首页 > 最新文献

The 12th International Conference on Advances in Information Technology最新文献

英文 中文
Interactive Online Configurator via Boolean Satisfiability Modeling 基于布尔可满足性建模的交互式在线配置器
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3468785
Tao Tao, D. Plaisted
Manufacturing companies widely use interactive configurators to specify product variants. These variants are created from different combinations of individual components. Constraints are usually imposed as relations between components to rule out invalid product configurations. The configurator and its underlying algorithm ensure the product specified by the user satisfies all constraints. We provide a method that models the online configurator as a series of highly parallelizable boolean satisfiability problems (SAT). Our methodology is facilitated by state-of-the-art tools such as the Microsoft Z3 theorem prover. Additionally, we confirm that the configurator problem is NP-complete. Hence, using SAT solving is not only natural but canonical.
制造公司广泛使用交互式配置器来指定产品变体。这些变体是由各个组件的不同组合而成的。约束通常作为组件之间的关系施加,以排除无效的产品配置。配置器及其底层算法确保用户指定的产品满足所有约束。提出了一种将在线配置器建模为一系列高度并行的布尔可满足性问题的方法。我们的方法由最先进的工具(如Microsoft Z3定理证明器)提供便利。另外,我们确认配置器问题是np完全的。因此,使用SAT求解不仅自然而且规范。
{"title":"Interactive Online Configurator via Boolean Satisfiability Modeling","authors":"Tao Tao, D. Plaisted","doi":"10.1145/3468784.3468785","DOIUrl":"https://doi.org/10.1145/3468784.3468785","url":null,"abstract":"Manufacturing companies widely use interactive configurators to specify product variants. These variants are created from different combinations of individual components. Constraints are usually imposed as relations between components to rule out invalid product configurations. The configurator and its underlying algorithm ensure the product specified by the user satisfies all constraints. We provide a method that models the online configurator as a series of highly parallelizable boolean satisfiability problems (SAT). Our methodology is facilitated by state-of-the-art tools such as the Microsoft Z3 theorem prover. Additionally, we confirm that the configurator problem is NP-complete. Hence, using SAT solving is not only natural but canonical.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Augmented Reality with Mask R-CNN (ARR-CNN) inspection for Intelligent Manufacturing 面向智能制造的ar - cnn (ARR-CNN)增强现实检测技术
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3468788
Tawatchai Perdpunya, Siranee Nuchitprasitchai, P. Boonrawd
A machine is an essential factor for industrial production. Industry 4.0 is the revolution that causes improvement of machines to have higher efficiency. Accordingly, inspection and maintenance are becoming more important. However, most of factories are not changed the operating process, there is no data logging for evaluation and analysis for preventive maintenance. This research aims to develop a model for machine inspection using augmented reality with object detection and marker techniques on real world machines and mask R-CNN algorithm allowing inspector to perform inspections. This study, we demonstrate the process of development of the proposed model by showing steps of data acquisition from a machine in a factory. The dataset is images of machines in different perspectives, and they were used for training and testing the model. The testing is done on a mobile device of an inspector. With computer vision technique and the proposed model, the instant precision tracking and detection are provided. Then the trained model is transferred to the mobile devices for testing without any modification by an expert. Some images of machines are randomly selected to verify the accuracy of the model. The result shows that the efficiency of the model is acceptable in real usage.
