Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007899
M. Mahmoodi, S. Sayedi
Skin detection plays a very essential role in many image processing applications such as face localization, face recognition, gesture recognition and human identification. A robust pre-processing skin detection algorithm can significantly increase the performance of an application in both terms of speed and accuracy. Skin segmentation is often computationally simple, though in many conditions, uneven and nonlinear illumination degrades its performance. Recently, many methods have been proposed to solve the problem, yet most of them are not applicable in different conditions and disparate illuminations. This paper proposes an algorithm which employs not only a pixel-based processing, but also an additional neighbor-based and region-based processing. This enhances the output of the algorithm. Also a novel method in which the YCbCr image is converted to a ternary image by means of a set of decisive rules is employed. In a further processing stage, a region-based algorithm is used to decide with a high certainly on the pixels which are not skin. Results demonstrate that the proposed algorithm is robust and capable of detecting skin windows comparable with state of the art algorithms.
{"title":"Boosting performance of face detection by using an efficient skin segmentation algorithm","authors":"M. Mahmoodi, S. Sayedi","doi":"10.1109/ICITEED.2014.7007899","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007899","url":null,"abstract":"Skin detection plays a very essential role in many image processing applications such as face localization, face recognition, gesture recognition and human identification. A robust pre-processing skin detection algorithm can significantly increase the performance of an application in both terms of speed and accuracy. Skin segmentation is often computationally simple, though in many conditions, uneven and nonlinear illumination degrades its performance. Recently, many methods have been proposed to solve the problem, yet most of them are not applicable in different conditions and disparate illuminations. This paper proposes an algorithm which employs not only a pixel-based processing, but also an additional neighbor-based and region-based processing. This enhances the output of the algorithm. Also a novel method in which the YCbCr image is converted to a ternary image by means of a set of decisive rules is employed. In a further processing stage, a region-based algorithm is used to decide with a high certainly on the pixels which are not skin. Results demonstrate that the proposed algorithm is robust and capable of detecting skin windows comparable with state of the art algorithms.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007938
K. Malekian, U. Schmidt, Abudllah Hoshmeh, A. Shirvani
Modeling underground cables for application in harmonic calculations in frequency domain is discussed thoroughly in this paper. At first, equations and frequency-dependent parameters to describe the zero-, negative-, and positive-sequence cable impedances as well as the coupling between them are presented. Afterwards, the influence of cable arrangement on the zero-, negative-, and positive-sequence cable impedances is investigated over the frequency. In this regard, some representative cable systems with different arrangements are simulated. Physical interpretation of the simulation results for the different cable arrangements contributes to comprehend the behavior of underground cables over the frequency in zero, negative, and positive sequences. Subsequently, based on the findings, modeling underground cables for harmonic calculations in the frequency domain is discussed. Finally, the validity of the proposed model is proved by comparing the simulation results with measurements on a medium voltage cable.
{"title":"Frequency dependent model of underground cables for harmonic calculations in frequency domain","authors":"K. Malekian, U. Schmidt, Abudllah Hoshmeh, A. Shirvani","doi":"10.1109/ICITEED.2014.7007938","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007938","url":null,"abstract":"Modeling underground cables for application in harmonic calculations in frequency domain is discussed thoroughly in this paper. At first, equations and frequency-dependent parameters to describe the zero-, negative-, and positive-sequence cable impedances as well as the coupling between them are presented. Afterwards, the influence of cable arrangement on the zero-, negative-, and positive-sequence cable impedances is investigated over the frequency. In this regard, some representative cable systems with different arrangements are simulated. Physical interpretation of the simulation results for the different cable arrangements contributes to comprehend the behavior of underground cables over the frequency in zero, negative, and positive sequences. Subsequently, based on the findings, modeling underground cables for harmonic calculations in the frequency domain is discussed. Finally, the validity of the proposed model is proved by comparing the simulation results with measurements on a medium voltage cable.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126505770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007928
Daryus Chandra, A. Susanto, S. Kusumawardani
Repeat-Accumulate Codes (RAC) are one of alternative choice code besides turbo codes and low-density parity-check (LDPC) codes. This paper presented decode-and-forward protocol for wireless relay channel by utilizing repeat-accumulate codes as the coding scheme in the relay. The main advantages of the RAC over another code that makes the RAC is more considered for this research are the complexity of encoding is linear in the code length, have a simpler design, and easier to combine with modulator or detector. Simplicity is the main factor for using RAC in this research because in the multihop wireless communication concept, the information processing that occurs in every node or in every relay should not be complicated. In this paper, RAC is employed in wireless relay channel for the LOS model and urban model. The result shows that in the LOS model, RAC only show BER improvement when the relay position is exactly in the mid between information source (S) and destination (D). In urban channel model, the BER improvement can be observed, whether the relay is positioned ¼, ½ or ¾ between the information source (S) and the destination (D).
