首页 > 最新文献

Journal of ICT Research and Applications最新文献

英文 中文
Accuracy of Various Methods to Estimate Volume and Weight of Symmetrical and Non-Symmetrical Fruits using Computer Vision 利用计算机视觉估计对称和非对称水果体积和重量的各种方法的准确性
IF 0.6 Q3 Computer Science Pub Date : 2022-12-27 DOI: 10.5614/itbj.ict.res.appl.2022.16.3.2
Hurriyatul Fitriyah
Many researchers have used images to measure the volume and weight of fruits so that the measurement can be done remotely and non-contact. There are various methods for fruit volume estimation based on images, i.e., Basic Shape, Solid of Revolution, Conical Frustum, and Regression. The weight estimation generally uses Regression. This study analyzed the accuracy of these methods. Tests were done by taking images of symmetrical fruits (represented by tangerines) and non-symmetrical fruits (represented by strawberries). The images were processed using segmentation in saturation color space to get binary images. The Regression method used Diameter, Projection Area, and Perimeter as features that were extracted from the binary images. For symmetrical fruits, the best accuracy was obtained with the Linear Regression based on Diameter (LDD), which gave the highest R2 (0.96 for volume and 0.93 for weight) and the lowest RMSE (5.7 mm3 for volume and 5.3 gram for volume). For non-symmetrical fruits, the highest accuracy for non-symmetric fruits was given by the Linear Regression based on Diameter (LRD) and Linear Regression based on Area (LRA) with an R2 of 0.8 for volume and weight. The RMSE for LRD and LRA for strawberries was 3.3 mm3 for volume and 1.4 grams for weight.
许多研究人员使用图像来测量水果的体积和重量,以便可以远程和非接触地进行测量。基于图像的水果体积估计方法有基本形状(Basic Shape)、旋转固体(Solid of Revolution)、圆锥截体(Conical Frustum)和回归(Regression)等。权重估计一般采用回归方法。本研究分析了这些方法的准确性。通过拍摄对称水果(以橘子为代表)和非对称水果(以草莓为代表)的图像来完成测试。在饱和色彩空间中对图像进行分割,得到二值图像。回归方法使用直径、投影面积和周长作为从二值图像中提取的特征。对于对称型果实,基于直径(LDD)的线性回归精度最高,R2最高(体积为0.96,重量为0.93),RMSE最低(体积为5.7 mm3, 5.3 g)。对于非对称水果,基于直径的线性回归(LRD)和基于面积的线性回归(LRA)对非对称水果的精度最高,体积和重量的R2均为0.8。草莓的LRD和LRA的RMSE分别为3.3 mm3体积和1.4 g重量。
{"title":"Accuracy of Various Methods to Estimate Volume and Weight of Symmetrical and Non-Symmetrical Fruits using Computer Vision","authors":"Hurriyatul Fitriyah","doi":"10.5614/itbj.ict.res.appl.2022.16.3.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.3.2","url":null,"abstract":"Many researchers have used images to measure the volume and weight of fruits so that the measurement can be done remotely and non-contact. There are various methods for fruit volume estimation based on images, i.e., Basic Shape, Solid of Revolution, Conical Frustum, and Regression. The weight estimation generally uses Regression. This study analyzed the accuracy of these methods. Tests were done by taking images of symmetrical fruits (represented by tangerines) and non-symmetrical fruits (represented by strawberries). The images were processed using segmentation in saturation color space to get binary images. The Regression method used Diameter, Projection Area, and Perimeter as features that were extracted from the binary images. For symmetrical fruits, the best accuracy was obtained with the Linear Regression based on Diameter (LDD), which gave the highest R2 (0.96 for volume and 0.93 for weight) and the lowest RMSE (5.7 mm3 for volume and 5.3 gram for volume). For non-symmetrical fruits, the highest accuracy for non-symmetric fruits was given by the Linear Regression based on Diameter (LRD) and Linear Regression based on Area (LRA) with an R2 of 0.8 for volume and weight. The RMSE for LRD and LRA for strawberries was 3.3 mm3 for volume and 1.4 grams for weight.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45102373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact and Robust MFCC-based Space-Saving Audio Fingerprint Extraction for Efficient Music Identification on FM Broadcast Monitoring 紧凑稳健的基于MFCC的节省空间音频指纹提取用于调频广播监控中的高效音乐识别
IF 0.6 Q3 Computer Science Pub Date : 2022-12-27 DOI: 10.5614/itbj.ict.res.appl.2022.16.3.3
Myo Thet Htun
