首页 > 最新文献

Journal of ICT Research and Applications最新文献

英文 中文
Automatically Detect Software Security Vulnerabilities Based on Natural Language Processing Techniques and Machine Learning Algorithms 基于自然语言处理技术和机器学习算法的软件安全漏洞自动检测
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-05-11 DOI: 10.5614/itbj.ict.res.appl.2022.16.1.5
Donghwang Cho, Vu Ngoc Son, D. Duc
Nowadays, software vulnerabilities pose a serious problem, because cyber-attackers often find ways to attack a system by exploiting software vulnerabilities. Detecting software vulnerabilities can be done using two main methods: i) signature-based detection, i.e. methods based on a list of known security vulnerabilities as a basis for contrasting and comparing; ii) behavior analysis-based detection using classification algorithms, i.e., methods based on analyzing the software code. In order to improve the ability to accurately detect software security vulnerabilities, this study proposes a new approach based on a technique of analyzing and standardizing software code and the random forest (RF) classification algorithm. The novelty and advantages of our proposed method are that to determine abnormal behavior of functions in the software, instead of trying to define behaviors of functions, this study uses the Word2vec natural language processing model to normalize and extract features of functions. Finally, to detect security vulnerabilities in the functions, this study proposes to use a popular and effective supervised machine learning algorithm.
如今,软件漏洞是一个严重的问题,因为网络攻击者经常通过利用软件漏洞来找到攻击系统的方法。检测软件漏洞可以使用两种主要方法:i)基于签名的检测,即基于已知安全漏洞列表的方法,作为对比和比较的基础;ii)使用分类算法的基于行为分析的检测,即基于分析软件代码的方法。为了提高准确检测软件安全漏洞的能力,本研究提出了一种基于软件代码分析和标准化技术以及随机森林(RF)分类算法的新方法。我们提出的方法的新颖性和优势在于,为了确定软件中函数的异常行为,本研究使用Word2vec自然语言处理模型来规范和提取函数的特征,而不是试图定义函数的行为。最后,为了检测函数中的安全漏洞,本研究提出使用一种流行且有效的监督机器学习算法。
{"title":"Automatically Detect Software Security Vulnerabilities Based on Natural Language Processing Techniques and Machine Learning Algorithms","authors":"Donghwang Cho, Vu Ngoc Son, D. Duc","doi":"10.5614/itbj.ict.res.appl.2022.16.1.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.1.5","url":null,"abstract":"Nowadays, software vulnerabilities pose a serious problem, because cyber-attackers often find ways to attack a system by exploiting software vulnerabilities. Detecting software vulnerabilities can be done using two main methods: i) signature-based detection, i.e. methods based on a list of known security vulnerabilities as a basis for contrasting and comparing; ii) behavior analysis-based detection using classification algorithms, i.e., methods based on analyzing the software code. In order to improve the ability to accurately detect software security vulnerabilities, this study proposes a new approach based on a technique of analyzing and standardizing software code and the random forest (RF) classification algorithm. The novelty and advantages of our proposed method are that to determine abnormal behavior of functions in the software, instead of trying to define behaviors of functions, this study uses the Word2vec natural language processing model to normalize and extract features of functions. Finally, to detect security vulnerabilities in the functions, this study proposes to use a popular and effective supervised machine learning algorithm.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49563461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Wireless Vibration Monitoring System for Milling Process 铣削过程无线振动监测系统
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-30 DOI: 10.5614/itbj.ict.res.appl.2022.16.1.3
M. Fikri, K. Saptaji, Fijai Naja Azmi
The implementation of industrial revolution 4.0 in manufacturing industries is necessary to adapt to the rapid changes of technologies. The milling process is one of the common manufacturing processes applied in the industries to produce engineering products. The vibration that occurs in the milling process can disturb the continuity of the process. The wired vibration monitoring system implemented in the manufacturing process needs to be replaced with the wireless monitoring system. Hence wireless vibration monitoring system is developed to solve the problem with wired monitoring systems where tucked cable and high cost are the main challenges of the wired monitoring system. The wireless monitoring system setup is built using three components: sensor node, monitoring node, and base station. Milling experiments with various depths of cut, feed rate, and spindle speed were conducted to examine the performance of the wireless monitoring system. The results indicate the wireless system shows similar data recorded by the wired system. The wireless vibration monitoring system can identify the effect of milling parameters such as depth of cut, feed rate, and spindle speed on the vibrations level. The effect of cut depth is more significant than spindle speed and feed rate in the defined parameters.