{"title":"Performance of Repeat-Accumulate Codes (RAC) for decode-and-forward wireless relay channel","authors":"Daryus Chandra, A. Susanto, S. Kusumawardani","doi":"10.1109/ICITEED.2014.7007928","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007928","url":null,"abstract":"Repeat-Accumulate Codes (RAC) are one of alternative choice code besides turbo codes and low-density parity-check (LDPC) codes. This paper presented decode-and-forward protocol for wireless relay channel by utilizing repeat-accumulate codes as the coding scheme in the relay. The main advantages of the RAC over another code that makes the RAC is more considered for this research are the complexity of encoding is linear in the code length, have a simpler design, and easier to combine with modulator or detector. Simplicity is the main factor for using RAC in this research because in the multihop wireless communication concept, the information processing that occurs in every node or in every relay should not be complicated. In this paper, RAC is employed in wireless relay channel for the LOS model and urban model. The result shows that in the LOS model, RAC only show BER improvement when the relay position is exactly in the mid between information source (S) and destination (D). In urban channel model, the BER improvement can be observed, whether the relay is positioned ¼, ½ or ¾ between the information source (S) and the destination (D).","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007898
N. A. Setiawan, D. W. Prabowo, H. A. Nugroho
Coronary artery disease (CAD) is a disease that causes many deaths in human. CAD occurs when the atherosclerosis (fatty deposits) blocks blood flow to the heart muscle in the coronary arteries. The gold standard method to diagnose CAD is coronary angiography. However, this method is invasive, risky and costly. Therefore, it is necessary to develop a method for diagnosing the CAD before coronary angiography is performed. The objective of this research is to provide a benchmark comparison of the feature selection techniques in the diagnosis of CAD. A total of four feature selection methods are used. These methods are motivated feature selection (MFS), correlation based feature selection (CFS), wrapper based feature selection (WFS) and rough set based feature selection (RST). The Naïve Bayes and J48 classifiers are used to diagnose the presence of CAD. The result shows that WFS and CFS are superior compared to MFS and RST.