The Myanmar music industry urgently needs an efficient broadcast monitoring system to solve copyright infringement issues and illegal benefit-sharing between artists and broadcasting stations. In this paper, a broadcast monitoring system is proposed for Myanmar FM radio stations by utilizing space-saving audio fingerprint extraction based on the Mel Frequency Cepstral Coefficient (MFCC). This study focused on reducing the memory requirement for fingerprint storage while preserving the robustness of the audio fingerprints to common distortions such as compression, noise addition, etc. In this system, a three-second audio clip is represented by a 2,712-bit fingerprint block. This significantly reduces the memory requirement when compared to Philips Robust Hashing (PRH), one of the dominant audio fingerprinting methods, where a three-second audio clip is represented by an 8,192-bit fingerprint block. The proposed system is easy to implement and achieves correct and speedy music identification even on noisy and distorted broadcast audio streams. In this research work, we deployed an audio fingerprint database of 7,094 songs and broadcast audio streams of four local FM channels in Myanmar to evaluate the performance of the proposed system. The experimental results showed that the system achieved reliable performance.
缅甸音乐产业迫切需要一个有效的广播监控系统来解决版权侵权问题和艺人与广播电台之间的非法利益分享问题。本文提出了一种基于Mel频率倒谱系数(MFCC)的节省空间音频指纹提取的缅甸调频广播电台广播监控系统。本研究的重点是降低指纹存储的内存要求,同时保持音频指纹对常见失真(如压缩、噪声添加等)的鲁棒性。在这个系统中,一个三秒钟的音频片段由一个2712位的指纹块表示。与Philips鲁棒哈希(PRH)相比,这大大降低了内存需求,PRH是一种主流的音频指纹识别方法,其中三秒音频片段由8,192位指纹块表示。该系统易于实现,即使在噪声和失真的广播音频流中也能实现正确、快速的音乐识别。在这项研究工作中,我们在缅甸部署了一个包含7094首歌曲的音频指纹数据库,并播放了四个当地调频频道的音频流,以评估所提出系统的性能。实验结果表明,该系统取得了可靠的性能。
{"title":"Compact and Robust MFCC-based Space-Saving Audio Fingerprint Extraction for Efficient Music Identification on FM Broadcast Monitoring","authors":"Myo Thet Htun","doi":"10.5614/itbj.ict.res.appl.2022.16.3.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.3.3","url":null,"abstract":"The Myanmar music industry urgently needs an efficient broadcast monitoring system to solve copyright infringement issues and illegal benefit-sharing between artists and broadcasting stations. In this paper, a broadcast monitoring system is proposed for Myanmar FM radio stations by utilizing space-saving audio fingerprint extraction based on the Mel Frequency Cepstral Coefficient (MFCC). This study focused on reducing the memory requirement for fingerprint storage while preserving the robustness of the audio fingerprints to common distortions such as compression, noise addition, etc. In this system, a three-second audio clip is represented by a 2,712-bit fingerprint block. This significantly reduces the memory requirement when compared to Philips Robust Hashing (PRH), one of the dominant audio fingerprinting methods, where a three-second audio clip is represented by an 8,192-bit fingerprint block. The proposed system is easy to implement and achieves correct and speedy music identification even on noisy and distorted broadcast audio streams. In this research work, we deployed an audio fingerprint database of 7,094 songs and broadcast audio streams of four local FM channels in Myanmar to evaluate the performance of the proposed system. The experimental results showed that the system achieved reliable performance.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47138589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Consumption Prediction Using Data Reduction and Ensemble Learning Techniques 基于数据约简和集成学习技术的能耗预测
IF 0.6 Q3 Computer Science Pub Date : 2022-12-27 DOI: 10.5614/itbj.ict.res.appl.2022.16.3.1
M. Ahmada, Saiful Akbar
Building energy problems have various kinds of aspects, one of which is the difficulty of measuring energy efficiency. With current data development, energy efficiency measurements can be made by developing predictive models to estimate future building needs. However, with the massive amount of data, several problems arise regarding data quality and the lack of scalability in terms of computation memory and time in modeling. In this study, we used data reduction and ensemble learning techniques to overcome these problems. We used numerosity reduction, dimension reduction, and a LightGBM model based on boosting added with a bagging technique, which we compared with incremental learning. Our experimental results showed that the numerosity reduction and dimension reduction techniques could speed up the training process and model prediction without reducing the accuracy. Testing the ensemble learning model also revealed that bagging had the best performance in terms of RMSE and speed, with an RMSE of 262.304 and 1.67 times faster than the model with incremental learning.
