首页 > 最新文献

2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)最新文献

英文 中文
Pop-Out Tetris: An Implementation of a Tablet FTVR Game 弹出式俄罗斯方块:平板电脑FTVR游戏的实现
Sirisilp Kongsilp, Hathaichanok Chawmungkrung, T. Komuro
In this paper, we apply a Fish Tank Virtual Reality technique to a commodity tablet. Our first goal is to develop a tablet-based FTVR system that does not require additional enhancement to a tablet because it would allow tablet user to use the technology quickly and easily. To address this goal, we adopt a FTVR technique based on previous works and use it to develop our tablet FTVR prototype. It uses a camera-based face tracking and the anaglyph 3D display techniques. Our second goal is to determine that whether it is feasible to use tablet-based FTVR for entertainment and other mobile applications in daily life. To address the second goal, we implemented a game for our prototype called “pop-out Tetris Then we assess our prototype and the game using heuristic evaluation technique. We describe the technique that we used to develop our tablet FTVR prototype. The technique is based on previous works; it uses a camera-based face tracking and the anaglyph 3D display techniques. Therefore, it does not require any additional enhancement to a tablet. In addition to the prototype, we also implemented a game for tablet FTVR called “pop-out Tetris we describe our design of the application. Then we assess our prototype and the game using heuristic evaluation technique. In the end, we concluded that the technique is not ready for day-to-day use case scenario. We underline key points that affect the adoption of tablet-based FTVR technology and provide recommendations for future research to consider when developing a mobile FTVR system.
本文将鱼缸虚拟现实技术应用于一种商品平板电脑。我们的第一个目标是开发一种基于平板电脑的FTVR系统,它不需要对平板电脑进行额外的增强,因为它可以让平板电脑用户快速轻松地使用这项技术。为了实现这一目标,我们在前人工作的基础上采用了FTVR技术,并使用它来开发我们的平板电脑FTVR原型。它采用了基于摄像头的人脸跟踪和三维立体显示技术。我们的第二个目标是确定在日常生活中使用基于平板电脑的FTVR娱乐和其他移动应用程序是否可行。为了实现第二个目标,我们为原型执行了一款名为“弹出式俄罗斯方块”的游戏,然后我们使用启发式评估技术来评估原型和游戏。我们描述了我们用来开发平板电脑FTVR原型的技术。这种技术是基于以前的作品;它使用了基于摄像头的面部跟踪和立体显示技术。因此,它不需要对平板电脑进行任何额外的增强。除了原型,我们还为平板电脑FTVR执行了一款名为“弹出式俄罗斯方块”的游戏,我们描述了我们的应用设计。然后我们使用启发式评估技术来评估我们的原型和游戏。最后,我们得出结论,该技术还没有为日常用例场景做好准备。我们强调了影响基于平板电脑的FTVR技术采用的关键点,并为未来开发移动FTVR系统的研究提供了建议。
{"title":"Pop-Out Tetris: An Implementation of a Tablet FTVR Game","authors":"Sirisilp Kongsilp, Hathaichanok Chawmungkrung, T. Komuro","doi":"10.1109/JCSSE.2018.8457377","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457377","url":null,"abstract":"In this paper, we apply a Fish Tank Virtual Reality technique to a commodity tablet. Our first goal is to develop a tablet-based FTVR system that does not require additional enhancement to a tablet because it would allow tablet user to use the technology quickly and easily. To address this goal, we adopt a FTVR technique based on previous works and use it to develop our tablet FTVR prototype. It uses a camera-based face tracking and the anaglyph 3D display techniques. Our second goal is to determine that whether it is feasible to use tablet-based FTVR for entertainment and other mobile applications in daily life. To address the second goal, we implemented a game for our prototype called “pop-out Tetris Then we assess our prototype and the game using heuristic evaluation technique. We describe the technique that we used to develop our tablet FTVR prototype. The technique is based on previous works; it uses a camera-based face tracking and the anaglyph 3D display techniques. Therefore, it does not require any additional enhancement to a tablet. In addition to the prototype, we also implemented a game for tablet FTVR called “pop-out Tetris we describe our design of the application. Then we assess our prototype and the game using heuristic evaluation technique. In the end, we concluded that the technique is not ready for day-to-day use case scenario. We underline key points that affect the adoption of tablet-based FTVR technology and provide recommendations for future research to consider when developing a mobile FTVR system.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study on Various Deep Learning Techniques for Thai NLP Lexical and Syntactic Tasks on Noisy Data 不同深度学习技术在泰国语NLP有噪声数据下词法和句法任务的比较研究
Amarin Jettakul, Chavisa Thamjarat, Kawin Liaowongphuthorn, Can Udomcharoenchaikit, P. Vateekul, P. Boonkwan
