首页 > 最新文献

2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)最新文献

英文 中文
Detection and Classification of Road Damage Using Camera with GLCM and SVM 基于GLCM和SVM的道路损伤相机检测与分类
st Sartika, Z. Zainuddin, rd Amil, Ahmad Ilham
Road damage is a common issue in large cities, caused by factors such as heavy traffic, rainfall, and inadequate road maintenance. Detecting road damage, such as potholes, cracks, distortion, fatness, and polished aggregate, is crucial to ensure the safety and comfort of road users. This study proposes a method that uses the Gray Level Co-Occurrence Matrix (GLCM) and Support Vector Machine (SVM) algorithms to detect road damage. The proposed method involves processing road images using the GLCM algorithm to extract texture features, such as dissimilarity, correlation, contrast, energy, and Angular Second Moment. GLCM is an effective approach for extracting texture information and generating a matrix that illustrates the relationship between image pixels. These extracted features are then fed as input to the SVM model. The SVM model is trained to classify road images into several categories, including potholes, cracks, distortion, fatness, and polished aggregate. SVM is a machine learning method that can classify data into predetermined categories based on the extracted features. The test results show that the proposed method can detect road damage with high accuracy, as indicated by the F1 score for potholes of 0.95, cracks of 0.89, distortion of 0.8, fatness of 0.89, and polished aggregate of 0.95, with an overall accuracy of 80%. By improving the dataset and reducing the number of existing damage categories, it is likely that the accuracy of the method can be increased to around 90%. This approach can serve as a tool for continuously monitoring road conditions and assisting road authorities in making decisions regarding timely road improvements.
在大城市,道路损坏是一个普遍的问题,它是由交通拥挤、降雨和道路养护不足等因素造成的。检测道路损坏,如坑洼、裂缝、变形、肥胖和抛光集料,对于确保道路使用者的安全和舒适至关重要。本研究提出了一种基于灰度共生矩阵(GLCM)和支持向量机(SVM)算法的道路损伤检测方法。该方法使用GLCM算法对道路图像进行处理,提取纹理特征,如不相似性、相关性、对比度、能量和角秒矩。GLCM是一种有效的提取纹理信息和生成矩阵来表示图像像素间关系的方法。然后将这些提取的特征作为支持向量机模型的输入。训练SVM模型将道路图像分为几类,包括坑洼、裂缝、变形、肥胖和抛光集料。SVM是一种机器学习方法,它可以根据提取的特征将数据分类到预定的类别中。试验结果表明,该方法对道路损伤的检测精度较高,凹坑F1值为0.95,裂缝F1值为0.89,变形F1值为0.8,脂肪F1值为0.89,抛光骨料F1值为0.95,总体精度为80%。通过改进数据集和减少现有损伤类别的数量,该方法的准确率可能会提高到90%左右。这种方法可以作为持续监测道路状况的工具,并协助道路当局就及时改善道路作出决定。
{"title":"Detection and Classification of Road Damage Using Camera with GLCM and SVM","authors":"st Sartika, Z. Zainuddin, rd Amil, Ahmad Ilham","doi":"10.1109/IAICT59002.2023.10205539","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205539","url":null,"abstract":"Road damage is a common issue in large cities, caused by factors such as heavy traffic, rainfall, and inadequate road maintenance. Detecting road damage, such as potholes, cracks, distortion, fatness, and polished aggregate, is crucial to ensure the safety and comfort of road users. This study proposes a method that uses the Gray Level Co-Occurrence Matrix (GLCM) and Support Vector Machine (SVM) algorithms to detect road damage. The proposed method involves processing road images using the GLCM algorithm to extract texture features, such as dissimilarity, correlation, contrast, energy, and Angular Second Moment. GLCM is an effective approach for extracting texture information and generating a matrix that illustrates the relationship between image pixels. These extracted features are then fed as input to the SVM model. The SVM model is trained to classify road images into several categories, including potholes, cracks, distortion, fatness, and polished aggregate. SVM is a machine learning method that can classify data into predetermined categories based on the extracted features. The test results show that the proposed method can detect road damage with high accuracy, as indicated by the F1 score for potholes of 0.95, cracks of 0.89, distortion of 0.8, fatness of 0.89, and polished aggregate of 0.95, with an overall accuracy of 80%. By improving the dataset and reducing the number of existing damage categories, it is likely that the accuracy of the method can be increased to around 90%. This approach can serve as a tool for continuously monitoring road conditions and assisting road authorities in making decisions regarding timely road improvements.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126871304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Non-Intrusive Load Monitoring for Smart Homes Utilizing Attention-Based Aggregation 基于注意力聚合的智能家居联合非侵入式负载监测
Shamisa Kaspour, A. Yassine