建筑能源问题涉及到各个方面,其中之一就是能源效率的测量困难。随着当前数据的发展,能源效率测量可以通过开发预测模型来估计未来的建筑需求。然而,随着数据量的增加,出现了一些关于数据质量和在计算内存和建模时间方面缺乏可伸缩性的问题。在本研究中,我们使用数据约简和集成学习技术来克服这些问题。我们使用了数量约简、降维和基于bagging技术的提升的LightGBM模型,并将其与增量学习进行了比较。实验结果表明,数字降维和降维技术可以在不降低准确率的情况下加快训练过程和模型预测速度。对集成学习模型的测试也表明,套袋在RMSE和速度方面表现最好,RMSE为262.304,比增量学习模型快1.67倍。
{"title":"Energy Consumption Prediction Using Data Reduction and Ensemble Learning Techniques","authors":"M. Ahmada, Saiful Akbar","doi":"10.5614/itbj.ict.res.appl.2022.16.3.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.3.1","url":null,"abstract":"Building energy problems have various kinds of aspects, one of which is the difficulty of measuring energy efficiency. With current data development, energy efficiency measurements can be made by developing predictive models to estimate future building needs. However, with the massive amount of data, several problems arise regarding data quality and the lack of scalability in terms of computation memory and time in modeling. In this study, we used data reduction and ensemble learning techniques to overcome these problems. We used numerosity reduction, dimension reduction, and a LightGBM model based on boosting added with a bagging technique, which we compared with incremental learning. Our experimental results showed that the numerosity reduction and dimension reduction techniques could speed up the training process and model prediction without reducing the accuracy. Testing the ensemble learning model also revealed that bagging had the best performance in terms of RMSE and speed, with an RMSE of 262.304 and 1.67 times faster than the model with incremental learning.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41637909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Questions Answering System on Hadith Knowledge Graph 基于圣训知识图谱的问答系统
IF 0.6 Q3 Computer Science Pub Date : 2022-10-11 DOI: 10.5614/itbj.ict.res.appl.2022.16.2.6
Kemas Wiharja, D. Murdiansyah, M. Z. Romdlony, Tiwa Ramdhani, Muhammad Ramadhan Gandidi
Several works have presented the Hadith on different digital platforms, ranging from websites to mobile apps. These works were successful in presenting the text of the Hadith to users, but this does not help them to answer any particular questions about religious matters. Therefore, in this work we propose a question-answering system that was built on a Hadith knowledge graph. To interpret the user questions correctly, we used the Levenshtein distance function, and for storing the Hadith in graph format we used Neo4J as the graph database. Our main findings were: (i) a knowledge graph is suitable for representing the Hadith and also for doing the reasoning task, and (ii) our proposed approach achieved 95% for top-1 accuracy.
