Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614892
Yosef Ashibani, Q. Mahmoud
While access to a variety of Internet of Things (IoT) networks can be achieved through end-user devices such as smartphones or tablets, these devices are susceptible to theft or loss, and their use by illicit users could lead to unauthorized access to IoT networks, thus allowing access to user information. Hence, an effective authentication mechanism that continuously authenticates users in the background is required in order to detect unauthorized access. As most access to IoT devices is achieved through end-user devices, a rich set of information can be extracted and used in the background to continuously authenticate users without requiring further user intervention. Several studies have examined mobile app usage in the broader population but failed to consider network traffic patterns during app access for user authentication. This paper presents a model to authenticate users based on the network traffic patterns of accessed apps, with an average F-measure of 95.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.
{"title":"A User Authentication Model for IoT Networks Based on App Traffic Patterns","authors":"Yosef Ashibani, Q. Mahmoud","doi":"10.1109/IEMCON.2018.8614892","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614892","url":null,"abstract":"While access to a variety of Internet of Things (IoT) networks can be achieved through end-user devices such as smartphones or tablets, these devices are susceptible to theft or loss, and their use by illicit users could lead to unauthorized access to IoT networks, thus allowing access to user information. Hence, an effective authentication mechanism that continuously authenticates users in the background is required in order to detect unauthorized access. As most access to IoT devices is achieved through end-user devices, a rich set of information can be extracted and used in the background to continuously authenticate users without requiring further user intervention. Several studies have examined mobile app usage in the broader population but failed to consider network traffic patterns during app access for user authentication. This paper presents a model to authenticate users based on the network traffic patterns of accessed apps, with an average F-measure of 95.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615003
A. Yousef, Mohamed Bakr, S. Shirani, B. Milliken
We propose a novel edge detection methodology for conscious machines. We show that summing the outputs of multiple pathways (the decisions of several constructive kernel equations of edge detection techniques) enhances the perception of visible edges. Unlike previously published research, which has emphasized differences in the efficiencies of particular kernel equations, here we apply a linear summation of the outputs of diverse kernel equations. Despite the simplicity of this approach, our edge detection approach performs better than the individual pathways. More important, our proposed approach has biological plausibility in that human vision depends on parallel computation across diverse spatial frequency channels. We hope that this concept, along with other computational, behavioral, and neuroscientific concepts, will eventually assist in building better conscious machines.
{"title":"An Edge Detection Approach For Conscious Machines","authors":"A. Yousef, Mohamed Bakr, S. Shirani, B. Milliken","doi":"10.1109/IEMCON.2018.8615003","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615003","url":null,"abstract":"We propose a novel edge detection methodology for conscious machines. We show that summing the outputs of multiple pathways (the decisions of several constructive kernel equations of edge detection techniques) enhances the perception of visible edges. Unlike previously published research, which has emphasized differences in the efficiencies of particular kernel equations, here we apply a linear summation of the outputs of diverse kernel equations. Despite the simplicity of this approach, our edge detection approach performs better than the individual pathways. More important, our proposed approach has biological plausibility in that human vision depends on parallel computation across diverse spatial frequency channels. We hope that this concept, along with other computational, behavioral, and neuroscientific concepts, will eventually assist in building better conscious machines.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614783
P. Nenninger, Tobias Puchstein
Software design patterns have matured to be an standard tool in mainstream software engineering. They have however not found their way into the industrial automation domain, where a lot of the software is implemented in IEC 61131–3 languages. This paper builds on an existing body of knowledge to identify software design patterns in two automation system case studies. The patterns, which were identified are discussed and evaluated under the aspects of code quality, reusability and usefulness for documentation.
{"title":"Software Design Patters in IEC 61131–3 Systems: A Case Study","authors":"P. Nenninger, Tobias Puchstein","doi":"10.1109/IEMCON.2018.8614783","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614783","url":null,"abstract":"Software design patterns have matured to be an standard tool in mainstream software engineering. They have however not found their way into the industrial automation domain, where a lot of the software is implemented in IEC 61131–3 languages. This paper builds on an existing body of knowledge to identify software design patterns in two automation system case studies. The patterns, which were identified are discussed and evaluated under the aspects of code quality, reusability and usefulness for documentation.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8615104
M. Jamshidi, A. Lalbakhsh, N. Alibeigi, M. Soheyli, Bahareh Oryani, Nahid Rabbani
Recently, interacting between humans and machines has been considered as an important factor to develop industries. In this paper, a novel intelligent approach to improve productivity in industrial environments involving both workers and industrial robots is presented. The introduced approach contains an integrated combination of Adaptive Neuro-Fuzzy Inference System (ANFIS) and the inverse kinematics method named the Socialization of Industrial Robots (SIR). In this approach, staffs can control and justify robots based on environment conditions and their technical experiences. To evaluate and test the proposed method, a famous six-degree of freedom robotic manipulator called the Stanford University Arm is modeled and simulated in MATLAB. The results of simulation have demonstrated that the proposed approach can be counted as a practicable method to develop industrial systems.