Nowadays, Non-Intrusive Load Monitoring (NILM) with Federated Learning (FL) framework has become a growing study towards providing a secure energy disaggregation system in smart homes. This study aims at deploying an attention-based aggregation (FedAtt) approach in FL to emphasize agents’ behavioral differences when consuming energy from various appliances. The goal of the proposed technique is to minimize the weighted distance between the parameters of the local model and the global model to better represent each local model’s characteristics. In this paper, we examine two different models for NILM: Short Sequence-to-Point (SS2P) and Variational Auto-Encoder (VAE). Our goal is to evaluate the effectiveness of FedAtt. The evaluation of the framework was carried out using the UK-DALE and REFIT datasets. The obtained results were then compared against centralized approaches of the models as well as FedAvg. Our findings show that FedAtt generates comparable results to the centralized model and FedAvg while improving the stability of FL at different values of added noise to local parameters.
目前,基于联邦学习(FL)框架的非侵入式负荷监测(NILM)已成为智能家居中安全能源分解系统的研究热点。本研究旨在利用基于注意力的聚合(FedAtt)方法来强调智能体在从不同设备消耗能量时的行为差异。该技术的目标是最小化局部模型和全局模型参数之间的加权距离,以更好地表示每个局部模型的特征。在本文中,我们研究了两个不同的NILM模型:短序列到点(SS2P)和变分自编码器(VAE)。我们的目标是评估FedAtt的有效性。使用UK-DALE和REFIT数据集对该框架进行评估。然后将得到的结果与模型的集中方法以及fedag进行比较。我们的研究结果表明,FedAtt产生的结果与集中式模型和fedag相当,同时在不同的局部参数添加噪声值下提高了FL的稳定性。
{"title":"Federated Non-Intrusive Load Monitoring for Smart Homes Utilizing Attention-Based Aggregation","authors":"Shamisa Kaspour, A. Yassine","doi":"10.1109/IAICT59002.2023.10205647","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205647","url":null,"abstract":"Nowadays, Non-Intrusive Load Monitoring (NILM) with Federated Learning (FL) framework has become a growing study towards providing a secure energy disaggregation system in smart homes. This study aims at deploying an attention-based aggregation (FedAtt) approach in FL to emphasize agents’ behavioral differences when consuming energy from various appliances. The goal of the proposed technique is to minimize the weighted distance between the parameters of the local model and the global model to better represent each local model’s characteristics. In this paper, we examine two different models for NILM: Short Sequence-to-Point (SS2P) and Variational Auto-Encoder (VAE). Our goal is to evaluate the effectiveness of FedAtt. The evaluation of the framework was carried out using the UK-DALE and REFIT datasets. The obtained results were then compared against centralized approaches of the models as well as FedAvg. Our findings show that FedAtt generates comparable results to the centralized model and FedAvg while improving the stability of FL at different values of added noise to local parameters.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning-based Microsection Measurement Framework for Print Circuit Boards 基于深度学习的印刷电路板微截面测量框架
Chia-Yu Lin, Chieh-Ling Li, Yu-Chiao Kuo, Yun-Chieh Cheng, C. Jian, Hsiang-Ting Huang, Mitchel M. Hsu
Microsectioning is a destructive testing procedure used in the printed circuit board (PCB) fabrication industry to evaluate the quality of PCBs. During cross-section analysis, operators measure PCB component widths manually, which can lead to inconsistencies and make it challenging to establish standardized procedures. We propose a Deep Learning-based Microsection Measurement (DL-MM) Framework for PCB microsection samples to address this issue. The framework comprises four modules: the target detection module, the image preprocessing module, the labeling model, and the coordinate adaptation module. The target detection module is responsible for extracting the area of interest to be measured, which reduces the influence of surrounding noise and improves measurement accuracy. In the image preprocessing module, the target area image is normalized, labeled with coordinates, and resized to different sizes based on the class. The labeling model utilizes a convolutional neural network (CNN) model trained separately for each class to predict its punctuation, as the number of coordinates varies for each class. The final module is the coordinate adaptation module, which utilizes the predicted coordinates to draw a straight line on the expected image for improved readability. In addition, we evaluate the proposed framework on two types of microsections, and the experimental results show that the measurements’ root-mean-square error (RMSE) is only 2.1 pixels. Our proposed framework offers a more efficient, faster, and cost-effective alternative to the traditional manual measurement method.