有几部作品在不同的数字平台上展示了圣训,从网站到移动应用程序。这些作品成功地向用户呈现了圣训的文本,但这并不能帮助他们回答有关宗教事务的任何特定问题。因此,在这项工作中,我们提出了一个基于圣训知识图谱的问答系统。为了正确地解释用户问题,我们使用了Levenshtein距离函数,为了以图形格式存储圣训,我们使用Neo4J作为图形数据库。我们的主要发现是:(i)知识图适合于表示圣训,也适合于进行推理任务,(ii)我们提出的方法达到了95%的前1准确率。
{"title":"A Questions Answering System on Hadith Knowledge Graph","authors":"Kemas Wiharja, D. Murdiansyah, M. Z. Romdlony, Tiwa Ramdhani, Muhammad Ramadhan Gandidi","doi":"10.5614/itbj.ict.res.appl.2022.16.2.6","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.2.6","url":null,"abstract":"Several works have presented the Hadith on different digital platforms, ranging from websites to mobile apps. These works were successful in presenting the text of the Hadith to users, but this does not help them to answer any particular questions about religious matters. Therefore, in this work we propose a question-answering system that was built on a Hadith knowledge graph. To interpret the user questions correctly, we used the Levenshtein distance function, and for storing the Hadith in graph format we used Neo4J as the graph database. Our main findings were: (i) a knowledge graph is suitable for representing the Hadith and also for doing the reasoning task, and (ii) our proposed approach achieved 95% for top-1 accuracy.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44244857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Enhancing Keyframe Extraction Strategy for Summarizing Surveillance Video: An Implementation Study 改进监控视频总结关键帧提取策略的实现研究
IF 0.6 Q3 Computer Science Pub Date : 2022-09-23 DOI: 10.5614/itbj.ict.res.appl.2022.16.2.5
B. O. Sadiq, H. Bello-Salau, Latifat Abduraheem-Olaniyi, B. Muhammed, Sikiru Olayinka Zakariyya
The large amounts of surveillance video data are recorded, containing many redundant video frames, which makes video browsing and retrieval difficult, thus increasing bandwidth utilization, storage capacity, and time consumed. To ensure the reduction in bandwidth utilization and storage capacity to the barest minimum, keyframe extraction strategies have been developed. These strategies are implemented to extract unique keyframes whilst removing redundancies. Despite the achieved improvement in keyframe extraction processes, there still exist a significant number of redundant frames in summarized videos. With a view to addressing this issue, the current paper proposes an enhanced keyframe extraction strategy using k-means clustering and a statistical approach. Surveillance footage, movie clips, advertisements, and sports videos from a benchmark database as well as Compeng IP surveillance videos were used to evaluate the performance of the proposed method. In terms of compression ratio, the results showed that the proposed scheme outperformed existing schemes by 2.82%. This implies that the proposed scheme further removed redundant frames whiles retaining video quality. In terms of video playtime, there was an average reduction of 27.32%, thus making video content retrieval less cumbersome when compared with existing schemes. Implementation was done using MATLAB R2020b.
监控视频数据量大,视频帧冗余多,给视频浏览和检索带来困难,增加了带宽利用率、存储容量和时间消耗。为了确保将带宽利用率和存储容量降低到最低限度,开发了关键帧提取策略。实现这些策略是为了在去除冗余的同时提取唯一的关键帧。尽管在关键帧提取过程中取得了一定的进步,但在摘要视频中仍然存在大量的冗余帧。为了解决这一问题,本文提出了一种使用k均值聚类和统计方法的增强关键帧提取策略。使用基准数据库中的监控录像、电影片段、广告和体育视频以及Compeng IP监控视频来评估所提出方法的性能。在压缩比方面,结果表明,所提方案比现有方案高出2.82%。这意味着所提出的方案在保留视频质量的同时进一步去除冗余帧。在视频播放时间方面,平均减少了27.32%,与现有方案相比,减少了视频内容检索的繁琐。使用MATLAB R2020b实现。
{"title":"Towards Enhancing Keyframe Extraction Strategy for Summarizing Surveillance Video: An Implementation Study","authors":"B. O. Sadiq, H. Bello-Salau, Latifat Abduraheem-Olaniyi, B. Muhammed, Sikiru Olayinka Zakariyya","doi":"10.5614/itbj.ict.res.appl.2022.16.2.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.2.5","url":null,"abstract":"The large amounts of surveillance video data are recorded, containing many redundant video frames, which makes video browsing and retrieval difficult, thus increasing bandwidth utilization, storage capacity, and time consumed. To ensure the reduction in bandwidth utilization and storage capacity to the barest minimum, keyframe extraction strategies have been developed. These strategies are implemented to extract unique keyframes whilst removing redundancies. Despite the achieved improvement in keyframe extraction processes, there still exist a significant number of redundant frames in summarized videos. With