机器是工业生产的必要因素。工业4.0是一场革命,它使机器的改进具有更高的效率。因此,检查和维护变得越来越重要。然而,大多数工厂都没有改变操作流程,没有数据记录用于评估和分析预防性维护。本研究旨在开发一种机器检测模型,该模型使用增强现实技术,在真实世界的机器上使用对象检测和标记技术,并使用掩膜R-CNN算法,允许检查员执行检查。在本研究中,我们通过展示从工厂机器中获取数据的步骤来演示所提出模型的开发过程。数据集是不同角度的机器图像,它们被用于训练和测试模型。测试是在检查员的移动设备上完成的。利用计算机视觉技术和所提出的模型,提供了即时精确的跟踪和检测。然后将训练好的模型传输到移动设备上进行测试,无需专家进行任何修改。随机选择一些机器图像来验证模型的准确性。结果表明,该模型在实际应用中是可以接受的。
{"title":"Augmented Reality with Mask R-CNN (ARR-CNN) inspection for Intelligent Manufacturing","authors":"Tawatchai Perdpunya, Siranee Nuchitprasitchai, P. Boonrawd","doi":"10.1145/3468784.3468788","DOIUrl":"https://doi.org/10.1145/3468784.3468788","url":null,"abstract":"A machine is an essential factor for industrial production. Industry 4.0 is the revolution that causes improvement of machines to have higher efficiency. Accordingly, inspection and maintenance are becoming more important. However, most of factories are not changed the operating process, there is no data logging for evaluation and analysis for preventive maintenance. This research aims to develop a model for machine inspection using augmented reality with object detection and marker techniques on real world machines and mask R-CNN algorithm allowing inspector to perform inspections. This study, we demonstrate the process of development of the proposed model by showing steps of data acquisition from a machine in a factory. The dataset is images of machines in different perspectives, and they were used for training and testing the model. The testing is done on a mobile device of an inspector. With computer vision technique and the proposed model, the instant precision tracking and detection are provided. Then the trained model is transferred to the mobile devices for testing without any modification by an expert. Some images of machines are randomly selected to verify the accuracy of the model. The result shows that the efficiency of the model is acceptable in real usage.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Development of Personality Recognition Model from Conversation Voice in Call Center Context 呼叫中心会话语音个性识别模型的发展
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3469180
Nakorn Srinarong, J. Mongkolnavin
A call center is an important communication channel between a business and its customers. The call center staffs are responsible for resolving customer problems and fulfilling their needs. It is undeniable that customer satisfaction can be increased if personalized services relating to their characteristics such as personality are provided. Researches are suggesting that a person's personality can be recognized from his/her conversational voice. Thus, a machine learning model that recognizes each customer's personality from one's conversational voice in a call center would enable the cell center to give that one appropriate response. This study focuses on developing a personality recognition model to predict each MPI (Maudsley Personality Inventory) personality dimension from each conversational voice. The MPI personality dimension includes E-scale (representing extraversion and introversion) and N-scale (representing neuroticism and stability). Audio files of conversational voice were collected from 92 volunteers instructed to make conversation in the simulated call center context. Logistic regression, LinearSVC, Random forest, and Artificial neural networks were used in the modeling process. The result shows that the model generated by using Artificial neural networks has the best performance on predicting the E-scale. The model has the positive predictive value (Introversion prediction) and the negative predictive value (Extraversion prediction) equal to 0.71 and 0.75, respectively. No model shows satisfying performance on neuroticism and stability prediction. This study shows a piece of evidence that extraversion and introversion in MPI, which have implications in businesses, can be effectively recognized from each person's conversational voice made through call centers. The model can be beneficial in many business applications such as call center management, personalized product offering, and personalized advertisement.