微切片是印刷电路板(PCB)制造行业中用于评估PCB质量的破坏性检测方法。在横截面分析过程中,操作人员手动测量PCB元件宽度,这可能导致不一致,并使建立标准化程序具有挑战性。我们提出了一个基于深度学习的PCB微切片测量(DL-MM)框架来解决这个问题。该框架包括四个模块:目标检测模块、图像预处理模块、标注模型和坐标自适应模块。目标检测模块负责提取待测感兴趣区域,减少了周围噪声的影响,提高了测量精度。在图像预处理模块中,对目标区域图像进行归一化,标记坐标,并根据类调整大小。标记模型利用卷积神经网络(CNN)模型为每个类别单独训练来预测其标点符号,因为每个类别的坐标数量不同。最后一个模块是坐标适配模块,利用预测的坐标在期望的图像上画一条直线,提高可读性。此外,我们在两种类型的显微切片上对所提出的框架进行了评估,实验结果表明,测量结果的均方根误差(RMSE)仅为2.1像素。我们提出的框架为传统的人工测量方法提供了一种更有效、更快和更具成本效益的替代方案。
{"title":"A Deep Learning-based Microsection Measurement Framework for Print Circuit Boards","authors":"Chia-Yu Lin, Chieh-Ling Li, Yu-Chiao Kuo, Yun-Chieh Cheng, C. Jian, Hsiang-Ting Huang, Mitchel M. Hsu","doi":"10.1109/IAICT59002.2023.10205911","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205911","url":null,"abstract":"Microsectioning is a destructive testing procedure used in the printed circuit board (PCB) fabrication industry to evaluate the quality of PCBs. During cross-section analysis, operators measure PCB component widths manually, which can lead to inconsistencies and make it challenging to establish standardized procedures. We propose a Deep Learning-based Microsection Measurement (DL-MM) Framework for PCB microsection samples to address this issue. The framework comprises four modules: the target detection module, the image preprocessing module, the labeling model, and the coordinate adaptation module. The target detection module is responsible for extracting the area of interest to be measured, which reduces the influence of surrounding noise and improves measurement accuracy. In the image preprocessing module, the target area image is normalized, labeled with coordinates, and resized to different sizes based on the class. The labeling model utilizes a convolutional neural network (CNN) model trained separately for each class to predict its punctuation, as the number of coordinates varies for each class. The final module is the coordinate adaptation module, which utilizes the predicted coordinates to draw a straight line on the expected image for improved readability. In addition, we evaluate the proposed framework on two types of microsections, and the experimental results show that the measurements’ root-mean-square error (RMSE) is only 2.1 pixels. Our proposed framework offers a more efficient, faster, and cost-effective alternative to the traditional manual measurement method.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm 基于BLAKE2哈希算法的增强视觉密码系统
A. Bhuvaneshwari, P. Kaythry
Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based on the BLAKE 2 hash algorithm, we propose a basic security mechanism. Our proposed method aims to improve the transfer of sensitive image data between nodes. The key issue is transmitting data across multiple nodes invisibly without being hacked. The proposed system’s primary objective is to maintain the picture secure and safe from third parties. It is accomplished by combining encryption and decryption into a lightweight image transport technique. It describes a technique for generating secret cryptographic keys from image pixels using the BLAKE 2 cryptographic hash that is image content adaptive. This scheme includes three encryption processes: DC coefficient encryption, AC coefficient encryption, and novel orthogonal transformation. The encrypted image is safely sent to another node over the network using an upgraded visual cryptosystem, and the decrypted image is successfully obtained at the receiver node.