a view to addressing this issue, the current paper proposes an enhanced keyframe extraction strategy using k-means clustering and a statistical approach. Surveillance footage, movie clips, advertisements, and sports videos from a benchmark database as well as Compeng IP surveillance videos were used to evaluate the performance of the proposed method. In terms of compression ratio, the results showed that the proposed scheme outperformed existing schemes by 2.82%. This implies that the proposed scheme further removed redundant frames whiles retaining video quality. In terms of video playtime, there was an average reduction of 27.32%, thus making video content retrieval less cumbersome when compared with existing schemes. Implementation was done using MATLAB R2020b.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41421766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breast Cancer Diagnosis in Women Using Neural Networks and Deep Learning 用神经网络和深度学习诊断女性乳腺癌
IF 0.6 Q3 Computer Science Pub Date : 2022-09-09 DOI: 10.5614/itbj.ict.res.appl.2022.16.2.4
O. Fagbuagun, O. Folorunsho, Lawrence Bunmi Adewole, Titilayo Akin-Olayemi
Breast cancer is a deadly disease affecting women around the world. It can spread rapidly into other parts of the body, causing untimely death when undetected due to rapid growth and division of cells in the breast. Early diagnosis of this disease tends to increase the survival rate of women suffering from the disease. The use of technology to detect breast cancer in women has been explored over the years. A major drawback of most research in this area is low accuracy in the detection rate of breast cancer in women. This is partly due to the availability of few data sets to train classifiers and the lack of efficient algorithms that achieve optimal results. This research aimed to develop a model that uses a machine learning approach (convolution neural network) to detect breast cancer in women with significantly high accuracy. In this paper, a model was developed using 569 mammograms of various breasts diagnosed with benign and maligned cancers. The model achieved an accuracy of 98.25% and sensitivity of 99.5% after 80 iterations. 
癌症是一种影响世界各地妇女的致命疾病。它可以迅速扩散到身体的其他部位,由于乳腺细胞的快速生长和分裂,在未被发现的情况下会导致过早死亡。这种疾病的早期诊断往往会提高患有这种疾病的妇女的存活率。多年来,人们一直在探索利用技术检测女性癌症。该领域大多数研究的一个主要缺点是女性癌症检测率低。这在一定程度上是由于训练分类器的数据集很少,并且缺乏实现最佳结果的有效算法。这项研究旨在开发一种模型,该模型使用机器学习方法(卷积神经网络)以显著高的准确度检测女性癌症。在这篇论文中,使用569张被诊断为良性和恶性癌症的各种乳房的乳房X光照片建立了一个模型。该模型经过80次迭代,准确率达到98.25%,灵敏度达到99.5%。
{"title":"Breast Cancer Diagnosis in Women Using Neural Networks and Deep Learning","authors":"O. Fagbuagun, O. Folorunsho, Lawrence Bunmi Adewole, Titilayo Akin-Olayemi","doi":"10.5614/itbj.ict.res.appl.2022.16.2.4","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.2.4","url":null,"abstract":"Breast cancer is a deadly disease affecting women around the world. It can spread rapidly into other parts of the body, causing untimely death when undetected due to rapid growth and division of cells in the breast. Early diagnosis of this disease tends to increase the survival rate of women suffering from the disease. The use of technology to detect breast cancer in women has been explored over the years. A major drawback of most research in this area is low accuracy in the detection rate of breast cancer in women. This is partly due to the availability of few data sets to train classifiers and the lack of efficient algorithms that achieve optimal results. This research aimed to develop a model that uses a machine learning approach (convolution neural network) to detect breast cancer in women with significantly high accuracy. In this paper, a model was developed using 569 mammograms of various breasts diagnosed with benign and maligned cancers. The model achieved an accuracy of 98.25% and sensitivity of 99.5% after 80 iterations. ","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45101778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Strengthening INORMALS Using Context-based Natural Language Generation 使用基于上下文的自然语言生成来增强INORMALS
IF 0.6 Q3 Computer Science Pub Date : 2022-08-31 DOI: 10.5614/itbj.ict.res.appl.2022.16.2.1
Soni Yora, A. Barmawi
The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences generated by the proposed method was maintained, which was about 99% when using the proposed method, while it was 98.61% when using Wibowo’s method.