呼叫中心是企业与客户之间重要的沟通渠道。呼叫中心的工作人员负责解决客户的问题并满足他们的需求。不可否认的是,如果提供与客户个性等特征相关的个性化服务,可以提高客户满意度。研究表明,一个人的性格可以从他/她的谈话声音中识别出来。因此,通过呼叫中心的对话语音识别每个客户的个性的机器学习模型将使蜂窝中心能够给出一个适当的响应。本研究的重点是建立一个人格识别模型,从每个会话语音中预测MPI(莫兹利人格量表)的每个人格维度。MPI人格维度包括e量表(代表外向和内向)和n量表(代表神经质和稳定性)。研究人员从92名志愿者中收集了对话声音的音频文件,这些志愿者被要求在模拟呼叫中心环境中进行对话。在建模过程中使用了逻辑回归、线性svc、随机森林和人工神经网络。结果表明,人工神经网络模型对e量表的预测效果最好。模型的正向预测值(内向预测)和负向预测值(外向预测)分别为0.71和0.75。没有一个模型在神经质和稳定性预测上表现出令人满意的效果。本研究提供了一个证据,证明MPI中的外向性和内向性可以从每个人通过呼叫中心发出的对话声音中有效地识别出来,这对商业有影响。该模型可用于许多业务应用程序,如呼叫中心管理、个性化产品提供和个性化广告。
{"title":"A Development of Personality Recognition Model from Conversation Voice in Call Center Context","authors":"Nakorn Srinarong, J. Mongkolnavin","doi":"10.1145/3468784.3469180","DOIUrl":"https://doi.org/10.1145/3468784.3469180","url":null,"abstract":"A call center is an important communication channel between a business and its customers. The call center staffs are responsible for resolving customer problems and fulfilling their needs. It is undeniable that customer satisfaction can be increased if personalized services relating to their characteristics such as personality are provided. Researches are suggesting that a person's personality can be recognized from his/her conversational voice. Thus, a machine learning model that recognizes each customer's personality from one's conversational voice in a call center would enable the cell center to give that one appropriate response. This study focuses on developing a personality recognition model to predict each MPI (Maudsley Personality Inventory) personality dimension from each conversational voice. The MPI personality dimension includes E-scale (representing extraversion and introversion) and N-scale (representing neuroticism and stability). Audio files of conversational voice were collected from 92 volunteers instructed to make conversation in the simulated call center context. Logistic regression, LinearSVC, Random forest, and Artificial neural networks were used in the modeling process. The result shows that the model generated by using Artificial neural networks has the best performance on predicting the E-scale. The model has the positive predictive value (Introversion prediction) and the negative predictive value (Extraversion prediction) equal to 0.71 and 0.75, respectively. No model shows satisfying performance on neuroticism and stability prediction. This study shows a piece of evidence that extraversion and introversion in MPI, which have implications in businesses, can be effectively recognized from each person's conversational voice made through call centers. The model can be beneficial in many business applications such as call center management, personalized product offering, and personalized advertisement.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preservation Techniques for Sequential Data Releasing 顺序数据发布的隐私保护技术
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3470468
Surapon Riyana, Noppamas Riyana, Srikul Nanthachumphu
Privacy violation is a serious issue that must be considered when datasets are released for public use. To address this issue, a well-known privacy preservation model, l-Diversity, is proposed. Unfortunately, l-Diversity is generally proposed to address privacy violation issues in datasets that are focused on performing one-time data releasing. For this reason, l-Diversity could be inadequate to preserve the privacy data if datasets are dynamic and released at all times. To rid this vulnerability of l-Diversity, a new privacy preservation model for sequential data releasing to be proposed in this work, so called as ε-Error and l-Diversity. Aside from privacy preservation constraints, the complexity and the data utility are also maintained in the privacy preservation constraint of the proposed model.