在制造业实施工业革命4.0是为了适应技术的快速变化。铣削工艺是工业中用于生产工程产品的常见制造工艺之一。铣削过程中发生的振动可能会干扰加工过程的连续性。在制造过程中实施的有线振动监测系统需要用无线监测系统取代。因此,开发无线振动监测系统是为了解决有线监测系统的问题,有线监测系统面临的主要挑战是电缆堵塞和成本高。无线监控系统的设置使用三个组件:传感器节点、监控节点和基站。通过对不同切削深度、进给速度和主轴转速的铣削实验,检验了无线监测系统的性能。结果表明,无线系统显示了有线系统记录的类似数据。无线振动监测系统可以识别切削深度、进给速度和主轴速度等铣削参数对振动水平的影响。在定义的参数中,切削深度的影响比主轴速度和进给速度更显著。
{"title":"Wireless Vibration Monitoring System for Milling Process","authors":"M. Fikri, K. Saptaji, Fijai Naja Azmi","doi":"10.5614/itbj.ict.res.appl.2022.16.1.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.1.3","url":null,"abstract":"The implementation of industrial revolution 4.0 in manufacturing industries is necessary to adapt to the rapid changes of technologies. The milling process is one of the common manufacturing processes applied in the industries to produce engineering products. The vibration that occurs in the milling process can disturb the continuity of the process. The wired vibration monitoring system implemented in the manufacturing process needs to be replaced with the wireless monitoring system. Hence wireless vibration monitoring system is developed to solve the problem with wired monitoring systems where tucked cable and high cost are the main challenges of the wired monitoring system. The wireless monitoring system setup is built using three components: sensor node, monitoring node, and base station. Milling experiments with various depths of cut, feed rate, and spindle speed were conducted to examine the performance of the wireless monitoring system. The results indicate the wireless system shows similar data recorded by the wired system. The wireless vibration monitoring system can identify the effect of milling parameters such as depth of cut, feed rate, and spindle speed on the vibrations level. The effect of cut depth is more significant than spindle speed and feed rate in the defined parameters.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42135482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting the Extent of Sidoarjo Mud Flow Using Remote Sensing 利用遥感预测Sidoarjo泥石流范围
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-30 DOI: 10.5614/itbj.ict.res.appl.2022.16.1.4
Wishnumurti Wicaksono, S. Isa
The Sidoarjo mud flow in East Java is the result of a natural phenomenon in which hot mudflow occurs due to volcanic activity. The Sidoarjo mud flow resulted in a considerable ecological disaster in the area. In this study, by using the Modification of Normalized Difference Water Index (MNDWI) technique we measured the extension of the mudflow area from 2013 to 2020 using Landsat 8 satellite data imagery. This study is meant to predict the extension of the mud flow area in the research site by comparing regression and neural network techniques in order to find the best approach. The RPROP MLP neural network technique was used to predict the Sidoarjo mud-flowing area in 2021 to 2025. Surprisingly the results of these calculations showed that the RPROP MLP neural network with three hidden layers and 20 neurons performed the best, with an R square value for training of 0.77915565 and for testing of 0.78321550.