In Natural Language Processing (NLP), there are three fundamental tasks of NLP which are Tokenization being a part of a lexical level, Part-of-Speech tagging (POS) and Named-Entity-Recognition (NER) being parts of a syntactic level. Recently, there have been many deep learning researches showing their success in many domains. However, there has been no comparative study for Thai NLP to suggest the most suitable technique for each task yet. In this paper, we aim to provide a performance comparison among various deep learning-based techniques on three NLP tasks, and study the effect on synthesized OOV words and the OOV handling algorithm with Levenshtein distance had been provided due to the fact that most existing works relied on a set of vocabularies in the trained model and not being fit for noisy text in the real use case. Our three experiments were conducted on BEST 2010 I2R, a standard Thai NLP corpus on F1 measurement, with the different percentage of noises having been synthesized. Firstly, for Tokenization, the result shows that Synthai, a jointed bidirectional LSTM, has the best performance. Additionally, for POS, bi-directional LSTM with CRF has obtained the best performance. For NER, variational bi-directional LSTM with CRF has outperformed other methods. Finally, the effect of noises reduces the performance of all algorithms on these foundation tasks and the result shows that our OOV handling technique could improve the performance on noisy data.
在自然语言处理(NLP)中,有三个基本任务:词法层面的标记化、词性标注(POS)和句法层面的命名实体识别(NER)。近年来,深度学习的研究在许多领域都取得了成功。然而,目前还没有对泰国NLP进行比较研究,以建议最适合每个任务的技术。在本文中,我们旨在对基于深度学习的各种技术在三种NLP任务上的性能进行比较,并研究对合成OOV词的影响,以及由于现有的大多数工作依赖于训练模型中的一组词汇表而不适合实际用例中的噪声文本,因此提供了Levenshtein距离的OOV处理算法。我们的三个实验是在BEST 2010 I2R上进行的,这是一个标准的泰国NLP语料库,用于F1测量,合成了不同百分比的噪声。首先,在标记化方面,结果表明联合双向LSTM Synthai具有最好的性能。此外,在POS中,带CRF的双向LSTM获得了最好的性能。对于NER,基于CRF的变分双向LSTM优于其他方法。最后,噪声的影响降低了所有算法在这些基础任务上的性能,结果表明我们的OOV处理技术可以提高对噪声数据的性能。
{"title":"A Comparative Study on Various Deep Learning Techniques for Thai NLP Lexical and Syntactic Tasks on Noisy Data","authors":"Amarin Jettakul, Chavisa Thamjarat, Kawin Liaowongphuthorn, Can Udomcharoenchaikit, P. Vateekul, P. Boonkwan","doi":"10.1109/JCSSE.2018.8457368","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457368","url":null,"abstract":"In Natural Language Processing (NLP), there are three fundamental tasks of NLP which are Tokenization being a part of a lexical level, Part-of-Speech tagging (POS) and Named-Entity-Recognition (NER) being parts of a syntactic level. Recently, there have been many deep learning researches showing their success in many domains. However, there has been no comparative study for Thai NLP to suggest the most suitable technique for each task yet. In this paper, we aim to provide a performance comparison among various deep learning-based techniques on three NLP tasks, and study the effect on synthesized OOV words and the OOV handling algorithm with Levenshtein distance had been provided due to the fact that most existing works relied on a set of vocabularies in the trained model and not being fit for noisy text in the real use case. Our three experiments were conducted on BEST 2010 I2R, a standard Thai NLP corpus on F1 measurement, with the different percentage of noises having been synthesized. Firstly, for Tokenization, the result shows that Synthai, a jointed bidirectional LSTM, has the best performance. Additionally, for POS, bi-directional LSTM with CRF has obtained the best performance. For NER, variational bi-directional LSTM with CRF has outperformed other methods. Finally, the effect of noises reduces the performance of all algorithms on these foundation tasks and the result shows that our OOV handling technique could improve the performance on noisy data.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Exploiting Building Blocks in Hard Problems with Modified Compact Genetic Algorithm 利用改进的紧凑遗传算法求解困难问题中的构建块
Kamonluk Suksen, P. Chongstitvatana
In Evolutionary Computation, good substructures that are combined into good solutions are called building blocks. In this context, building blocks are common structure of high- quality solutions. The compact genetic algorithm is an extension of the genetic algorithm that replaces the latter’s population of chromosomes with a probability distribution from which candidate solutions can be generated. This paper describes an algorithm that exploits building blocks with compact genetic algorithm in order to solve difficult optimization problems under the assumption that we have already known building blocks. The main idea is to update the probability vectors as a group of bits that represents building blocks thus avoiding the disruption of the building blocks. Comparisons of the new algorithm with a conventional compact genetic algorithm on trap-function and traveling salesman problems indicate the utility of the proposed algorithm. It is most effective when the problem instants have common structures that can be identify as building blocks.