在日常生活中的许多物理设备已经连接到全球网络自成立以来。网络的安全性随着连接到它的项目数量的增加而提高。然而,目前的安全措施使进展变得困难。因此,基于BLAKE 2哈希算法,我们提出了一个基本的安全机制。我们提出的方法旨在提高敏感图像数据在节点之间的传输。关键问题是在不被黑客攻击的情况下,在多个节点之间隐形传输数据。所提出的系统的主要目标是维护图像的安全性和免受第三方的侵害。它通过将加密和解密组合成一种轻量级的图像传输技术来实现。它描述了一种使用自适应图像内容的BLAKE 2加密散列从图像像素生成秘密加密密钥的技术。该方案包括三种加密过程:直流系数加密、交流系数加密和新型正交变换。加密后的图像使用升级后的可视密码系统通过网络安全地发送到另一个节点,并在接收节点成功获得解密后的图像。
{"title":"Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm","authors":"A. Bhuvaneshwari, P. Kaythry","doi":"10.1109/IAICT59002.2023.10205901","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205901","url":null,"abstract":"Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based on the BLAKE 2 hash algorithm, we propose a basic security mechanism. Our proposed method aims to improve the transfer of sensitive image data between nodes. The key issue is transmitting data across multiple nodes invisibly without being hacked. The proposed system’s primary objective is to maintain the picture secure and safe from third parties. It is accomplished by combining encryption and decryption into a lightweight image transport technique. It describes a technique for generating secret cryptographic keys from image pixels using the BLAKE 2 cryptographic hash that is image content adaptive. This scheme includes three encryption processes: DC coefficient encryption, AC coefficient encryption, and novel orthogonal transformation. The encrypted image is safely sent to another node over the network using an upgraded visual cryptosystem, and the decrypted image is successfully obtained at the receiver node.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Temporal-Spatial Time Series Self-Attention 2D & 3D Human Motion Forecasting 时空时间序列自关注二维和三维人体运动预测
Andi Prademon Yunus, Kento Morita, Nobu C. Shirai, Tetsushi Wakabayashi
The ability to forecast human motion is crucial in increasing awareness of moving objects in the environment. To address this challenge, this study focuses on human motion forecasting based on annotated 2D and 3D data and the model’s usability on data obtained from pose estimation. This research presents the Temporal-Spatial Time Series Self-Attention method for human motion forecasting. The approach is evaluated using the Human 3.6M, 3DPW, and AMASS datasets based on standard evaluation protocols. Our method performed well in the 2D ground truth and pose estimation data compared to the other time series method. Our method did not yet outperform previous research in 3D input data. However, based on the quantitative and qualitative assessments, our approach demonstrated excellent performance in predicting human motion for short- and long-term objectives.