Wibowo提出的无噪声隐写方法可以在提供的封面文本中嵌入最多6个字符,但超过59%的印尼语单词的长度超过6个字符,因此Wibowo的方法还有改进的空间。本文提出了一种改进Wibowo方法的方法,通过修改移位码和使用基于上下文的语言生成。基于300条测试消息,99%的超过6个字符的消息可以通过该方法嵌入,而使用Wibowo的方法,这一比例仅为34%。Wibowo的方法只有在移位码数少于3个的情况下才能嵌入6个以上字符,而本文提出的方法即使移位码数超过3个也可以嵌入6个以上字符。此外,通过引入猜测概率小于1的私钥(Wibowo的方法中的概率为1),提高了表示代码位数的安全性。使用本文方法生成的封面句的自然度保持在99%左右,使用Wibowo方法生成的封面句的自然度为98.61%。
{"title":"Strengthening INORMALS Using Context-based Natural Language Generation","authors":"Soni Yora, A. Barmawi","doi":"10.5614/itbj.ict.res.appl.2022.16.2.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.2.1","url":null,"abstract":"The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences generated by the proposed method was maintained, which was about 99% when using the proposed method, while it was 98.61% when using Wibowo’s method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45706613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-Aware Sentiment Analysis using Tweet Expansion Method 基于推特展开法的情境感知情感分析
IF 0.6 Q3 Computer Science Pub Date : 2022-08-31 DOI: 10.5614/itbj.ict.res.appl.2022.16.2.3
Bashar Tahayna, R. Ayyasamy, Rehan Akbar
The large source of information space produced by the plethora of social media platforms in general and microblogging in particular has spawned a slew of new applications and prompted the rise and expansion of sentiment analysis research. We propose a sentiment analysis technique that identifies the main parts to describe tweet intent and also enriches them with relevant words, phrases, or even inferred variables. We followed a state-of-the-art hybrid deep learning model to combine Convolutional Neural Network (CNN) and the Long Short-Term Memory network (LSTM) to classify tweet data based on their polarity. To preserve the latent relationships between tweet terms and their expanded representation, sentence encoding and contextualized word embeddings are utilized. To investigate the performance of tweet embeddings on the sentiment analysis task, we tested several context-free models (Word2Vec, Sentence2Vec, Glove, and FastText), a dynamic embedding model (BERT), deep contextualized word representations (ELMo), and an entity-based model (Wikipedia). The proposed method and results prove that text enrichment improves the accuracy of sentiment polarity classification with a notable percentage.
大量的社交媒体平台(尤其是微博)产生了大量的信息空间,催生了一系列新的应用,并推动了情绪分析研究的兴起和扩展。我们提出了一种情感分析技术,该技术可以识别描述tweet意图的主要部分,并使用相关的单词、短语甚至推断变量来丰富它们。我们采用了最先进的混合深度学习模型,将卷积神经网络(CNN)和长短期记忆网络(LSTM)结合起来,根据极性对tweet数据进行分类。为了保留tweet术语及其扩展表示之间的潜在关系,使用了句子编码和上下文化词嵌入。为了研究推文嵌入在情感分析任务上的性能,我们测试了几个无上下文模型(Word2Vec、Sentence2Vec、Glove和FastText)、一个动态嵌入模型(BERT)、深度上下文化词表示(ELMo)和一个基于实体的模型(Wikipedia)。本文提出的方法和实验结果表明,文本充实能显著提高情感极性分类的准确率。
{"title":"Context-Aware Sentiment Analysis using Tweet Expansion Method","authors":"Bashar Tahayna, R. Ayyasamy, Rehan Akbar","doi":"10.5614/itbj.ict.res.appl.2022.16.2.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.2.3","url":null,"abstract":"The large source of information space produced by the plethora of social media platforms in general and microblogging in particular has spawned a slew of new applications and prompted the rise and expansion of sentiment analysis research. We propose a sentiment analysis technique that identifies the main parts to describe tweet intent and also enriches them with relevant words, phrases, or even inferred variables. We followed a state-of-the-art hybrid deep learning model to combine Convolutional Neural Network (CNN) and the Long Short-Term Memory network (LSTM) to classify tweet data based on their polarity. To preserve the latent relationships between tweet terms and their expanded representation, sentence encoding and contextualized word embeddings are utilized. To investigate the performance of tweet embeddings on the sentiment analysis task, we tested several context-free models (Word2Vec, Sentence2Vec, Glove, and FastText), a dynamic embedding model (BERT), deep contextualized word representations (ELMo), and an entity-based model (Wikipedia). The proposed method and results prove that text enrichment improves the accuracy of sentiment polarity classification with a notable percentage.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48984080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Medium Access Control Protocol for High Altitude Platform Based Massive Machine Type Communication 基于高空平台的大型机型通信介质访问控制协议