在进化计算中,组合成好的解决方案的好的子结构被称为构建块。在这种情况下,构建块是高质量解决方案的常见结构。紧凑遗传算法是遗传算法的一种扩展,它将遗传算法的染色体种群替换为可生成候选解的概率分布。本文描述了一种基于紧凑遗传算法的构建块算法,在已知构建块的前提下求解复杂的优化问题。其主要思想是将概率向量更新为代表构建块的一组位,从而避免构建块的破坏。将该算法与传统的紧凑遗传算法在陷阱函数和旅行商问题上的比较表明了该算法的实用性。当问题瞬间具有可识别为构建块的共同结构时,它是最有效的。
{"title":"Exploiting Building Blocks in Hard Problems with Modified Compact Genetic Algorithm","authors":"Kamonluk Suksen, P. Chongstitvatana","doi":"10.1109/JCSSE.2018.8457386","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457386","url":null,"abstract":"In Evolutionary Computation, good substructures that are combined into good solutions are called building blocks. In this context, building blocks are common structure of high- quality solutions. The compact genetic algorithm is an extension of the genetic algorithm that replaces the latter’s population of chromosomes with a probability distribution from which candidate solutions can be generated. This paper describes an algorithm that exploits building blocks with compact genetic algorithm in order to solve difficult optimization problems under the assumption that we have already known building blocks. The main idea is to update the probability vectors as a group of bits that represents building blocks thus avoiding the disruption of the building blocks. Comparisons of the new algorithm with a conventional compact genetic algorithm on trap-function and traveling salesman problems indicate the utility of the proposed algorithm. It is most effective when the problem instants have common structures that can be identify as building blocks.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126921376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Single Image Haze Removal Based On Cellular Automata Model 基于元胞自动机模型的单幅图像雾霾去除改进
Surasak Tangsakul, S. Wongthanavasu
Hazy images are the images acquired under bad weather with low contrast and faint color properties. Several algorithms used dichromatic model to remove the haze in the image. This paper proposed a novel technique using cellular automata for the single image haze removal. It aims to improve the dark channel and the transmission map. We proposed the cellular automata rule to refine the intensity of image pixel in a dark channel. Then, the light source is estimated from the dark channel. Finally, we proposed the cellular automata rule to construct the transmission map and restored the haze-free image. The experimental results show that the proposed method improved intensity, color saturation quality, and avoid halo artifact without any post-processing when compared with the state-of-the-art methods.