预测人类运动的能力对于提高对环境中运动物体的意识至关重要。为了应对这一挑战,本研究将重点放在基于注释的2D和3D数据的人体运动预测以及模型对姿态估计数据的可用性上。提出了一种时空时间序列自关注的人体运动预测方法。基于标准评估协议,使用Human 3.6M、3DPW和AMASS数据集对该方法进行了评估。与其他时间序列方法相比,我们的方法在二维地面真值和姿态估计数据中表现良好。我们的方法在3D输入数据方面还没有超越之前的研究。然而,基于定量和定性评估,我们的方法在预测短期和长期目标的人体运动方面表现出色。
{"title":"Temporal-Spatial Time Series Self-Attention 2D & 3D Human Motion Forecasting","authors":"Andi Prademon Yunus, Kento Morita, Nobu C. Shirai, Tetsushi Wakabayashi","doi":"10.1109/IAICT59002.2023.10205596","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205596","url":null,"abstract":"The ability to forecast human motion is crucial in increasing awareness of moving objects in the environment. To address this challenge, this study focuses on human motion forecasting based on annotated 2D and 3D data and the model’s usability on data obtained from pose estimation. This research presents the Temporal-Spatial Time Series Self-Attention method for human motion forecasting. The approach is evaluated using the Human 3.6M, 3DPW, and AMASS datasets based on standard evaluation protocols. Our method performed well in the 2D ground truth and pose estimation data compared to the other time series method. Our method did not yet outperform previous research in 3D input data. However, based on the quantitative and qualitative assessments, our approach demonstrated excellent performance in predicting human motion for short- and long-term objectives.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"160 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114044770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IAICT 2023 Cover Page iact2023封面页
M. Nasrun
ing is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyrights Manager at pubs-permissions@ieee.org.
允许Ing,并注明出处。在美国版权法的限制之外,图书馆允许影印本卷中第一页底部带有代码的文章,供用户私人使用,前提是代码中显示的每本费用由版权清算中心支付,地址:222 Rosewood Drive, Danvers, MA 01923。如需转载或转载许可,请发送电子邮件至IEEE版权经理pubs-permissions@ieee.org。
{"title":"IAICT 2023 Cover Page","authors":"M. Nasrun","doi":"10.1109/IAICT59002.2023.10205854","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205854","url":null,"abstract":"ing is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyrights Manager at pubs-permissions@ieee.org.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121895058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Textual Similarity in Requirement Specification and Use Case Description based on Sentence Transformer Model 基于句子转换模型的需求规范和用例描述语义文本相似度研究
Meizan Arthur Alfianto, Y. Priyadi, K. A. Laksitowening
The compatibility between the Use Case Description (UCD) and the Functional Requirements (FR) is essential for the successful development of software. Nevertheless, discrepancies may occur if the UCD does not precisely reflect the intended functionalities specified in the FR. This paper uses a Sentence Transformer Model to evaluate the alignment between the UCD and FR, both written in natural language. The study aims to identify potential discrepancies and ambiguities in the UCD and suggest modifications to better their correspondence with the FR. The Sentence Transformer Model quantifies the degree of alignment between the UCD and FR by analyzing semantic similarity. According to the findings, modifications to the UCD, such as refining terminology, elucidating definitions, and correcting writing errors, can substantially increase semantic similarity with the FR. The Pearson correlation coefficient of 0.70 indicates the correlation between the predicted and the ground truth of semantic similarity is linearly positive. The Spearman rank correlation coefficient value of 0.715 suggests a positive monotonic relationship, with the two text types maintaining their rank of semantic similarity. The low mean squared error (MSE) value of 0.024 demonstrates the model’s predictive accuracy for semantic similarity.