东爪哇的Sidoarjo泥流是火山活动引起的热泥流自然现象的结果。Sidoarjo泥石流在该地区造成了严重的生态灾难。在这项研究中,通过使用归一化差异水指数修正(MNDWI)技术,我们使用陆地卫星8号卫星数据图像测量了2013年至2020年泥流区域的扩展。本研究旨在通过比较回归和神经网络技术来预测研究场地泥石流面积的扩展,以找到最佳方法。采用RPROP-MLP神经网络技术对2021年至2025年Sidoarjo泥浆流动面积进行了预测。令人惊讶的是,这些计算的结果表明,具有三个隐藏层和20个神经元的RPROP-MLP神经网络表现最好,训练的R平方值为0.77915565,测试的R平方为0.78321550。
{"title":"Predicting the Extent of Sidoarjo Mud Flow Using Remote Sensing","authors":"Wishnumurti Wicaksono, S. Isa","doi":"10.5614/itbj.ict.res.appl.2022.16.1.4","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.1.4","url":null,"abstract":"The Sidoarjo mud flow in East Java is the result of a natural phenomenon in which hot mudflow occurs due to volcanic activity. The Sidoarjo mud flow resulted in a considerable ecological disaster in the area. In this study, by using the Modification of Normalized Difference Water Index (MNDWI) technique we measured the extension of the mudflow area from 2013 to 2020 using Landsat 8 satellite data imagery. This study is meant to predict the extension of the mud flow area in the research site by comparing regression and neural network techniques in order to find the best approach. The RPROP MLP neural network technique was used to predict the Sidoarjo mud-flowing area in 2021 to 2025. Surprisingly the results of these calculations showed that the RPROP MLP neural network with three hidden layers and 20 neurons performed the best, with an R square value for training of 0.77915565 and for testing of 0.78321550.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49261513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN-ELM Classification Model for Automated Tomato Maturity Grading 用于番茄成熟度自动分级的CNN-ELM分类模型
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-30 DOI: 10.5614/itbj.ict.res.appl.2022.16.1.2
J. P. T. Yusiong
Tomatoes are popular around the world due to their high nutritional value. Tomatoes are also one of the world’s most widely cultivated and profitable crops. The distribution and marketing of tomatoes depend highly on their quality. Estimating tomato ripeness is an essential step in determining shelf life and quality. With the abundant supply of tomatoes on the market, it is exceedingly difficult to estimate tomato ripeness using human graders. To address this issue and improve tomato quality inspection and sorting, automated tomato maturity classification models based on different features have been developed. However, current methods heavily rely on human-engineered or handcrafted features. Convolutional neural networks have emerged as the preferred technique for general object recognition problems because they can automatically detect and extract valuable features by directly working on input images. This paper proposes a CNN-ELM classification model for automated tomato maturity grading that combines CNNs’ automated feature learning capabilities with the efficiency of extreme learning machines to perform fast and accurate classification even with limited training data. The results showed that the proposed CNN-ELM model had a classification accuracy of 96.67% and an F1-score of 96.67% in identifying six maturity stages from the test data.