IF 0.6 Q3 Computer Science Pub Date : 2022-08-31 DOI: 10.5614/itbj.ict.res.appl.2022.16.2.2
Veronica Windha Mahyastuty, I. Iskandar, H. Hendrawan, M. S. Arifianto
Massive Machine Type Communication (mMTC) can be used to connect a large number of sensors over a wide coverage area. One of the places where mMTC can be applied is in wireless sensor networks (WSNs). A WSN consists of several sensor nodes that send their sensing information to the cluster head (CH), which can then be forwarded to a high altitude platform (HAP) station. Sensing information can be sent by the sensor nodes at the same time through the same medium, which means collision can occur. When this happens, the sensor node must re-send the sensing information, which causes energy wastage in the WSN. In this paper, we propose a Medium Access Control (MAC) protocol to control access from several sensor nodes during data transmission to avoid collision. The sensor nodes send Round Robin, Interrupt and Query data every eight hours. The initial slot for transmission of the Round Robin data can be either randomized or reserved. Analysis performance was done to see the efficiency of the network with the proposed MAC protocol. Based on the series of simulations that was conducted, the proposed MAC protocol can support a WSN system-based HAP for monitoring every eight  hours. The proposed MAC protocol with an initial slot that is reserved for transmission of Round Robin data has greater network efficiency than a randomized slot.
大规模机器类型通信(mMTC)可用于连接覆盖范围广的大量传感器。mMTC可以应用的地方之一是在无线传感器网络(WSN)中。WSN由几个传感器节点组成,这些传感器节点将其感测信息发送到簇头(CH),然后可以将其转发到高空平台(HAP)站。传感器节点可以通过相同的介质同时发送传感信息,这意味着可能发生碰撞。当这种情况发生时,传感器节点必须重新发送传感信息,这会导致WSN中的能量浪费。在本文中,我们提出了一种介质访问控制(MAC)协议来控制数据传输过程中来自多个传感器节点的访问,以避免冲突。传感器节点每八小时发送一次循环、中断和查询数据。用于发送循环数据的初始时隙可以是随机化的或保留的。对性能进行了分析,以查看所提出的MAC协议的网络效率。基于所进行的一系列仿真,所提出的MAC协议可以支持基于WSN系统的HAP每八小时进行一次监控。所提出的具有预留用于发送循环数据的初始时隙的MAC协议比随机化时隙具有更高的网络效率。
{"title":"Medium Access Control Protocol for High Altitude Platform Based Massive Machine Type Communication","authors":"Veronica Windha Mahyastuty, I. Iskandar, H. Hendrawan, M. S. Arifianto","doi":"10.5614/itbj.ict.res.appl.2022.16.2.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.2.2","url":null,"abstract":"Massive Machine Type Communication (mMTC) can be used to connect a large number of sensors over a wide coverage area. One of the places where mMTC can be applied is in wireless sensor networks (WSNs). A WSN consists of several sensor nodes that send their sensing information to the cluster head (CH), which can then be forwarded to a high altitude platform (HAP) station. Sensing information can be sent by the sensor nodes at the same time through the same medium, which means collision can occur. When this happens, the sensor node must re-send the sensing information, which causes energy wastage in the WSN. In this paper, we propose a Medium Access Control (MAC) protocol to control access from several sensor nodes during data transmission to avoid collision. The sensor nodes send Round Robin, Interrupt and Query data every eight hours. The initial slot for transmission of the Round Robin data can be either randomized or reserved. Analysis performance was done to see the efficiency of the network with the proposed MAC protocol. Based on the series of simulations that was conducted, the proposed MAC protocol can support a WSN system-based HAP for monitoring every eight  hours. The proposed MAC protocol with an initial slot that is reserved for transmission of Round Robin data has greater network efficiency than a randomized slot.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44020077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Classifier to Detect Profit and Non Profit Websites Upon Textual Metrics for Security Purposes 基于安全目的的文本度量来检测盈利和非营利网站的分类器