{"title":"Socialization of Industrial Robots: An Innovative Solution to improve Productivity","authors":"M. Jamshidi, A. Lalbakhsh, N. Alibeigi, M. Soheyli, Bahareh Oryani, Nahid Rabbani","doi":"10.1109/IEMCON.2018.8615104","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615104","url":null,"abstract":"Recently, interacting between humans and machines has been considered as an important factor to develop industries. In this paper, a novel intelligent approach to improve productivity in industrial environments involving both workers and industrial robots is presented. The introduced approach contains an integrated combination of Adaptive Neuro-Fuzzy Inference System (ANFIS) and the inverse kinematics method named the Socialization of Industrial Robots (SIR). In this approach, staffs can control and justify robots based on environment conditions and their technical experiences. To evaluate and test the proposed method, a famous six-degree of freedom robotic manipulator called the Stanford University Arm is modeled and simulated in MATLAB. The results of simulation have demonstrated that the proposed approach can be counted as a practicable method to develop industrial systems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614861
Harpreet Singh Bror
Data mining is the current buzz of the data processing world. There are large number of applications which are producing the large amount of data. This data need to be processed for the extraction of the analyzed data. So that this analysis can be used in the decision making purpose in relevant organizations. But the data collected from the row sources are of imbalance in nature. This data needs to be processed to generate the balancing dataset. Because processing imbalance data will be highly in efficient process. There are various types of discrepancies lies into the dataset. In current research paper these different types of discrepancies are to be neutralized. So that processing and analysis of the dataset will become easy and more efficient. These discrepancies lies into the dataset are like small disjuncts, lack of density in data, overlapping between the classes, impact of noisy data, the borderline etc. using different techniques these problems into the dataset are being neutralized. So that balanced data can be inputted for the data mining purpose.
{"title":"Balancing of the Imbalance data classification using Data Intrinsic characteristics","authors":"Harpreet Singh Bror","doi":"10.1109/IEMCON.2018.8614861","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614861","url":null,"abstract":"Data mining is the current buzz of the data processing world. There are large number of applications which are producing the large amount of data. This data need to be processed for the extraction of the analyzed data. So that this analysis can be used in the decision making purpose in relevant organizations. But the data collected from the row sources are of imbalance in nature. This data needs to be processed to generate the balancing dataset. Because processing imbalance data will be highly in efficient process. There are various types of discrepancies lies into the dataset. In current research paper these different types of discrepancies are to be neutralized. So that processing and analysis of the dataset will become easy and more efficient. These discrepancies lies into the dataset are like small disjuncts, lack of density in data, overlapping between the classes, impact of noisy data, the borderline etc. using different techniques these problems into the dataset are being neutralized. So that balanced data can be inputted for the data mining purpose.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125899987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614853
Palwasha Rauf, Mohsin Jamil, S. O. Gilani, S. Rind
DC motor is a device which is extensively used in industries, robotics and domestic appliance due to its ease in controllability and high reliability. DC motor has nonlinearities like friction, backlash, dead zone that degrade the performance at low speed. Due to mechanical wear and environmental changes parameter value of DC motor get changed. Also varying loading creates change in rotor speed. This paper focused speed on control of such nonlinear model of DC motor. A nonlinear and robust sliding mode control (SMC) and linear active disturbance rejection control (LADRC) controllers are formulated and implemented to control speed of nonlinear DC motor. Performance of both controllers is evaluated under parameter variation and external disturbances that is varying load torque. Both controllers drive the system output to desired reference and robust against external disturbances and nonlinearities of system. But linear active disturbance rejection control is not robust against parameter variation. While sliding mode control is robust against external disturbance, model uncertainties and parameter variation and gives satisfactory results.