用例描述(UCD)和功能需求(FR)之间的兼容性对于软件的成功开发至关重要。然而,如果UCD不能准确地反映FR中指定的预期功能,则可能会出现差异。本文使用句子转换模型来评估UCD和FR之间的对齐,两者都是用自然语言编写的。该研究的目的是找出统一句子描述中潜在的差异和歧义,并提出修改建议,以使其更好地与句子表对应。句子转换模型通过分析语义相似度来量化统一句子描述和句子表之间的对齐程度。根据研究结果,对UCD的修改,如精炼术语、阐明定义和纠正书写错误,可以大大提高与FR的语义相似度。Pearson相关系数为0.70,表明预测结果与语义相似度的基本事实之间的相关性为线性正相关。Spearman秩相关系数值为0.715,表明两种文本类型之间存在正单调关系,保持语义相似度的秩。均方误差(MSE)值为0.024,表明该模型对语义相似度的预测精度较高。
{"title":"Semantic Textual Similarity in Requirement Specification and Use Case Description based on Sentence Transformer Model","authors":"Meizan Arthur Alfianto, Y. Priyadi, K. A. Laksitowening","doi":"10.1109/IAICT59002.2023.10205769","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205769","url":null,"abstract":"The compatibility between the Use Case Description (UCD) and the Functional Requirements (FR) is essential for the successful development of software. Nevertheless, discrepancies may occur if the UCD does not precisely reflect the intended functionalities specified in the FR. This paper uses a Sentence Transformer Model to evaluate the alignment between the UCD and FR, both written in natural language. The study aims to identify potential discrepancies and ambiguities in the UCD and suggest modifications to better their correspondence with the FR. The Sentence Transformer Model quantifies the degree of alignment between the UCD and FR by analyzing semantic similarity. According to the findings, modifications to the UCD, such as refining terminology, elucidating definitions, and correcting writing errors, can substantially increase semantic similarity with the FR. The Pearson correlation coefficient of 0.70 indicates the correlation between the predicted and the ground truth of semantic similarity is linearly positive. The Spearman rank correlation coefficient value of 0.715 suggests a positive monotonic relationship, with the two text types maintaining their rank of semantic similarity. The low mean squared error (MSE) value of 0.024 demonstrates the model’s predictive accuracy for semantic similarity.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Fold Cluster Head Selection in Wireless Sensor Networks 无线传感器网络中的二次簇头选择
Tabinda Ashraf, M. Iqbal, Steven S. W. Lee, Jen-Yi Pan
Energy efficient routing protocol is the requirement of today’s wireless sensor networks. Various protocols have been developed in order to create an energy efficient wireless sensor networks, but there are still some shortcomings in this area. During cluster formation, some nodes are left alone and referred to as lone nodes, which directly communicate with the Base Station (BS) and consume a significant portion of the energy. To overcome this issue, this study proposes a Two-Fold Cluster Head Selection (TFCHS) routing algorithm that reduces the number of lone nodes and enhances the network’s lifetime. The proposed algorithm is based on the LEACH-B (LEACH-Balanced) and Residual Energy (ResEn) protocols. In TFCHS, lone node cluster formation is achieved by identifying the location of lone nodes and comparing their distance to a threshold distance. Cluster Heads (CHs) are then selected, and they broadcast TDMA slots to their member nodes in a steady phase, where nodes send their data to the CH. The CHs process the received data and send it to the BS. The proposed work performed better in terms of average aggregation energy, lone nodes, consumed energy, network lifetime, and effective packets.
高效节能的路由协议是当今无线传感器网络的要求。为了创建一个节能的无线传感器网络,已经开发了各种协议,但在这一领域仍然存在一些不足。在集群形成过程中,有些节点是单独存在的,称为孤节点,它们直接与基站(BS)通信,并消耗很大一部分能量。为了克服这个问题,本研究提出了一种双重簇头选择(TFCHS)路由算法,该算法减少了孤独节点的数量并提高了网络的生存期。该算法基于LEACH-B (LEACH-Balanced)和ResEn (Residual Energy)协议。在TFCHS中,通过识别孤立节点的位置并将其距离与阈值距离进行比较,实现孤立节点簇的形成。然后选择簇头(CHs),它们在稳定阶段向其成员节点广播TDMA插槽,节点将其数据发送到CH。CHs处理接收到的数据并将其发送到BS。在平均聚合能量、孤立节点、消耗能量、网络生存时间和有效数据包方面,该算法表现更好。