隐私侵犯是一个严重的问题,当数据集发布给公众使用时必须考虑。为了解决这个问题,我们提出了一个著名的隐私保护模型——l-Diversity。不幸的是,l-Diversity通常被提议用于解决数据集中的隐私侵犯问题,这些数据集中于执行一次性数据发布。由于这个原因,如果数据集是动态的,并且在任何时候都是发布的,那么l-Diversity可能不足以保护隐私数据。为了消除l-Diversity的这一漏洞,本文提出了一种新的序列数据发布隐私保护模型ε-Error and l-Diversity。除了隐私保护约束外,该模型还保持了隐私保护约束的复杂性和数据实用性。
{"title":"Privacy Preservation Techniques for Sequential Data Releasing","authors":"Surapon Riyana, Noppamas Riyana, Srikul Nanthachumphu","doi":"10.1145/3468784.3470468","DOIUrl":"https://doi.org/10.1145/3468784.3470468","url":null,"abstract":"Privacy violation is a serious issue that must be considered when datasets are released for public use. To address this issue, a well-known privacy preservation model, l-Diversity, is proposed. Unfortunately, l-Diversity is generally proposed to address privacy violation issues in datasets that are focused on performing one-time data releasing. For this reason, l-Diversity could be inadequate to preserve the privacy data if datasets are dynamic and released at all times. To rid this vulnerability of l-Diversity, a new privacy preservation model for sequential data releasing to be proposed in this work, so called as ε-Error and l-Diversity. Aside from privacy preservation constraints, the complexity and the data utility are also maintained in the privacy preservation constraint of the proposed model.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114537086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Segmentation of Non-Intersecting Manifolds 非相交流形的无监督分割
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3470467
Subhadip Boral, Sumedha Dhar, Ashish Ghosh
Manifold learning has been an important research area as from literature it is evident that patterns in most real-life data sets can be embedded in low-dimensional space while maintaining the original structure of high-dimensional space. This work concentrates on one of the major research areas of manifold learning, which is the segregation of manifolds where more than one non-intersecting manifolds are present. The proposed method presents a solution to the problem by detecting the number of manifolds in a dataset using the Laplacian graph matrix and segregate the manifolds using agglomerative clustering. Eventually, locally linear embedding has been used for dimensionality reduction of every individual manifold in such a way that manifolds remain segregated and also holds the original global structure. The proposed method achieves finer results when applied on benchmark synthetic data sets SCurve, SwissRoll, Helix and real-life datasets COIL-20, optical digit recognition, att_faces, extended Yale Face Database B. While the state of the art methods fails to detect the number of manifolds in a dataset, the proposed method not only eclipses the performance of them but also carry the separable structure in the lower dimensional space.
流形学习一直是一个重要的研究领域,从文献中可以看出,大多数现实数据集中的模式可以嵌入到低维空间中,同时保持高维空间的原始结构。这项工作集中在流形学习的主要研究领域之一,即流形的分离,其中多个非相交流形存在。该方法利用拉普拉斯图矩阵检测数据集中流形的数量,并利用聚类方法对流形进行分离。最后,局部线性嵌入被用于每个单独流形的降维,使流形保持分离,并保持原始的全局结构。该方法在基准合成数据集SCurve, SwissRoll, Helix和现实数据集COIL-20,光学数字识别,att_faces,扩展耶鲁人脸数据库b上取得了更好的结果。目前的方法无法检测数据集中流形的数量,但该方法不仅超过了它们的性能,而且在低维空间中携带了可分离结构。
{"title":"Unsupervised Segmentation of Non-Intersecting Manifolds","authors":"Subhadip Boral, Sumedha Dhar, Ashish Ghosh","doi":"10.1145/3468784.3470467","DOIUrl":"https://doi.org/10.1145/3468784.3470467","url":null,"abstract":"Manifold learning has been an important research area as from literature it is evident that patterns in most real-life data sets can be embedded in low-dimensional space while maintaining the original structure of high-dimensional space. This work concentrates on one of the major research areas of manifold learning, which is the segregation of manifolds where more than one non-intersecting manifolds are present. The proposed method presents a solution to the problem by detecting the number of manifolds in a dataset using the Laplacian graph matrix and segregate the manifolds using agglomerative clustering. Eventually, locally linear embedding has been used for dimensionality reduction of every individual manifold in such a way that manifolds remain segregated and also holds the original global structure. The proposed method achieves finer results when applied on benchmark synthetic data sets SCurve, SwissRoll, Helix and real-life datasets COIL-20, optical digit recognition, att_faces, extended Yale Face Database B. While the state of the art methods fails to detect the number of manifolds in a dataset, the proposed method not only eclipses the performance of them but also carry the separable structure in the lower dimensional space.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124840835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-Privacy 一种比LKC-Privacy更安全高效的RFID数据集隐私保护模型
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3469853
Surapon Riyana, Noppamas Riyana
RFID is a smart label technology that is used in several real-life applications such as inventory management, asset tracking, personnel tracking, controlling access to restricted areas, ID badging, supply chain management, counterfeit prevention (e.g., in the pharmaceutical industry), and smart farming. Generally, the data collection of RFIDs consists of the users’ visited locations and their visiting time, so called as trajectory datasets. Aside from applications, trajectory datasets can also be released for public use. For this reason, they could lead to being privacy violation issues. To address these issues in trajectory datasets, LKC-Privacy is proposed. Unfortunately, in this work, we demonstrate that LKC-Privacy still has a serious vulnerability that must be improved. To rid the demonstrated vulnerability of LKC-Privacy, a privacy preservation model is proposed in this work. Furthermore, the proposed mode is evaluated by extensive experiments. From the experimental results, they indicate that the proposed model is highly secure and more efficient than LKC-Privacy.