{"title":"Comparison of Nonlinear Controllers for Speed Control of DC Motor","authors":"Palwasha Rauf, Mohsin Jamil, S. O. Gilani, S. Rind","doi":"10.1109/IEMCON.2018.8614853","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614853","url":null,"abstract":"DC motor is a device which is extensively used in industries, robotics and domestic appliance due to its ease in controllability and high reliability. DC motor has nonlinearities like friction, backlash, dead zone that degrade the performance at low speed. Due to mechanical wear and environmental changes parameter value of DC motor get changed. Also varying loading creates change in rotor speed. This paper focused speed on control of such nonlinear model of DC motor. A nonlinear and robust sliding mode control (SMC) and linear active disturbance rejection control (LADRC) controllers are formulated and implemented to control speed of nonlinear DC motor. Performance of both controllers is evaluated under parameter variation and external disturbances that is varying load torque. Both controllers drive the system output to desired reference and robust against external disturbances and nonlinearities of system. But linear active disturbance rejection control is not robust against parameter variation. While sliding mode control is robust against external disturbance, model uncertainties and parameter variation and gives satisfactory results.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614879
Lucie Mercenne, Kei-Léo Brousmiche, Elyes Ben Hamida
The Blockchain technology is currently considered as a major paradigm shift in software architectures and applications. Indeed, it enables the automation of business worflows, using smart contracts, and hence the collaboration between trustless entities, without having to rely on any centralized or third parties. In this context, the automated generation of smart contracts, from high level business process models, has recently received increased interests within the research community. In this paper, we introduce the Blockchain Studio framework, which is a fork of Caterpillar, and whose objective is to enable the generation and automation of role-based business workflows on Ethereum based blockchains. The architecture and implementation of Blockchain Studio are firstly discussed, followed by the analysis of the achieved benefits on a practical use case related to the management of vehicles' life-cycles and data history. Various research challenges and opportunities are then highlighted.
{"title":"Blockchain Studio: A Role-Based Business Workflows Management System","authors":"Lucie Mercenne, Kei-Léo Brousmiche, Elyes Ben Hamida","doi":"10.1109/IEMCON.2018.8614879","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614879","url":null,"abstract":"The Blockchain technology is currently considered as a major paradigm shift in software architectures and applications. Indeed, it enables the automation of business worflows, using smart contracts, and hence the collaboration between trustless entities, without having to rely on any centralized or third parties. In this context, the automated generation of smart contracts, from high level business process models, has recently received increased interests within the research community. In this paper, we introduce the Blockchain Studio framework, which is a fork of Caterpillar, and whose objective is to enable the generation and automation of role-based business workflows on Ethereum based blockchains. The architecture and implementation of Blockchain Studio are firstly discussed, followed by the analysis of the achieved benefits on a practical use case related to the management of vehicles' life-cycles and data history. Various research challenges and opportunities are then highlighted.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125404812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614875
G. Nneji, Jianhua Deng, Sarder S. Shakher, H. Monday, David Agomuo, Ifeanyi D. Dike
Clearance for graduating students is necessarily a continual process in every University. Clearance has always been manual processes over the past years. This paper aims at improving the existing system by exploring its weaknesses. Front-End Languages used are HTML for building the web pages, CSS for styling the web pages, JavaScript for programming web pages, Sublime Text 3 for code editor, PHP for the Back-End, MySQL for the database and the XAMPP servers are used for the design and implementation of the proposed system. The methodology used in this paper is Structured System Analysis and Design (SSADM). The proposed system reduces process time, loss of documents, document forgery and physical presence by eliminating paper work which makes it more efficient, secure and reliable over the existing method. It also incorporates payment options for convenience. The results in this paper show that electronic clearance processing time was reduced significantly that gave rise to an efficient and reliable electronic clearance system for graduating students.
在每一所大学,毕业学生的考核是一个必然的持续过程。过去几年,清关一直是人工操作。本文旨在通过探索现有制度的不足之处来完善现有制度。使用的前端语言有HTML用于构建网页,CSS用于设计网页样式,JavaScript用于编程网页,Sublime Text 3用于代码编辑器,PHP用于后端,MySQL用于数据库,XAMPP服务器用于设计和实现所提出的系统。本文使用的方法是结构化系统分析与设计(SSADM)。拟议的系统减少了文书工作,缩短了处理时间,减少了文件丢失、文件伪造和实际存在,使其比现有方法更有效、更安全、更可靠。它还结合了方便的支付选项。本文的结果表明,电子通关处理时间大大缩短,为毕业生提供了一个高效可靠的电子通关系统。
{"title":"An Improved e-Clearance Management System for Graduating Students in a University Environment","authors":"G. Nneji, Jianhua Deng, Sarder S. Shakher, H. Monday, David Agomuo, Ifeanyi D. Dike","doi":"10.1109/IEMCON.2018.8614875","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614875","url":null,"abstract":"Clearance for graduating students is necessarily a continual process in every University. Clearance has always been manual processes over the past years. This paper aims at improving the existing system by exploring its weaknesses. Front-End Languages used are HTML for building the web pages, CSS for styling the web pages, JavaScript for programming web pages, Sublime Text 3 for code editor, PHP for the Back-End, MySQL for the database and the XAMPP servers are used for the design and implementation of the proposed system. The methodology used in this paper is Structured System Analysis and Design (SSADM). The proposed system reduces process time, loss of documents, document forgery and physical presence by eliminating paper work which makes it more efficient, secure and reliable over the existing method. It also incorporates payment options for convenience. The results in this paper show that electronic clearance processing time was reduced significantly that gave rise to an efficient and reliable electronic clearance system for graduating students.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614829
Ayesha Akhtar, Sved Muhammad Tahir Zaidi, F. Khan, Javaria Nadeem, S. Shaheen
This paper presents a novel design and simulation of 3-bit RF MEMS tunable capacitor for digital communication systems. Proposed varactor design consists of three parallel plate capacitors connected with truss beam. There are slices in parallel plates to increase the area tuning capability of varactors. A new beam design is proposed to reduce the stiffness of the beam which results in reduction of pull in voltage to 4.5 V. The length and width of beam is 718 11m and 80 11m. A standardized process is used for fabrication process. There are nine states of capacitance and at pull in voltage of 4.5 V maximum tunability is achieved that is 168%. Total varactor design dimensions are 900 11m x 750 11m. The beam has 2 11m thickness and low losses CPW made up of gold material. Mechanical simulation is done on INTELISUIT Software while electrical analysis done on CST microwave studio.