IF 0.6 Q3 Computer Science Pub Date : 2022-05-17 DOI: 10.5614/itbj.ict.res.appl.2022.16.1.6
Yahya M. Tashtoush, Dirar A. Darweesh, Omar M. Darwish, B. Alsinglawi, Rasha Obeidat
Currently, most organizations have a defense system to protect their digital communication network against cyberattacks. However, these defense systems deal with all network traffic regardless if it is from profit or non-profit websites. This leads to enforcing more security policies, which negatively affects network speed. Since most dangerous cyberattacks are aimed at commercial websites, because they contain more critical data such as credit card numbers, it is better to set up the defense system priorities towards actual attacks that come from profit websites. This study evaluated the effect of textual website metrics in determining the type of website as profit or nonprofit for security purposes. Classifiers were built to predict the type of website as profit or non-profit by applying machine learning techniques on a dataset. The corpus used for this research included profit and non-profit websites. Both traditional and deep machine learning techniques were applied. The results showed that J48 performed best in terms of accuracy according to its outcomes in all cases. The newly built models can be a significant tool for defense systems of organizations, as they will help them to implement the necessary security policies associated with attacks that come from both profit and non-profit websites. This will have a positive impact on the security and efficiency of the network.
目前,大多数组织都有一个防御系统来保护其数字通信网络免受网络攻击。然而,这些防御系统处理所有网络流量,无论是来自盈利网站还是非盈利网站。这导致强制执行更多的安全策略,从而对网络速度产生负面影响。由于大多数危险的网络攻击都是针对商业网站的,因为它们包含信用卡号码等更关键的数据,因此最好将防御系统的优先级设置为针对来自盈利网站的实际攻击。本研究评估了文本网站指标在出于安全目的确定网站类型为盈利或非盈利方面的作用。分类器是通过在数据集上应用机器学习技术来预测盈利或非盈利网站类型的。本研究使用的语料库包括盈利网站和非盈利网站。同时应用了传统和深度机器学习技术。结果显示,从所有病例的结果来看,J48在准确性方面表现最好。新构建的模型可以成为组织防御系统的重要工具,因为它们将帮助组织实施与来自营利和非营利网站的攻击相关的必要安全政策。这将对网络的安全性和效率产生积极影响。
{"title":"A Classifier to Detect Profit and Non Profit Websites Upon Textual Metrics for Security Purposes","authors":"Yahya M. Tashtoush, Dirar A. Darweesh, Omar M. Darwish, B. Alsinglawi, Rasha Obeidat","doi":"10.5614/itbj.ict.res.appl.2022.16.1.6","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.1.6","url":null,"abstract":"Currently, most organizations have a defense system to protect their digital communication network against cyberattacks. However, these defense systems deal with all network traffic regardless if it is from profit or non-profit websites. This leads to enforcing more security policies, which negatively affects network speed. Since most dangerous cyberattacks are aimed at commercial websites, because they contain more critical data such as credit card numbers, it is better to set up the defense system priorities towards actual attacks that come from profit websites. This study evaluated the effect of textual website metrics in determining the type of website as profit or nonprofit for security purposes. Classifiers were built to predict the type of website as profit or non-profit by applying machine learning techniques on a dataset. The corpus used for this research included profit and non-profit websites. Both traditional and deep machine learning techniques were applied. The results showed that J48 performed best in terms of accuracy according to its outcomes in all cases. The newly built models can be a significant tool for defense systems of organizations, as they will help them to implement the necessary security policies associated with attacks that come from both profit and non-profit websites. This will have a positive impact on the security and efficiency of the network.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43710726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of ICT Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1