西红柿因其高营养价值而在世界各地广受欢迎。番茄也是世界上种植最广泛、利润最高的作物之一。番茄的分销和营销在很大程度上取决于它们的质量。估计番茄成熟度是决定保质期和质量的重要步骤。由于市场上番茄供应充足,使用人工分级器估计番茄成熟度极其困难。为了解决这一问题并改进番茄质量检测和分类,开发了基于不同特征的番茄成熟度自动分类模型。然而,目前的方法在很大程度上依赖于人工设计或手工制作的功能。卷积神经网络已成为一般对象识别问题的首选技术,因为它们可以通过直接处理输入图像来自动检测和提取有价值的特征。本文提出了一种用于番茄成熟度自动分级的CNN-ELM分类模型,该模型将CNN的自动特征学习能力与极限学习机器的效率相结合,即使在有限的训练数据下也能进行快速准确的分类。结果表明,所提出的CNN-ELM模型在从测试数据中识别六个成熟阶段方面的分类准确率为96.67%,F1得分为96.67%。
{"title":"A CNN-ELM Classification Model for Automated Tomato Maturity Grading","authors":"J. P. T. Yusiong","doi":"10.5614/itbj.ict.res.appl.2022.16.1.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.1.2","url":null,"abstract":"Tomatoes are popular around the world due to their high nutritional value. Tomatoes are also one of the world’s most widely cultivated and profitable crops. The distribution and marketing of tomatoes depend highly on their quality. Estimating tomato ripeness is an essential step in determining shelf life and quality. With the abundant supply of tomatoes on the market, it is exceedingly difficult to estimate tomato ripeness using human graders. To address this issue and improve tomato quality inspection and sorting, automated tomato maturity classification models based on different features have been developed. However, current methods heavily rely on human-engineered or handcrafted features. Convolutional neural networks have emerged as the preferred technique for general object recognition problems because they can automatically detect and extract valuable features by directly working on input images. This paper proposes a CNN-ELM classification model for automated tomato maturity grading that combines CNNs’ automated feature learning capabilities with the efficiency of extreme learning machines to perform fast and accurate classification even with limited training data. The results showed that the proposed CNN-ELM model had a classification accuracy of 96.67% and an F1-score of 96.67% in identifying six maturity stages from the test data.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42845431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Robot Path Planning Optimization Based on Integration of Firefly Algorithm and Cubic Polynomial Equation 基于萤火虫算法与三次多项式方程集成的移动机器人路径规划优化
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-30 DOI: 10.5614/itbj.ict.res.appl.2022.16.1.1
Sura Mazin Ali, Jan Yonan, Omar Alniemi, A. A. Ahmed
Mobile Robot is an extremely essential technology in the industrial world. Optimal path planning is essential for the navigation of mobile robots. The firefly algorithm is a very promising tool of Swarm Intelligence, which is used in various optimization areas. This study used the firefly algorithm to solve the mobile robot path-planning problem and achieve optimal trajectory planning. The objective of the proposed method is to find the free-collision-free points in the mobile robot environment and then generate the optimal path based on the firefly algorithm. It uses the A∗ algorithm to find the shortest path. The essential function of use the firefly algorithm is applied to specify the optimal control points for the corresponding shortest smooth trajectory of the mobile robot. Cubic Polynomial equation is applied to generate a smooth path from the initial point to the goal point during a specified period. The results of computer simulation demonstrate the efficiency of the firefly algorithm in generating optimal trajectory of mobile robot in a variable degree of mobile robot environment complexity.
移动机器人是工业界一项极其重要的技术。最优路径规划是移动机器人导航的关键。萤火虫算法是Swarm Intelligence的一个非常有前途的工具,用于各种优化领域。本研究采用萤火虫算法来解决移动机器人的路径规划问题,实现最优轨迹规划。该方法的目的是在移动机器人环境中找到自由碰撞的自由点,然后基于萤火虫算法生成最优路径。它使用A*算法来寻找最短路径。应用萤火虫算法的基本功能来指定移动机器人相应最短平滑轨迹的最优控制点。三次多项式方程用于在指定的时间段内生成从初始点到目标点的平滑路径。计算机仿真结果表明,在移动机器人环境复杂度可变的情况下,萤火虫算法能够有效地生成移动机器人的最优轨迹。
{"title":"Mobile Robot Path Planning Optimization Based on Integration of Firefly Algorithm and Cubic Polynomial Equation","authors":"Sura Mazin Ali, Jan Yonan, Omar Alniemi, A. A. Ahmed","doi":"10.5614/itbj.ict.res.appl.2022.16.1.