重要的问题是不同应用程序之间共享位置坐标的隐私性。在本文中,提出了一个名为“TIET-GEO”的框架,允许用户定义地理围栏边界;此外,当全球定位系统(GPS)设备进入/退出特定区域时,它会实时监控这些设备。该框架还提出了一个虚拟隐私保护算法,当用户从基于位置的服务(LBS)请求兴趣点(POI)时,在真实轨迹周围生成k个虚拟位置。本文旨在增强地理围栏服务中的位置隐私保护,基于地理围栏区域的半径大小,在用户位置周围生成k-dummy位置。该框架通过在客户端和服务之间生成秘密的令牌密钥认证,使用令牌密钥认证对VCN服务中的用户进行授权。所获得的结果表明,所提出框架的有效性取决于来自不同来源(如智能物联网设备和数据集)响应的灵活性和可靠性等参数。
{"title":"Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network","authors":"Hani Al-Balasmeh, Maninder P. Singh, Raman Singh","doi":"10.34028/iajit/20/1/8","DOIUrl":"https://doi.org/10.34028/iajit/20/1/8","url":null,"abstract":"With the increasing prevalence of different mobile apps, many applications require users to enable the location service on their devices. For example, the geofence service can be defined as establishing virtual geographical boundaries. Enabling this service triggers entering and exiting the boundary area and notifies the users and trusted third parties. The foremost concern of using geofence is the privacy of location coordinates shared among different applications. In this paper, a framework called ‘TIET-GEO’ is proposed that allows users to define the geofence boundary; in addition, it monitors Global Positioning System (GPS) devices in real-time when they enter/exit a specific area. The proposed framework also proposes a dummy privacy preservation algorithm to generate K-dummy locations around the real trajectories when the user requests the Point Of Interest (POI) from the Location-Based Services (LBS). This article aims to enhance the location privacy preservation in geofence service, by generating a k-dummy location around the user location based on the radius size of the geofence area. The proposed framework uses token keys authentication to authorize the users in the Vehicular Cloud Network (VCN) service by generating secret token keys authentication between the client and services. The results obtained show the effectiveness of the proposed framework was on parameters like flexibility and reliability of responses from different sources, such as smart IoT devices and datasets.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77113920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. Arab J. Inf. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1