RFID是一种智能标签技术,用于多种实际应用,如库存管理、资产跟踪、人员跟踪、控制进入限制区域、ID徽章、供应链管理、防伪(例如,在制药行业)和智能农业。一般来说,rfid的数据收集包括用户的访问位置和访问时间,称为轨迹数据集。除了应用之外,轨迹数据集也可以发布给公众使用。出于这个原因,它们可能会导致隐私侵犯问题。为了解决这些问题,提出了LKC-Privacy算法。不幸的是,在这项工作中,我们证明了LKC-Privacy仍然存在一个必须改进的严重漏洞。为了消除LKC-Privacy的脆弱性,本文提出了一种隐私保护模型。并通过大量的实验对该模型进行了验证。实验结果表明,该模型比LKC-Privacy具有更高的安全性和效率。
{"title":"A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-Privacy","authors":"Surapon Riyana, Noppamas Riyana","doi":"10.1145/3468784.3469853","DOIUrl":"https://doi.org/10.1145/3468784.3469853","url":null,"abstract":"RFID is a smart label technology that is used in several real-life applications such as inventory management, asset tracking, personnel tracking, controlling access to restricted areas, ID badging, supply chain management, counterfeit prevention (e.g., in the pharmaceutical industry), and smart farming. Generally, the data collection of RFIDs consists of the users’ visited locations and their visiting time, so called as trajectory datasets. Aside from applications, trajectory datasets can also be released for public use. For this reason, they could lead to being privacy violation issues. To address these issues in trajectory datasets, LKC-Privacy is proposed. Unfortunately, in this work, we demonstrate that LKC-Privacy still has a serious vulnerability that must be improved. To rid the demonstrated vulnerability of LKC-Privacy, a privacy preservation model is proposed in this work. Furthermore, the proposed mode is evaluated by extensive experiments. From the experimental results, they indicate that the proposed model is highly secure and more efficient than LKC-Privacy.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127357556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Precipitation Nowcasting Using Deep Learning on Radar Data Augmented with Satellite Data 基于卫星数据增强雷达数据的深度学习降水临近预报
Pub Date : 2021-06-29 DOI: 10.1145/3468784.3470469
Wikom Tosiri, Nutnaree Kleawsirikul, Patamawadee Leepaisomboon, Natnapat Gaviphatt, Hidetomo Sakaino, P. Vateekul
Precipitation nowcasting with ground-based weather radars and satellite-based precipitation data based on deep learning method will open a new avenue of weather prediction. However, it is limited to regions where ground-based weather radars can operate for nowcasting. We propose an improved deep learning precipitation prediction by integrating the precipitation data from Japan Aerospace Exploration Agency (JAXA)’s Global Rainfall Watch (GSMAP) with the precipitation data from WEATHERNEWS Co., Ltd., which provides precipitation data with Type C Doppler radars that detect precipitation in the atmosphere. It has been demonstrated that our proposed method can improve precipitation data coverage areas and the efficiency of precipitation nowcasting by the proposed deep learning technique in many extreme weather cases, i.e., typhoons.