朦胧图像是在恶劣天气条件下获得的图像,对比度低,色彩暗淡。有几种算法使用二色模型来去除图像中的雾霾。提出了一种基于元胞自动机的单幅图像去雾技术。它旨在改善暗信道和传输图。我们提出了元胞自动机规则来细化暗通道中图像像素的强度。然后,从暗通道估计光源。最后,我们提出了元胞自动机规则来构建传输图并恢复无雾图像。实验结果表明,与现有方法相比,该方法在不进行任何后处理的情况下,提高了图像的亮度和色彩饱和度,避免了光晕伪影。
{"title":"Improving Single Image Haze Removal Based On Cellular Automata Model","authors":"Surasak Tangsakul, S. Wongthanavasu","doi":"10.1109/JCSSE.2018.8457394","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457394","url":null,"abstract":"Hazy images are the images acquired under bad weather with low contrast and faint color properties. Several algorithms used dichromatic model to remove the haze in the image. This paper proposed a novel technique using cellular automata for the single image haze removal. It aims to improve the dark channel and the transmission map. We proposed the cellular automata rule to refine the intensity of image pixel in a dark channel. Then, the light source is estimated from the dark channel. Finally, we proposed the cellular automata rule to construct the transmission map and restored the haze-free image. The experimental results show that the proposed method improved intensity, color saturation quality, and avoid halo artifact without any post-processing when compared with the state-of-the-art methods.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithmic Music Composition Comparison 算法作曲比较
Panida Wiriyachaiporn, Kankawee Chanasit, A. Suchato, P. Punyabukkana, E. Chuangsuwanich
This paper presents the application of Machine Learning (ML) algorithm as an algorithmic music composer, compared to a rule-based algorithm. The ML model is based on LSTMs which takes in previous notes and predicts the next set of notes based on a midi format. For the rule-based method, we apply chord progression rules and binary rhythm pattern theory. We used both algorithms to generate music in two different genres, namely rock, and jazz. To evaluate the effectiveness of the algorithms, fifteen raters are asked to identify the genre of the generated songs. The results showed 77.33% of the rulebased algorithms Jazz songs were correctly identified, compared to the 62.67% generated by the LSTM. For the rock genre, only 49.33% percent of rule-based algorithms songs and 44% Machine Learning algorithms songs were correctly identified. In terms of music satisfaction, the rule-based algorithm on average obtains higher scores in both genres, 2.17 for Jazz and 2.42 for Rock while Machine Learning algorithm receives 1.83 for Jazz songs and 1.57 for Rock.
本文介绍了机器学习(ML)算法作为算法音乐作曲家的应用,并与基于规则的算法进行了比较。ML模型基于lstm, lstm接收之前的音符,并根据midi格式预测下一组音符。对于基于规则的方法,我们采用和弦进行规则和二元节奏模式理论。我们使用这两种算法来生成两种不同类型的音乐,即摇滚和爵士。为了评估算法的有效性,15名评分者被要求识别生成的歌曲的类型。结果表明,77.33%的基于规则的算法正确识别了爵士歌曲,而LSTM算法的识别率为62.67%。对于摇滚类型,只有49.33%的基于规则的算法歌曲和44%的机器学习算法歌曲被正确识别。在音乐满意度方面,基于规则的算法在两种类型的平均得分都较高,爵士乐为2.17分,摇滚为2.42分,而机器学习算法在爵士乐和摇滚方面的得分分别为1.83分和1.57分。
{"title":"Algorithmic Music Composition Comparison","authors":"Panida Wiriyachaiporn, Kankawee Chanasit, A. Suchato, P. Punyabukkana, E. Chuangsuwanich","doi":"10.1109/JCSSE.2018.8457397","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457397","url":null,"abstract":"This paper presents the application of Machine Learning (ML) algorithm as an algorithmic music composer, compared to a rule-based algorithm. The ML model is based on LSTMs which takes in previous notes and predicts the next set of notes based on a midi format. For the rule-based method, we apply chord progression rules and binary rhythm pattern theory. We used both algorithms to generate music in two different genres, namely rock, and jazz. To evaluate the effectiveness of the algorithms, fifteen raters are asked to identify the genre of the generated songs. The results showed 77.33% of the rulebased algorithms Jazz songs were correctly identified, compared to the 62.67% generated by the LSTM. For the rock genre, only 49.33% percent of rule-based algorithms songs and 44% Machine Learning algorithms songs were correctly identified. In terms of music satisfaction, the rule-based algorithm on average obtains higher scores in both genres, 2.17 for Jazz and 2.42 for Rock while Machine Learning algorithm receives 1.83 for Jazz songs and 1.57 for Rock.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Bandwidth Reservation Approach to Improve Quality of Service in Software-Defined Networking: A Performance Analysis 提高软件定义网络服务质量的带宽预留方法:性能分析
Amirhossein Moravejosharieh, Michael J. Watts, Yu Song
Software-Defined Networking (SDN) is a new networking paradigm designed to resolve traditional IP network shortcomings by breaking the vertical integration of control and data planes. SDN separates the network control logic from underlying routers and switches and introduces the ability to program the network. Bandwidth reservation is an approach offered in SDN-enabled networks to guarantee relatively high Quality of Service for different types of media, e.g., video, audio or data. Although, this approach has been proven to be worthy of considering in SDN, there are still some concerns regarding its applicability in a relatively large networks. In this paper, we have evaluated the performance of bandwidth reservation approach in a relatively large-scaled SDN-enabled network in terms of its suitability when the number of users demanding for reserved bandwidth becomes larger. The obtained results from our simulation study show that bandwidth reservation can be beneficial only when the number of users asking for guaranteed bandwidth is relatively smaller than other users. Moreover, higher end-to-end QoS delivery can be achieved as an immediate outcome of deploying bandwidth reservation approach for a particular type of traffic flow, however, at the cost of incurring negative impact on other types of traffic flow in terms of achievable network throughput.