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2022.16.1.1","url":null,"abstract":"Mobile Robot is an extremely essential technology in the industrial world. Optimal path planning is essential for the navigation of mobile robots. The firefly algorithm is a very promising tool of Swarm Intelligence, which is used in various optimization areas. This study used the firefly algorithm to solve the mobile robot path-planning problem and achieve optimal trajectory planning. The objective of the proposed method is to find the free-collision-free points in the mobile robot environment and then generate the optimal path based on the firefly algorithm. It uses the A∗ algorithm to find the shortest path. The essential function of use the firefly algorithm is applied to specify the optimal control points for the corresponding shortest smooth trajectory of the mobile robot. Cubic Polynomial equation is applied to generate a smooth path from the initial point to the goal point during a specified period. The results of computer simulation demonstrate the efficiency of the firefly algorithm in generating optimal trajectory of mobile robot in a variable degree of mobile robot environment complexity.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45195328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serious Game Development Model Based on the Game-Based Learning Foundation 基于游戏学习基础的严肃游戏开发模型
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-28 DOI: 10.5614/itbj.ict.res.appl.2021.15.3.6
Rickman Roedavan, Bambang Pudjoatmodjo, Y. Siradj, S. Salam, BQ Desy Hardianti
Serious games or applied games are digital games applied in serious fields such as education, advertising, health, business, and the military. Currently, serious game development is mostly based on the Game Development Life Cycle (GDLC) approach. A serious game is a game product with unique characteristics that require a particular approach to its development. This paper proposes a serious game development model adapted from the Game-Based Learning Foundation. This paper’s main contribution is to enhance knowledge in the game development field and game-related application research. The proposed model was validated using the relativism approach and it was used to develop several game prototypes for universities, national companies, and the military.
严肃游戏或应用游戏是指应用于教育、广告、健康、商业和军事等严肃领域的数字游戏。目前,严肃的游戏开发大多基于游戏开发生命周期(GDLC)方法。严肃游戏是一种具有独特特征的游戏产品,需要采用特定的开发方法。本文提出了一个改编自游戏学习基金会的严肃游戏开发模型。本文的主要贡献是增强对游戏开发领域和游戏相关应用研究的认识。使用相对主义方法验证了所提出的模型,并将其用于为大学、国家公司和军队开发几个游戏原型。
{"title":"Serious Game Development Model Based on the Game-Based Learning Foundation","authors":"Rickman Roedavan, Bambang Pudjoatmodjo, Y. Siradj, S. Salam, BQ Desy Hardianti","doi":"10.5614/itbj.ict.res.appl.2021.15.3.6","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2021.15.3.6","url":null,"abstract":"Serious games or applied games are digital games applied in serious fields such as education, advertising, health, business, and the military. Currently, serious game development is mostly based on the Game Development Life Cycle (GDLC) approach. A serious game is a game product with unique characteristics that require a particular approach to its development. This paper proposes a serious game development model adapted from the Game-Based Learning Foundation. This paper’s main contribution is to enhance knowledge in the game development field and game-related application research. The proposed model was validated using the relativism approach and it was used to develop several game prototypes for universities, national companies, and the military.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48660331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
New Stereo Vision Algorithm Composition Using Weighted Adaptive Histogram Equalization and Gamma Correction 一种新的基于加权自适应直方图均衡和伽玛校正的立体视觉合成算法
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-28 DOI: 10.5614/itbj.ict.res.appl.2021.15.3.3
A. F. Kadmin, Rostam Affendi, Nurulfajar Abd Manap, Mohd Saad, Nadzrie Nadzrie, Tg. Mohd Faisal
This work presents the composition of a new algorithm for a stereo vision system to acquire accurate depth measurement from stereo correspondence. Stereo correspondence produced by matching is commonly affected by image noise such as illumination variation, blurry boundaries, and radiometric differences. The proposed algorithm introduces a pre-processing step based on the combination of Contrast Limited Adaptive Histogram Equalization (CLAHE) and Adaptive Gamma Correction Weighted Distribution (AGCWD) with a guided filter (GF). The cost value of the pre-processing step is determined in the matching cost step using the census transform (CT), which is followed by aggregation using the fixed-window and GF technique. A winner-takes-all (WTA) approach is employed to select the minimum disparity map value and final refinement using left-right consistency checking (LR) along with a weighted median filter (WMF) to remove outliers. The algorithm improved the accuracy 31.65% for all pixel errors and 23.35% for pixel errors in nonoccluded regions compared to several established algorithms on a Middlebury dataset.