{"title":"Two Fold Cluster Head Selection in Wireless Sensor Networks","authors":"Tabinda Ashraf, M. Iqbal, Steven S. W. Lee, Jen-Yi Pan","doi":"10.1109/IAICT59002.2023.10205705","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205705","url":null,"abstract":"Energy efficient routing protocol is the requirement of today’s wireless sensor networks. Various protocols have been developed in order to create an energy efficient wireless sensor networks, but there are still some shortcomings in this area. During cluster formation, some nodes are left alone and referred to as lone nodes, which directly communicate with the Base Station (BS) and consume a significant portion of the energy. To overcome this issue, this study proposes a Two-Fold Cluster Head Selection (TFCHS) routing algorithm that reduces the number of lone nodes and enhances the network’s lifetime. The proposed algorithm is based on the LEACH-B (LEACH-Balanced) and Residual Energy (ResEn) protocols. In TFCHS, lone node cluster formation is achieved by identifying the location of lone nodes and comparing their distance to a threshold distance. Cluster Heads (CHs) are then selected, and they broadcast TDMA slots to their member nodes in a steady phase, where nodes send their data to the CH. The CHs process the received data and send it to the BS. The proposed work performed better in terms of average aggregation energy, lone nodes, consumed energy, network lifetime, and effective packets.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Computer Vision Techniques for Internet-of-Things Devices 物联网设备计算机视觉技术综述
I. Kaur, Adwaita Janardhan Jadhav
Deep neural networks (DNNs) are state-of-the-art techniques for solving most computer vision problems. DNNs require billions of parameters and operations to achieve state-of-the-art results. This requirement makes DNNs extremely compute, memory, and energy-hungry, and consequently difficult to deploy on small battery-powered Internet-of-Things (IoT) devices with limited computing resources. Deployment of DNNs on Internet-of-Things devices, such as traffic cameras, can improve public safety by enabling applications such as automatic accident detection and emergency response. Through this paper, we survey the recent advances in low-power and energy-efficient DNN implementations that improve the deployability of DNNs without significantly sacrificing accuracy. In general, these techniques either reduce the memory requirements, the number of arithmetic operations, or both. The techniques can be divided into three major categories: (1) neural network compression, (2) network architecture search and design, and (3) compiler and graph optimizations. In this paper, we survey both low-power techniques for both convolutional and transformer DNNs, and summarize the advantages, disadvantages, and open research problems.
深度神经网络(dnn)是解决大多数计算机视觉问题的最新技术。深度神经网络需要数十亿个参数和操作才能达到最先进的结果。这种要求使得深度神经网络非常需要计算、内存和能量,因此很难部署在计算资源有限的小型电池供电的物联网(IoT)设备上。在交通摄像头等物联网设备上部署dnn可以通过启用自动事故检测和应急响应等应用来改善公共安全。通过本文,我们概述了低功耗和节能的深度神经网络实现的最新进展,这些实现在不显着牺牲精度的情况下提高了深度神经网络的可部署性。一般来说,这些技术要么减少内存需求,要么减少算术运算的数量,要么两者兼而有之。这些技术可以分为三大类:(1)神经网络压缩,(2)网络架构搜索和设计,(3)编译器和图优化。本文综述了卷积深度神经网络和变压器深度神经网络的低功耗技术,并总结了它们的优点、缺点和有待研究的问题。
{"title":"Survey on Computer Vision Techniques for Internet-of-Things Devices","authors":"I. Kaur, Adwaita Janardhan Jadhav","doi":"10.1109/IAICT59002.2023.10205899","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205899","url":null,"abstract":"Deep neural networks (DNNs) are state-of-the-art techniques for solving most computer vision problems. DNNs require billions of parameters and operations to achieve state-of-the-art results. This requirement makes DNNs extremely compute, memory, and energy-hungry, and consequently difficult to deploy on small battery-powered Internet-of-Things (IoT) devices with limited computing resources. Deployment of DNNs on Internet-of-Things devices, such as traffic cameras, can improve public safety by enabling applications such as automatic accident detection and emergency response. Through this paper, we survey the recent advances in low-power and energy-efficient DNN implementations that improve the deployability of DNNs without significantly sacrificing accuracy. In general, these techniques either reduce the memory requirements, the number of arithmetic operations, or both. The techniques can be divided into three major categories: (1) neural network compression, (2) network architecture search and design, and (3) compiler and graph optimizations. In this paper, we survey both low-power techniques for both convolutional and transformer DNNs, and summarize the advantages, disadvantages, and open research problems.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116249404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Cervical Cell Images into Healthy or Cancer Using Convolution Neural Network and Linear Discriminant Analysis 基于卷积神经网络和线性判别分析的宫颈细胞图像分类