软件定义网络(SDN)是一种新的网络模式,它打破了控制平面和数据平面的垂直整合,解决了传统IP网络的缺点。SDN将网络控制逻辑从底层路由器和交换机中分离出来,并引入了对网络进行编程的能力。带宽预留是在支持sdn的网络中提供的一种方法,以保证对不同类型的媒体(例如视频、音频或数据)提供相对较高的服务质量。虽然这种方法在SDN中已经被证明是值得考虑的,但是在相对较大的网络中,它的适用性仍然存在一些问题。在本文中,我们评估了带宽保留方法在一个相对大规模的支持sdn的网络中,当需求保留带宽的用户数量增加时的适用性。仿真研究结果表明,只有当要求保证带宽的用户数量相对较少时,带宽预留才有好处。此外,为特定类型的流量部署带宽保留方法可以立即实现更高的端到端QoS交付,然而,其代价是在可实现的网络吞吐量方面对其他类型的流量产生负面影响。
{"title":"Bandwidth Reservation Approach to Improve Quality of Service in Software-Defined Networking: A Performance Analysis","authors":"Amirhossein Moravejosharieh, Michael J. Watts, Yu Song","doi":"10.1109/JCSSE.2018.8457339","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457339","url":null,"abstract":"Software-Defined Networking (SDN) is a new networking paradigm designed to resolve traditional IP network shortcomings by breaking the vertical integration of control and data planes. SDN separates the network control logic from underlying routers and switches and introduces the ability to program the network. Bandwidth reservation is an approach offered in SDN-enabled networks to guarantee relatively high Quality of Service for different types of media, e.g., video, audio or data. Although, this approach has been proven to be worthy of considering in SDN, there are still some concerns regarding its applicability in a relatively large networks. In this paper, we have evaluated the performance of bandwidth reservation approach in a relatively large-scaled SDN-enabled network in terms of its suitability when the number of users demanding for reserved bandwidth becomes larger. The obtained results from our simulation study show that bandwidth reservation can be beneficial only when the number of users asking for guaranteed bandwidth is relatively smaller than other users. Moreover, higher end-to-end QoS delivery can be achieved as an immediate outcome of deploying bandwidth reservation approach for a particular type of traffic flow, however, at the cost of incurring negative impact on other types of traffic flow in terms of achievable network throughput.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121730262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of Fabric Color Naming Using RGB and HSV Color Models 使用RGB和HSV颜色模型的织物颜色命名的比较
Piyapat Charoensawan, P. Sukanya, I. Shimizu
This paper aims to find an effective method for identifying colors of fabrics. We consider the following color naming models: Basic Color terms, ISCC-NBS Color system, Frery’s Color name, and Fractals Lab’s Ultimate color vocabulary. The appropriate color name is assigned for a fabric image by using seven types of minimum distance in RGB and HSV color models. Experiments are performed on S3 plain color fabric images. Results show that in general, the method of identifying fabric color name by using Frery’s color name model with the color similarity measure by Euclidean distance in RGB space gives the better result than the other methods. When we analyze in more details by classifying fabric images into three groups based on color saturation, we found that the effective methods for color naming are as follows: Frery’s color name model with the quadratic distance in HSV space works well for the group of low color saturation (96.23% accuracy). Frery’s color name model with Euclidean distance in RGB space works well for the group of medium color saturation (81.82% accuracy). And Fractals Lab’s Ultimate color vocabulary model with the weighted Euclidean distance in HSV space work good for the group of high color saturation (76.09% accuracy).