这项工作提出了一种用于立体视觉系统的新算法的组成,以从立体对应中获得准确的深度测量。通过匹配产生的立体对应通常受到图像噪声的影响,例如照明变化、模糊边界和辐射差异。该算法引入了一个基于对比度限制自适应直方图均衡(CLAHE)和自适应伽玛校正加权分布(AGCWD)与引导滤波器(GF)相结合的预处理步骤。预处理步骤的成本值在匹配成本步骤中使用普查变换(CT)确定,然后使用固定窗口和GF技术进行聚合。采用赢者通吃(WTA)方法来选择最小视差图值,并使用左右一致性检查(LR)和加权中值滤波器(WMF)来去除异常值。与Middlebury数据集上的几种已建立算法相比,该算法在所有像素误差的准确率提高了31.65%,在非遮挡区域的像素误差的精度提高了23.35%。
{"title":"New Stereo Vision Algorithm Composition Using Weighted Adaptive Histogram Equalization and Gamma Correction","authors":"A. F. Kadmin, Rostam Affendi, Nurulfajar Abd Manap, Mohd Saad, Nadzrie Nadzrie, Tg. Mohd Faisal","doi":"10.5614/itbj.ict.res.appl.2021.15.3.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2021.15.3.3","url":null,"abstract":"This work presents the composition of a new algorithm for a stereo vision system to acquire accurate depth measurement from stereo correspondence. Stereo correspondence produced by matching is commonly affected by image noise such as illumination variation, blurry boundaries, and radiometric differences. The proposed algorithm introduces a pre-processing step based on the combination of Contrast Limited Adaptive Histogram Equalization (CLAHE) and Adaptive Gamma Correction Weighted Distribution (AGCWD) with a guided filter (GF). The cost value of the pre-processing step is determined in the matching cost step using the census transform (CT), which is followed by aggregation using the fixed-window and GF technique. A winner-takes-all (WTA) approach is employed to select the minimum disparity map value and final refinement using left-right consistency checking (LR) along with a weighted median filter (WMF) to remove outliers. The algorithm improved the accuracy 31.65% for all pixel errors and 23.35% for pixel errors in nonoccluded regions compared to several established algorithms on a Middlebury dataset.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47748613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Focused Crawlers for Building Large Punjabi News Corpus 面向大型旁遮普语新闻语料库的聚焦爬虫的开发
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-28 DOI: 10.5614/itbj.ict.res.appl.2021.15.3.1
Gurjot Singh Mahi, A. Verma
 Web crawlers are as old as the Internet and are most commonly used by search engines to visit websites and index them into repositories. They are not limited to search engines but are also widely utilized to build corpora in different domains and languages. This study developed a focused set of web crawlers for three Punjabi news websites. The web crawlers were developed to extract quality text articles and add them to a local repository to be used in further research. The crawlers were implemented using the Python programming language and were utilized to construct a corpus of more than 134,000 news articles in nine different news genres. The crawler code and extracted corpora were made publicly available to the scientific community for research purposes.