本文提出了一种用于数字通信系统的3位射频MEMS可调谐电容的设计与仿真。所提出的变容管设计由三个并联板电容器与桁架梁连接组成。在平行板上有切片,以增加变容管的面积调谐能力。提出了一种新的光束设计方案,以降低光束的刚度,从而将拉入电压降低到4.5 V。梁长718 11m,梁宽80 11m。制造过程采用标准化工艺。电容有九种状态,在4.5 V的拉入电压下,最大可调性达到168%。总变容管设计尺寸为900 11m x 750 11m。光束厚度为211m,由金材料制成的低损耗CPW。力学仿真在INTELISUIT软件上进行,电气分析在CST微波工作室上进行。
{"title":"Design and Simulation of MEMS based Varactor with High Tunability for Digital Communication Systems","authors":"Ayesha Akhtar, Sved Muhammad Tahir Zaidi, F. Khan, Javaria Nadeem, S. Shaheen","doi":"10.1109/IEMCON.2018.8614829","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614829","url":null,"abstract":"This paper presents a novel design and simulation of 3-bit RF MEMS tunable capacitor for digital communication systems. Proposed varactor design consists of three parallel plate capacitors connected with truss beam. There are slices in parallel plates to increase the area tuning capability of varactors. A new beam design is proposed to reduce the stiffness of the beam which results in reduction of pull in voltage to 4.5 V. The length and width of beam is 718 11m and 80 11m. A standardized process is used for fabrication process. There are nine states of capacitance and at pull in voltage of 4.5 V maximum tunability is achieved that is 168%. Total varactor design dimensions are 900 11m x 750 11m. The beam has 2 11m thickness and low losses CPW made up of gold material. Mechanical simulation is done on INTELISUIT Software while electrical analysis done on CST microwave studio.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/IEMCON.2018.8614934
Joungeun Bae, Hyunji Cho, Hoon Yoo
In this paper, we propose a method to recognize a circular form using a geometric symmetry through a rotational scanning process. Circle recognition is a basic and very important technology in computer vision. It has been continuously studied to improve accuracy and speed as machine vision systems are larger and larger. Circle Hough transform (CHT) is the well-known method for circle detection. However, it requires very huge memory and computing devices to handle data in circle detection. Also, it is difficult to recognize circles in real images when the perspective distortion exists. In this paper, we propose an efficient method to find circles in terms of memory and speed by searching centers and radii of circles at once using a rotational scanning method. Experiments were performed to evaluate the proposed method. The proposed method was compared with the gradient-CHT in Open CV, one of the state-of-the-art methods. Experimental results showed that the proposed method is superior to the existing method.
{"title":"Geometric symmetry using rotational scanning method for circular form detection","authors":"Joungeun Bae, Hyunji Cho, Hoon Yoo","doi":"10.1109/IEMCON.2018.8614934","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614934","url":null,"abstract":"In this paper, we propose a method to recognize a circular form using a geometric symmetry through a rotational scanning process. Circle recognition is a basic and very important technology in computer vision. It has been continuously studied to improve accuracy and speed as machine vision systems are larger and larger. Circle Hough transform (CHT) is the well-known method for circle detection. However, it requires very huge memory and computing devices to handle data in circle detection. Also, it is difficult to recognize circles in real images when the perspective distortion exists. In this paper, we propose an efficient method to find circles in terms of memory and speed by searching centers and radii of circles at once using a rotational scanning method. Experiments were performed to evaluate the proposed method. The proposed method was compared with the gradient-CHT in Open CV, one of the state-of-the-art methods. Experimental results showed that the proposed method is superior to the existing method.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126941546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}