本文旨在寻找一种有效的织物颜色识别方法。我们考虑以下颜色命名模型:基本颜色术语,ISCC-NBS颜色系统,Frery的颜色名称和分形实验室的终极颜色词汇。通过使用RGB和HSV颜色模型中的7种最小距离类型为织物图像分配合适的颜色名称。实验在S3纯色织物图像上进行。结果表明,在RGB空间中,利用Frery颜色名称模型和欧几里得距离测量颜色相似度来识别织物颜色名称的方法总体上优于其他方法。通过对织物图像颜色饱和度的进一步分析,我们发现织物图像颜色命名的有效方法如下:Frery的HSV空间二次距离颜色命名模型对于低颜色饱和度组效果较好,准确率为96.23%。Frery在RGB空间中具有欧氏距离的颜色名称模型对于中等颜色饱和度组效果良好(准确率为81.82%)。Fractals Lab的基于HSV空间加权欧几里得距离的Ultimate颜色词汇模型对于高颜色饱和度组效果较好(准确率为76.09%)。
{"title":"Comparison of Fabric Color Naming Using RGB and HSV Color Models","authors":"Piyapat Charoensawan, P. Sukanya, I. Shimizu","doi":"10.1109/JCSSE.2018.8457329","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457329","url":null,"abstract":"This paper aims to find an effective method for identifying colors of fabrics. We consider the following color naming models: Basic Color terms, ISCC-NBS Color system, Frery’s Color name, and Fractals Lab’s Ultimate color vocabulary. The appropriate color name is assigned for a fabric image by using seven types of minimum distance in RGB and HSV color models. Experiments are performed on S3 plain color fabric images. Results show that in general, the method of identifying fabric color name by using Frery’s color name model with the color similarity measure by Euclidean distance in RGB space gives the better result than the other methods. When we analyze in more details by classifying fabric images into three groups based on color saturation, we found that the effective methods for color naming are as follows: Frery’s color name model with the quadratic distance in HSV space works well for the group of low color saturation (96.23% accuracy). Frery’s color name model with Euclidean distance in RGB space works well for the group of medium color saturation (81.82% accuracy). And Fractals Lab’s Ultimate color vocabulary model with the weighted Euclidean distance in HSV space work good for the group of high color saturation (76.09% accuracy).","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130014064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Operation in Partitioned Circuits with Scalable Hardware Mechanism 具有可扩展硬件机制的分区电路操作
Yusuke Katoh, Hironari Yoshiuchi, Yoshio Murata, H. Nakajo
We propose the Scalable Hardware Mechanism, which enables the operation of a partitioned circuit to prevent the degradation of clock frequency by minimizing its dependence on the usage and the type of FPGA. Our mechanism provides a reduced delay by the collective signal transmission with the partitioned AES code generation circuit and the character string edit distance calculation circuit as partitioned circuits. The collective signal transmission has attained 1.27 times improvement in the speed for the AES code generation circuit and 3.16 times improvement for the character string edit distance calculation circuit compared with the circuit by the conventional method.