{"title":"Benchmarking of feature selection techniques for coronary artery disease diagnosis","authors":"N. A. Setiawan, D. W. Prabowo, H. A. Nugroho","doi":"10.1109/ICITEED.2014.7007898","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007898","url":null,"abstract":"Coronary artery disease (CAD) is a disease that causes many deaths in human. CAD occurs when the atherosclerosis (fatty deposits) blocks blood flow to the heart muscle in the coronary arteries. The gold standard method to diagnose CAD is coronary angiography. However, this method is invasive, risky and costly. Therefore, it is necessary to develop a method for diagnosing the CAD before coronary angiography is performed. The objective of this research is to provide a benchmark comparison of the feature selection techniques in the diagnosis of CAD. A total of four feature selection methods are used. These methods are motivated feature selection (MFS), correlation based feature selection (CFS), wrapper based feature selection (WFS) and rough set based feature selection (RST). The Naïve Bayes and J48 classifiers are used to diagnose the presence of CAD. The result shows that WFS and CFS are superior compared to MFS and RST.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007921
Asri Diliyanzah, R. P. Astuti, Budi Syihabuddin
Alteration of user's speed and direction to the base station cause Carrier Frequency Offset (CFO). CFO is able to damage orthogonality among subcarriers and decrease system performance significantly. There are several researches already focused on ICI mitigation, however most of them only employed restricted inputs for CFO in order to generate Inter Carrier Interference (ICI). This research proposes modified dynamic CFO resulted from Doppler shift and oscillator accuracy tolerance. The CFO value takes user's velocity and random user's direction as well as involving oscillator instability. The main purpose of this research is to reduce CFO in dynamic propagation nature in various users' velocities using Extended Kalman Filter (EKF) method. The result showed that those dynamic CFO values can be reduced using EKF method and thereby enhance OFDM system performance, in this case Mobile WiMAX 802.16e. Besides, this proposed system has the adaptability upon different CFO values by adjusting better improvement for higher speed and worse oscillator's quality.
{"title":"Dynamic CFO reduction in various mobilities based on extended Kalman filter for broadband wireless access technology","authors":"Asri Diliyanzah, R. P. Astuti, Budi Syihabuddin","doi":"10.1109/ICITEED.2014.7007921","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007921","url":null,"abstract":"Alteration of user's speed and direction to the base station cause Carrier Frequency Offset (CFO). CFO is able to damage orthogonality among subcarriers and decrease system performance significantly. There are several researches already focused on ICI mitigation, however most of them only employed restricted inputs for CFO in order to generate Inter Carrier Interference (ICI). This research proposes modified dynamic CFO resulted from Doppler shift and oscillator accuracy tolerance. The CFO value takes user's velocity and random user's direction as well as involving oscillator instability. The main purpose of this research is to reduce CFO in dynamic propagation nature in various users' velocities using Extended Kalman Filter (EKF) method. The result showed that those dynamic CFO values can be reduced using EKF method and thereby enhance OFDM system performance, in this case Mobile WiMAX 802.16e. Besides, this proposed system has the adaptability upon different CFO values by adjusting better improvement for higher speed and worse oscillator's quality.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007920
S. Wibowo, Guntur Dharma Putra, B. Hantono
Wireless Sensor Network (WSN) usage for buildings and household has been increasingly popular because it offers various benefits, such as home automation and home surveillance. Therefore, in order to increase WSN usage flexibility, remote controlling which enables remote administration is required. In fact, generally WSN is controlled by a coordinator (sink node) that is located closely to the WSN area itself. By utilizing iterative development, which is suitable for main and supporting application development with several iterations, this research proposes WSN and Internet Protocol (IP) interoperability that enables remote controlling and managing through Internet. Eventually, this research creates a web-based application which will be implemented to a wireless Access Point (AP) for easier WSN remote controlling. Furthermore, it could accommodate WSN from various vendors by software only solution.