利用地面气象雷达和基于深度学习方法的卫星降水数据进行降水临近预报,将为天气预报开辟一条新的途径。然而,它仅限于地面气象雷达可以进行临近预报的地区。我们提出了一种改进的深度学习降水预测方法,该方法将日本宇宙航空研究开发机构(JAXA)的全球降雨监测(GSMAP)的降水数据与WEATHERNEWS Co., Ltd.的降水数据相结合,WEATHERNEWS Co.提供的降水数据使用C型多普勒雷达探测大气降水。研究表明,在许多极端天气情况下(如台风),我们提出的方法可以提高降水数据覆盖面积和降水临近预报的效率。
{"title":"Precipitation Nowcasting Using Deep Learning on Radar Data Augmented with Satellite Data","authors":"Wikom Tosiri, Nutnaree Kleawsirikul, Patamawadee Leepaisomboon, Natnapat Gaviphatt, Hidetomo Sakaino, P. Vateekul","doi":"10.1145/3468784.3470469","DOIUrl":"https://doi.org/10.1145/3468784.3470469","url":null,"abstract":"Precipitation nowcasting with ground-based weather radars and satellite-based precipitation data based on deep learning method will open a new avenue of weather prediction. However, it is limited to regions where ground-based weather radars can operate for nowcasting. We propose an improved deep learning precipitation prediction by integrating the precipitation data from Japan Aerospace Exploration Agency (JAXA)’s Global Rainfall Watch (GSMAP) with the precipitation data from WEATHERNEWS Co., Ltd., which provides precipitation data with Type C Doppler radars that detect precipitation in the atmosphere. It has been demonstrated that our proposed method can improve precipitation data coverage areas and the efficiency of precipitation nowcasting by the proposed deep learning technique in many extreme weather cases, i.e., typhoons.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Particle Size Estimation in Mixed Commercial Waste Images Using Deep Learning 基于深度学习的混合商业垃圾图像粒度估计
Pub Date : 2021-06-11 DOI: 10.1145/3468784.3471273
Phongsathorn Kittiworapanya, Kitsuchart Pasupa, P. Auer
We assessed several state-of-the-art deep learning algorithms and computer vision techniques for estimating the particle size of mixed commercial waste from images. In waste management, the first step is often coarse shredding, using the particle size to set up the shredder machine. The difficulty is separating the waste particles in an image, which can not be performed well. This work focused on estimating size by using the texture from the input image, captured at a fixed height from the camera lens to the ground. We found that EfficientNet achieved the best performance of 0.72 on F1-Score and 75.89% on accuracy.