我们提出了一种可扩展的硬件机制,它使分割电路的操作能够通过最小化其对FPGA的使用和类型的依赖来防止时钟频率的退化。我们的机制利用分割的AES编码生成电路和字符串编辑距离计算电路作为分割电路,通过集体信号传输来减少延迟。与传统方法相比,AES编码生成电路的集体信号传输速度提高了1.27倍,字符串编辑距离计算电路的集体信号传输速度提高了3.16倍。
{"title":"Operation in Partitioned Circuits with Scalable Hardware Mechanism","authors":"Yusuke Katoh, Hironari Yoshiuchi, Yoshio Murata, H. Nakajo","doi":"10.1109/JCSSE.2018.8457181","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457181","url":null,"abstract":"We propose the Scalable Hardware Mechanism, which enables the operation of a partitioned circuit to prevent the degradation of clock frequency by minimizing its dependence on the usage and the type of FPGA. Our mechanism provides a reduced delay by the collective signal transmission with the partitioned AES code generation circuit and the character string edit distance calculation circuit as partitioned circuits. The collective signal transmission has attained 1.27 times improvement in the speed for the AES code generation circuit and 3.16 times improvement for the character string edit distance calculation circuit compared with the circuit by the conventional method.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing the efficiency of One-time key Issuing for The First Verification Caller ID Spoofing Attacks 提高首次验证来电显示欺骗攻击的一次性密钥发放效率
Narongsak Sukma, R. Chokngamwong
Nowadays, verifying the owner of every phone number is still possible only by showing the phone number on the screen. The telephone networks today do not have a proper validation process. This is a critical vulnerability for attackers to use this vulnerability to fake a phone number to deceive themselves as someone, i.e., a government agency and trick people into believing and eventually transferring money. Based on this problem, the research team has researched and found that many kinds of research have tried to solve the problem using a short message. (SMS), time spent on user response, hardware usage, and digital signature verification. However, the research team presented a new conceptual model as a onetime password authentication model for authentication. This new approach can reduce the need for external hardware, learning time and response time without the use of an external CA or a certification authority. This paper base on our previous paper [1] has a point that needed for improvement in the first time verification process. We propose a model that adds the ability to the first verification called advisory system which uses statistics to assist responsiveness to unknown calls. The testing result has shown the presence of fraud detection at the first call. The performance of the system is satisfied because the mobile phone that has this monitoring system installed still usually operates. Temperature, resources usage, and power consumption are not affected.
如今,验证每个电话号码的所有者仍然只能通过在屏幕上显示电话号码来实现。今天的电话网络没有一个适当的验证过程。这是攻击者利用此漏洞伪造电话号码来欺骗自己为某人(即政府机构)并欺骗人们相信并最终转移资金的关键漏洞。基于这个问题,研究小组进行了研究,发现很多研究都试图用短信来解决这个问题。(SMS)、花在用户响应、硬件使用和数字签名验证上的时间。然而,研究小组提出了一种新的概念模型,即一次性密码认证模型。这种新方法可以减少对外部硬件的需求、学习时间和响应时间,而无需使用外部CA或证书颁发机构。本文在前人文献[1]的基础上,有一个在第一次验证过程中需要改进的地方。我们提出了一个模型,该模型将能力添加到称为咨询系统的第一个验证中,该系统使用统计数据来协助对未知呼叫的响应。测试结果表明,在第一次调用时存在欺诈检测。由于安装了该监控系统的手机仍然可以正常运行,因此该系统的性能令人满意。对温度、资源使用和功耗无影响。
{"title":"Increasing the efficiency of One-time key Issuing for The First Verification Caller ID Spoofing Attacks","authors":"Narongsak Sukma, R. Chokngamwong","doi":"10.1109/JCSSE.2018.8457341","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457341","url":null,"abstract":"Nowadays, verifying the owner of every phone number is still possible only by showing the phone number on the screen. The telephone networks today do not have a proper validation process. This is a critical vulnerability for attackers to use this vulnerability to fake a phone number to deceive themselves as someone, i.e., a government agency and trick people into believing and eventually transferring money. Based on this problem, the research team has researched and found that many kinds of research have tried to solve the problem using a short message. (SMS), time spent on user response, hardware usage, and digital signature verification. However, the research team presented a new conceptual model as a onetime password authentication model for authentication. This new approach can reduce the need for external hardware, learning time and response time without the use of an external CA or a certification authority. This paper base on our previous paper [1] has a point that needed for improvement in the first time verification process. We propose a model that adds the ability to the first verification called advisory system which uses statistics to assist responsiveness to unknown calls. The testing result has shown the presence of fraud detection at the first call. The performance of the system is satisfied because the mobile phone that has this monitoring system installed still usually operates. Temperature, resources usage, and power consumption are not affected.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Emerging Topic Detection on Twitter Using Random Forest with Stock Indicator Features 基于库存指标特征的随机森林的Twitter在线新兴话题检测
Ekapop Verasakulvong, P. Vateekul, Apivadee Piyatumrong, Chatchawal Sangkeettrakarn
Social media is one of the most impactful and fastest communication methods. By monitoring Twitter streams, we are able to detect emerging topics and understand events around the world. There are some prior attempts that aim to online detect topics on Twitter. However, they can only detect bursty topics by using user-defined keywords a long with simple rules. In this paper, we propose an algorithm to detect emerging topics on Twitter streams. To detect emerging topics, a clustering technique has been applied to aggregate a set of keywords. Since an emerging topic occurs continuously, the emerging topics are merged with stateful technique to accumulate topics from different time intervals. To detect both high signal topics and small-medium signal topics, we use statistical features based on average, acceleration, and z-score. Moreover, we propose to include the stock indicator features: Relative Strength Index (RSI) and Stochastic Oscillator (STOCH). They are common features in trend (oversold and overbought) detection in stock analysis which is similar to our topic detection in twitter. To capture any event patterns, Random Forest (RF) has been proposed as a classifier to detect emerging keywords by utilizing the stated above five features. To evaluate the performance, we created and published a corpus by collecting Twitter data for 10 days with over 80 million tweets and then labeling possible topics in tota1161 events along with related keywords. The experiment was conducted on our collected data. The Fl-results show that our model outperforms all baselines: TwitterMonitor, SigniTrend, and TopicSketch, in terms of detected keywords and topics.