{"title":"Development of embedded gateway for Wireless Sensor Network and Internet Protocol interoperability","authors":"S. Wibowo, Guntur Dharma Putra, B. Hantono","doi":"10.1109/ICITEED.2014.7007920","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007920","url":null,"abstract":"Wireless Sensor Network (WSN) usage for buildings and household has been increasingly popular because it offers various benefits, such as home automation and home surveillance. Therefore, in order to increase WSN usage flexibility, remote controlling which enables remote administration is required. In fact, generally WSN is controlled by a coordinator (sink node) that is located closely to the WSN area itself. By utilizing iterative development, which is suitable for main and supporting application development with several iterations, this research proposes WSN and Internet Protocol (IP) interoperability that enables remote controlling and managing through Internet. Eventually, this research creates a web-based application which will be implemented to a wireless Access Point (AP) for easier WSN remote controlling. Furthermore, it could accommodate WSN from various vendors by software only solution.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129432179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007924
Eric Simbolon, A. Munir
In this paper, a planar bandpass filter which is developed based on frequency selective surfaces (FSS) is proposed to be designed numerically and experimentally. Two basic patterns of FSS unit cells are posed to be established by using strip slotted-line which have asymmetric and symmetric structures, namely hexapole and octapole slotted-lines. The geometry parameter of strip slotted line in each unit cell is varied to analyze its impact to the resonant frequency shift and the characteristic response. After obtaining desired performances, the final design is then built up by constructing 10 × 10 unit cells for each structure. From numerical characterization results, it shows that the structure with hexapole slotted-line unit cell has resonant frequency of 2.46GHz with S11 value of -10.76dB and S12 value of -3.92dB, while the structure with octapole slotted-line unit cell has resonant frequency of 2.38GHz with S11 and S12 values of -19.04dB and -3.17dB, respectively. In addition, a hardware realization is also investigated for experimental characterization.
{"title":"FSS-based planar bandpass filter using strip slotted-lines","authors":"Eric Simbolon, A. Munir","doi":"10.1109/ICITEED.2014.7007924","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007924","url":null,"abstract":"In this paper, a planar bandpass filter which is developed based on frequency selective surfaces (FSS) is proposed to be designed numerically and experimentally. Two basic patterns of FSS unit cells are posed to be established by using strip slotted-line which have asymmetric and symmetric structures, namely hexapole and octapole slotted-lines. The geometry parameter of strip slotted line in each unit cell is varied to analyze its impact to the resonant frequency shift and the characteristic response. After obtaining desired performances, the final design is then built up by constructing 10 × 10 unit cells for each structure. From numerical characterization results, it shows that the structure with hexapole slotted-line unit cell has resonant frequency of 2.46GHz with S11 value of -10.76dB and S12 value of -3.92dB, while the structure with octapole slotted-line unit cell has resonant frequency of 2.38GHz with S11 and S12 values of -19.04dB and -3.17dB, respectively. In addition, a hardware realization is also investigated for experimental characterization.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007904
T. Ahmad, Gregory Sukanto, H. Studiawan, W. Wibisono, R. Ijtihadie
Transferring information between nodes in this digital era has been made it easy for users to communicate. Sensitive data, however, requires protection during transmission to prevent unauthorized users from exploiting it. In this paper, we propose to hide secret data by developing emoticon-based steganography. Here, the data is embedded to the emoticon which is sent along with the cover text via chatting. The experimental result, which is obtained from various types of data, depicts that this proposed method, in general, has higher performance than that of existing one. That is, each emoticon has been able to dynamically hold more information. Specifically, the method without preprocessing is better.
{"title":"Emoticon-based steganography for securing sensitive data","authors":"T. Ahmad, Gregory Sukanto, H. Studiawan, W. Wibisono, R. Ijtihadie","doi":"10.1109/ICITEED.2014.7007904","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007904","url":null,"abstract":"Transferring information between nodes in this digital era has been made it easy for users to communicate. Sensitive data, however, requires protection during transmission to prevent unauthorized users from exploiting it. In this paper, we propose to hide secret data by developing emoticon-based steganography. Here, the data is embedded to the emoticon which is sent along with the cover text via chatting. The experimental result, which is obtained from various types of data, depicts that this proposed method, in general, has higher performance than that of existing one. That is, each emoticon has been able to dynamically hold more information. Specifically, the method without preprocessing is better.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7006989
P. Wayalun, Saiyan Saiyod, N. Chamadol
The Cholangiocarcinoma (CCA) is the most common in northeast Thailand that is second most common worldwide. The Periductal fibrosis (PDF) ultrasound images can be applied for the CCA surveillance system which increased patient in endemic area of Opisthorchis viverrini (OV). However, the ultrasound images are lack of contrast and a lot of speckle noise. This paper presented the enhanced algorithm of PDF ultrasound images (EPDF) for the CCA surveillance system in which consist of the Histogram equalization (HE), Speckle reduction method, and Anisotropic diffusion. Firstly, the HE method performed to improve the lack of contrast of the PDF ultrasound images. Then, the speckle reduction method performed to reduce the speckle noise and preserving the edge in the PDF ultrasound images. Finally, the Anisotropic diffusion performed to smooth region in the PDF ultrasound images. The data set in the experimental studies consist of 30 pictures. The performance of the EPDF algorithm from the experimental results gave the best for the CCA surveillance. A successful percentage of the EPDF system achieved at 80.36%. Thus, the EPDF system has the potential to increase the performance for enhancing the PDF in ultrasound images for CCA surveillance system.