Mohammad Sholik, C. Fatichah, B. Amaliah
Cancer of the cervix is the disease that accounts for the majority of deaths in women. This disease accounts for nearly 12% of all cancers and has a high risk of death for women worldwide. If precancerous lesions are found early, the disease can be cured. Pap smear screening is known for its reliability and effectiveness in detecting cervical cell abnormalities early, but there is a risk of errors in manual image analysis. Using deep learning approaches in the domains of medicine and healthcare can be used for decision support systems to remove bias from observations. This paper presents a framework that utilizes deep learning and techniques to reduce the dimensions of features. The suggested framework captures deep features from a convolutional neural network (CNN) model and employs a feature reduction approach using linear discriminant analysis (LDA) to ensure computational cost reduction. The feature dimension derived from the CNN model produces a huge feature space that requires a feature reduction to eliminate redundant features. The features that have been reduced by linear discriminant analysis are used for the training of three classifiers, namely SVM, MLP, and K-NN, to generate final predictions. The evaluation of the proposed framework involved the utilization of three datasets that are openly accessible: the Herlev dataset, the Mendeley dataset, and the SIPaKMeD dataset, which achieved classification accuracies of 95.65% (SVM and MLP), 100% (MLP), and 97.54 (K-NN), respectively.
宫颈癌是妇女死亡的主要原因。这种疾病占所有癌症的近12%,对全世界的妇女来说具有很高的死亡风险。如果早期发现癌前病变,这种疾病是可以治愈的。巴氏涂片筛查在早期发现宫颈细胞异常方面以其可靠性和有效性而闻名,但人工图像分析存在错误的风险。在医学和医疗保健领域使用深度学习方法可以用于决策支持系统,以消除观察中的偏差。本文提出了一个利用深度学习和技术来降低特征维度的框架。该框架从卷积神经网络(CNN)模型中捕获深度特征,并采用使用线性判别分析(LDA)的特征约简方法来确保计算成本的降低。由CNN模型导出的特征维数产生了巨大的特征空间,需要进行特征约简来消除冗余特征。通过线性判别分析减少的特征用于训练三个分类器,即SVM, MLP和K-NN,以生成最终的预测。对所提出框架的评估涉及使用三个公开可访问的数据集:Herlev数据集、Mendeley数据集和SIPaKMeD数据集,分类准确率分别为95.65% (SVM和MLP)、100% (MLP)和97.54 (K-NN)。
{"title":"Classification of Cervical Cell Images into Healthy or Cancer Using Convolution Neural Network and Linear Discriminant Analysis","authors":"Mohammad Sholik, C. Fatichah, B. Amaliah","doi":"10.1109/IAICT59002.2023.10205826","DOIUrl":"https://doi.org/10.1109/IAICT59002.2023.10205826","url":null,"abstract":"Cancer of the cervix is the disease that accounts for the majority of deaths in women. This disease accounts for nearly 12% of all cancers and has a high risk of death for women worldwide. If precancerous lesions are found early, the disease can be cured. Pap smear screening is known for its reliability and effectiveness in detecting cervical cell abnormalities early, but there is a risk of errors in manual image analysis. Using deep learning approaches in the domains of medicine and healthcare can be used for decision support systems to remove bias from observations. This paper presents a framework that utilizes deep learning and techniques to reduce the dimensions of features. The suggested framework captures deep features from a convolutional neural network (CNN) model and employs a feature reduction approach using linear discriminant analysis (LDA) to ensure computational cost reduction. The feature dimension derived from the CNN model produces a huge feature space that requires a feature reduction to eliminate redundant features. The features that have been reduced by linear discriminant analysis are used for the training of three classifiers, namely SVM, MLP, and K-NN, to generate final predictions. The evaluation of the proposed framework involved the utilization of three datasets that are openly accessible: the Herlev dataset, the Mendeley dataset, and the SIPaKMeD dataset, which achieved classification accuracies of 95.65% (SVM and MLP), 100% (MLP), and 97.54 (K-NN), respectively.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"33 7-8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1