社交媒体是最具影响力和最快的沟通方式之一。通过监控Twitter信息流,我们能够发现新兴话题,了解世界各地的事件。之前有一些尝试旨在在线检测Twitter上的话题。但是,它们只能通过使用用户定义的关键字和简单的规则来检测突发主题。在本文中,我们提出了一种算法来检测Twitter流中的新兴主题。为了检测新出现的主题,应用聚类技术对一组关键字进行聚合。由于新出现的主题是连续出现的,因此采用有状态技术对新出现的主题进行合并,从不同的时间间隔积累主题。为了检测高信号主题和中小信号主题,我们使用基于平均值、加速度和z-score的统计特征。此外,我们建议纳入股票指标特征:相对强弱指数(RSI)和随机振荡器(STOCH)。它们是股票分析趋势(超卖和超买)检测中的常见特征,类似于我们在twitter上的主题检测。为了捕获任何事件模式,随机森林(RF)被提出作为一种分类器,利用上述五个特征来检测新出现的关键字。为了评估性能,我们创建并发布了一个语料库,收集了10天内超过8000万条tweet的Twitter数据,然后在总共1161个事件中标记可能的主题以及相关关键字。实验是在我们收集的数据上进行的。结果表明,我们的模型在检测关键字和主题方面优于所有基线:TwitterMonitor, signittrend和TopicSketch。
{"title":"Online Emerging Topic Detection on Twitter Using Random Forest with Stock Indicator Features","authors":"Ekapop Verasakulvong, P. Vateekul, Apivadee Piyatumrong, Chatchawal Sangkeettrakarn","doi":"10.1109/JCSSE.2018.8457349","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457349","url":null,"abstract":"Social media is one of the most impactful and fastest communication methods. By monitoring Twitter streams, we are able to detect emerging topics and understand events around the world. There are some prior attempts that aim to online detect topics on Twitter. However, they can only detect bursty topics by using user-defined keywords a long with simple rules. In this paper, we propose an algorithm to detect emerging topics on Twitter streams. To detect emerging topics, a clustering technique has been applied to aggregate a set of keywords. Since an emerging topic occurs continuously, the emerging topics are merged with stateful technique to accumulate topics from different time intervals. To detect both high signal topics and small-medium signal topics, we use statistical features based on average, acceleration, and z-score. Moreover, we propose to include the stock indicator features: Relative Strength Index (RSI) and Stochastic Oscillator (STOCH). They are common features in trend (oversold and overbought) detection in stock analysis which is similar to our topic detection in twitter. To capture any event patterns, Random Forest (RF) has been proposed as a classifier to detect emerging keywords by utilizing the stated above five features. To evaluate the performance, we created and published a corpus by collecting Twitter data for 10 days with over 80 million tweets and then labeling possible topics in tota1161 events along with related keywords. The experiment was conducted on our collected data. The Fl-results show that our model outperforms all baselines: TwitterMonitor, SigniTrend, and TopicSketch, in terms of detected keywords and topics.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129100449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1