{"title":"A hybrid technique for enhancement of Periductal fibrosis ultrasound images for Cholangiocacinoma surveillance","authors":"P. Wayalun, Saiyan Saiyod, N. Chamadol","doi":"10.1109/ICITEED.2014.7006989","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7006989","url":null,"abstract":"The Cholangiocarcinoma (CCA) is the most common in northeast Thailand that is second most common worldwide. The Periductal fibrosis (PDF) ultrasound images can be applied for the CCA surveillance system which increased patient in endemic area of Opisthorchis viverrini (OV). However, the ultrasound images are lack of contrast and a lot of speckle noise. This paper presented the enhanced algorithm of PDF ultrasound images (EPDF) for the CCA surveillance system in which consist of the Histogram equalization (HE), Speckle reduction method, and Anisotropic diffusion. Firstly, the HE method performed to improve the lack of contrast of the PDF ultrasound images. Then, the speckle reduction method performed to reduce the speckle noise and preserving the edge in the PDF ultrasound images. Finally, the Anisotropic diffusion performed to smooth region in the PDF ultrasound images. The data set in the experimental studies consist of 30 pictures. The performance of the EPDF algorithm from the experimental results gave the best for the CCA surveillance. A successful percentage of the EPDF system achieved at 80.36%. Thus, the EPDF system has the potential to increase the performance for enhancing the PDF in ultrasound images for CCA surveillance system.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-01DOI: 10.1109/ICITEED.2014.7007901
Natta Tammachat, N. Pantuwong
In recent year, healthy is a topic that people concern. It is obviously that eating the food with high amount of calories cause several problems to our health. Recording the amount of calories of the food intake in each meal is one of the stretchy to solve such problem. Although the people can record their meal and discuss with doctors or experts, it is not so convenient and they cannot know the amount of calories before the meal. This paper presents a technique of image processing to recognize images of food taken by users. From the input food images, the users can understand the amount of calories they will take in each meal by using the proposed algorithm. Our method creates feature vector using several features about texture and color, then classify the food images using SVM. In this study, we focused on Thai food. To train the SVM, we group the example food images by food type and the amount of calories. We conduct the experiment to evaluate the performance of the proposed algorithm for both groups of example food.
{"title":"Calories analysis of food intake using image recognition","authors":"Natta Tammachat, N. Pantuwong","doi":"10.1109/ICITEED.2014.7007901","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007901","url":null,"abstract":"In recent year, healthy is a topic that people concern. It is obviously that eating the food with high amount of calories cause several problems to our health. Recording the amount of calories of the food intake in each meal is one of the stretchy to solve such problem. Although the people can record their meal and discuss with doctors or experts, it is not so convenient and they cannot know the amount of calories before the meal. This paper presents a technique of image processing to recognize images of food taken by users. From the input food images, the users can understand the amount of calories they will take in each meal by using the proposed algorithm. Our method creates feature vector using several features about texture and color, then classify the food images using SVM. In this study, we focused on Thai food. To train the SVM, we group the example food images by food type and the amount of calories. We conduct the experiment to evaluate the performance of the proposed algorithm for both groups of example food.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"9 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}