我们评估了几种最先进的深度学习算法和计算机视觉技术,用于从图像中估计混合商业废物的粒度。在废物处理中,第一步往往是粗粉碎,利用颗粒大小来设置碎纸机。该方法的难点在于从图像中分离出废物颗粒,不能很好地进行分离。这项工作的重点是通过使用从相机镜头到地面的固定高度拍摄的输入图像中的纹理来估计大小。我们发现,EfficientNet在F1-Score上达到了0.72的最佳性能,在准确率上达到了75.89%。
{"title":"Particle Size Estimation in Mixed Commercial Waste Images Using Deep Learning","authors":"Phongsathorn Kittiworapanya, Kitsuchart Pasupa, P. Auer","doi":"10.1145/3468784.3471273","DOIUrl":"https://doi.org/10.1145/3468784.3471273","url":null,"abstract":"We assessed several state-of-the-art deep learning algorithms and computer vision techniques for estimating the particle size of mixed commercial waste from images. In waste management, the first step is often coarse shredding, using the particle size to set up the shredder machine. The difficulty is separating the waste particles in an image, which can not be performed well. This work focused on estimating size by using the texture from the input image, captured at a fixed height from the camera lens to the ground. We found that EfficientNet achieved the best performance of 0.72 on F1-Score and 75.89% on accuracy.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Open source disease analysis system of cactus by artificial intelligence and image processing 基于人工智能和图像处理的开源仙人掌病害分析系统
Pub Date : 2021-06-07 DOI: 10.1145/3468784.3469075
Kanlayanee Kaweesinsakul, Siranee Nuchitprasitchai, Joshua M. Pearce
There is a growing interest in cactus cultivation because of numerous cacti uses from houseplants to food and medicinal applications. Various diseases impact the growth of cacti. To develop an automated model for the analysis of cactus disease and to be able to quickly treat and prevent damage to the cactus. The Faster R-CNN and YOLO algorithm technique were used to analyze cactus diseases automatically distributed into six groups: 1) anthracnose, 2) canker, 3) lack of care, 4) aphid, 5) rusts and 6) normal group. Based on the experimental results the YOLOv5 algorithm was found to be more effective at detecting and identifying cactus disease than the Faster R-CNN algorithm. Data training and testing with YOLOv5S model resulted in a precision of 89.7% and an accuracy (recall) of 98.5%, which is effective enough for further use in a number of applications in cactus cultivation. Overall the YOLOv5 algorithm had a test time per image of only 26 milliseconds. Therefore, the YOLOv5 algorithm was found to suitable for mobile applications and this model could be further developed into a program for analyzing cactus disease.
人们对仙人掌的种植越来越感兴趣,因为从室内植物到食品和药用,仙人掌有许多用途。各种疾病影响仙人掌的生长。开发仙人掌疾病分析的自动化模型,能够快速治疗和预防对仙人掌的伤害。采用Faster R-CNN和YOLO算法技术,将仙人掌病害自动分为6组:1)炭疽病、2)溃疡病、3)缺乏护理、4)蚜虫病、5)锈病和6)正常组。根据实验结果,YOLOv5算法在检测和识别仙人掌疾病方面比Faster R-CNN算法更有效。使用YOLOv5S模型进行数据训练和测试,准确率为89.7%,准确率(召回率)为98.5%,足以在仙人掌栽培的许多应用中进一步使用。总的来说,YOLOv5算法每幅图像的测试时间只有26毫秒。因此,YOLOv5算法适合移动应用,该模型可以进一步发展为仙人掌病害分析程序。
{"title":"Open source disease analysis system of cactus by artificial intelligence and image processing","authors":"Kanlayanee Kaweesinsakul, Siranee Nuchitprasitchai, Joshua M. Pearce","doi":"10.1145/3468784.3469075","DOIUrl":"https://doi.org/10.1145/3468784.3469075","url":null,"abstract":"There is a growing interest in cactus cultivation because of numerous cacti uses from houseplants to food and medicinal applications. Various diseases impact the growth of cacti. To develop an automated model for the analysis of cactus disease and to be able to quickly treat and prevent damage to the cactus. The Faster R-CNN and YOLO algorithm technique were used to analyze cactus diseases automatically distributed into six groups: 1) anthracnose, 2) canker, 3) lack of care, 4) aphid, 5) rusts and 6) normal group. Based on the experimental results the YOLOv5 algorithm was found to be more effective at detecting and identifying cactus disease than the Faster R-CNN algorithm. Data training and testing with YOLOv5S model resulted in a precision of 89.7% and an accuracy (recall) of 98.5%, which is effective enough for further use in a number of applications in cactus cultivation. Overall the YOLOv5 algorithm had a test time per image of only 26 milliseconds. Therefore, the YOLOv5 algorithm was found to suitable for mobile applications and this model could be further developed into a program for analyzing cactus disease.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132504881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
The 12th International Conference on Advances in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1