网络爬虫和互联网一样古老,搜索引擎最常用它来访问网站并将其索引到存储库中。它们不仅限于搜索引擎,还被广泛用于构建不同领域和语言的语料库。这项研究为三个旁遮普新闻网站开发了一组重点关注的网络爬虫。开发网络爬虫是为了提取高质量的文本文章,并将其添加到本地存储库中以用于进一步的研究。这些爬虫是使用Python编程语言实现的,用于构建一个由九种不同新闻类型的134000多篇新闻文章组成的语料库。爬行器代码和提取的语料库已向科学界公开,用于研究目的。
{"title":"Development of Focused Crawlers for Building Large Punjabi News Corpus","authors":"Gurjot Singh Mahi, A. Verma","doi":"10.5614/itbj.ict.res.appl.2021.15.3.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2021.15.3.1","url":null,"abstract":" \u0000Web crawlers are as old as the Internet and are most commonly used by search engines to visit websites and index them into repositories. They are not limited to search engines but are also widely utilized to build corpora in different domains and languages. This study developed a focused set of web crawlers for three Punjabi news websites. The web crawlers were developed to extract quality text articles and add them to a local repository to be used in further research. The crawlers were implemented using the Python programming language and were utilized to construct a corpus of more than 134,000 news articles in nine different news genres. The crawler code and extracted corpora were made publicly available to the scientific community for research purposes.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47243303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Task Scheduling and Fair Load Distribution Among Federated Clouds 联邦云中高效的任务调度和公平的负载分配
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-28 DOI: 10.5614/itbj.ict.res.appl.2021.15.3.2
Rajeshwari B S, M. Dakshayini, H. Guruprasad
The federated cloud is the future generation of cloud computing, allowing sharing of computing and storage resources, and servicing of user tasks among cloud providers through a centralized control mechanism. However, a great challenge lies in the efficient management of such federated clouds and fair distribution of the load among heterogeneous cloud providers. In our proposed approach, called QPFS_MASG, at the federated cloud level, the incoming tasks queue are partitioned in order to achieve a fair distribution of the load among all cloud providers of the federated cloud. Then, at the cloud level, task scheduling using the Modified Activity Selection by Greedy (MASG) technique assigns the tasks to different virtual machines (VMs), considering the task deadline as the key factor in achieving good quality of service (QoS). The proposed approach takes care of servicing tasks within their deadline, reducing service level agreement (SLA) violations, improving the response time of user tasks as well as achieving fair distribution of the load among all participating cloud providers. The QPFS_MASG was implemented using CloudSim and the evaluation result revealed a guaranteed degree of fairness in service distribution among the cloud providers with reduced response time and SLA violations compared to existing approaches. Also, the evaluation results showed that the proposed approach serviced the user tasks with minimum number of VMs.
联邦云是未来一代云计算,允许云提供商之间共享计算和存储资源,并通过集中控制机制为用户任务提供服务。然而,一个巨大的挑战在于对这种联邦云的有效管理以及在异构云提供商之间公平分配负载。在我们提出的称为QPFS_MASG的方法中,在联邦云级别,对传入任务队列进行分区,以便在联邦云的所有云提供商之间实现负载的公平分配。然后,在云级别,使用贪婪的修改活动选择(MASG)技术的任务调度将任务分配给不同的虚拟机(VM),将任务截止日期视为实现良好服务质量(QoS)的关键因素。所提出的方法负责在截止日期内为任务提供服务,减少违反服务级别协议(SLA)的行为,提高用户任务的响应时间,并在所有参与的云提供商之间实现负载的公平分配。QPFS_MASG是使用CloudSim实现的,评估结果显示,与现有方法相比,云提供商之间的服务分配具有一定程度的公平性,响应时间和违反SLA的情况有所减少。此外,评估结果表明,所提出的方法以最小数量的VM为用户任务提供服务。
{"title":"Efficient Task Scheduling and Fair Load Distribution Among Federated Clouds","authors":"Rajeshwari B S, M. Dakshayini, H. Guruprasad","doi":"10.5614/itbj.ict.res.appl.2021.15.3.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2021.15.3.2","url":null,"abstract":"The federated cloud is the future generation of cloud computing, allowing sharing of computing and storage resources, and servicing of user tasks among cloud providers through a centralized control mechanism. However, a great challenge lies in the efficient management of such federated clouds and fair distribution of the load among heterogeneous cloud providers. In our proposed approach, called QPFS_MASG, at the federated cloud level, the incoming tasks queue are partitioned in order to achieve a fair distribution of the load among all cloud providers of the federated cloud. Then, at the cloud level, task scheduling using the Modified Activity Selection by Greedy (MASG) technique assigns the tasks to different virtual machines (VMs), considering the task deadline as the key factor in achieving good quality of service (QoS). The proposed approach takes care of servicing tasks within their deadline, reducing service level agreement (SLA) violations, improving the response time of user tasks as well as achieving fair distribution of the load among all participating cloud providers. The QPFS_MASG was implemented using CloudSim and the evaluation result revealed a guaranteed degree of fairness in service distribution among the cloud providers with reduced response time and SLA violations compared to existing approaches. Also, the evaluation results showed that the proposed approach serviced the user tasks with minimum number of VMs.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44825670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine-Learning Classifiers for Malware Detection Using Data Features 利用数据特征检测恶意软件的机器学习分类器
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-28 DOI: 10.5614/itbj.ict.res.appl.2021.15.3.5
Saleh Abdulaziz Habtor, Ahmed Haidarah Hasan Dahah
The spread of ransomware has risen exponentially over the past decade, causing huge financial damage to multiple organizations. Various anti-ransomware firms have suggested methods for preventing malware threats. The growing pace, scale and sophistication of malware provide the anti-malware industry with more challenges. Recent literature indicates that academics and anti-virus organizations have begun to use artificial learning as well as fundamental modeling techniques for the research and identification of malware. Orthodox signature-based anti-virus programs struggle to identify unfamiliar malware and track new forms of malware. In this study, a malware evaluation framework focused on machine learning was adopted that consists of several modules: dataset compiling in two separate classes (malicious and benign software), file disassembly, data processing, decision making, and updated malware identification. The data processing module uses grey images, functions for importing and Opcode n-gram to remove malware functionality. The decision making module detects malware and recognizes suspected malware. Different classifiers were considered in the research methodology for the detection and classification of malware. Its effectiveness was validated on the basis of the accuracy of the complete process.
在过去的十年里,勒索软件的传播呈指数级增长,给多个组织造成了巨大的经济损失。各种反勒索软件公司提出了防止恶意软件威胁的方法。恶意软件的发展速度、规模和复杂性给反恶意软件行业带来了更多挑战。最近的文献表明,学术界和反病毒组织已经开始使用人工学习以及基本的建模技术来研究和识别恶意软件。传统的基于签名的反病毒程序很难识别不熟悉的恶意软件并跟踪新形式的恶意软件。在本研究中,采用了一个以机器学习为核心的恶意软件评估框架,该框架由几个模块组成:分为两类(恶意软件和良性软件)的数据集编译、文件拆卸、数据处理、决策制定和更新恶意软件识别。数据处理模块使用灰色图像、导入功能和Opcode n-gram来删除恶意软件功能。决策模块检测恶意软件并识别可疑的恶意软件。在恶意软件检测和分类的研究方法中考虑了不同的分类器。在整个过程的准确性的基础上,验证了其有效性。
{"title":"Machine-Learning Classifiers for Malware Detection Using Data Features","authors":"Saleh Abdulaziz Habtor, Ahmed Haidarah Hasan Dahah","doi":"10.5614/itbj.ict.res.appl.2021.15.3.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2021.15.3.5","url":null,"abstract":"The spread of ransomware has risen exponentially over the past decade, causing huge financial damage to multiple organizations. Various anti-ransomware firms have suggested methods for preventing malware threats. The growing pace, scale and sophistication of malware provide the anti-malware industry with more challenges. Recent literature indicates that academics and anti-virus organizations have begun to use artificial learning as well as fundamental modeling techniques for the research and identification of malware. Orthodox signature-based anti-virus programs struggle to identify unfamiliar malware and track new forms of malware. In this study, a malware evaluation framework focused on machine learning was adopted that consists of several modules: dataset compiling in two separate classes (malicious and benign software), file disassembly, data processing, decision making, and updated malware identification. The data processing module uses grey images, functions for importing and Opcode n-gram to remove malware functionality. The decision making module detects malware and recognizes suspected malware. Different classifiers were considered in the research methodology for the detection and classification of malware. Its effectiveness was validated on the basis of the accuracy of the complete process.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47456810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of ICT Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1