首页 > 最新文献

Journal of ICT Research and Applications最新文献

英文 中文
Design and Implementation of Moving Object Visual Tracking System using μ-Synthesis Controller μ-综合控制器在运动目标视觉跟踪系统中的设计与实现
IF 0.6 Q3 Computer Science Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.1
S. Saripudin, Modestus Oliver Asali, B. Trilaksono, T. Indriyanto
Considering the increasing use of security and surveillance systems, moving object tracking systems are an interesting research topic in the field of computer vision. In general, a moving object tracking system consists of two integrated parts, namely the video tracking part that predicts the position of the target in the image plane, and the visual servo part that controls the movement of the camera following the movement of objects in the image plane. For tracking purposes, the camera is used as a visual sensor and applied to a 2-DOF (yaw-pitch) manipulator platform with an eye-in-hand camera configuration. Although its operation is relatively simple, the yaw-pitch camera platform still needs a good control method to improve its performance. In this study, we propose a moving object tracking system on a prototype yaw-pitch platform. A m-synthesis controller was used to control the movement of the visual servo part and keep the target in the center of the image plane. The experimental results showed relatively good results from the proposed system to work in real-time conditions with high tracking accuracy in both indoor and outdoor environments.
考虑到安全和监视系统的使用越来越多,运动物体跟踪系统是计算机视觉领域一个有趣的研究课题。通常,运动物体跟踪系统由两个集成部分组成,即预测目标在图像平面中的位置的视频跟踪部分和跟随物体在图像平面内的运动控制相机运动的视觉伺服部分。出于跟踪目的,该相机被用作视觉传感器,并应用于具有手眼相机配置的2-DOF(偏航-俯仰)操纵器平台。尽管其操作相对简单,但偏航俯仰相机平台仍然需要一种良好的控制方法来提高其性能。在这项研究中,我们提出了一个在原型偏航-俯仰平台上的运动物体跟踪系统。m合成控制器用于控制视觉伺服部分的运动,并将目标保持在图像平面的中心。实验结果表明,该系统在室内外环境中都能以较高的跟踪精度在实时条件下工作,效果相对较好。
{"title":"Design and Implementation of Moving Object Visual Tracking System using μ-Synthesis Controller","authors":"S. Saripudin, Modestus Oliver Asali, B. Trilaksono, T. Indriyanto","doi":"10.5614/itbj.ict.res.appl.2019.13.3.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.1","url":null,"abstract":"Considering the increasing use of security and surveillance systems, moving object tracking systems are an interesting research topic in the field of computer vision. In general, a moving object tracking system consists of two integrated parts, namely the video tracking part that predicts the position of the target in the image plane, and the visual servo part that controls the movement of the camera following the movement of objects in the image plane. For tracking purposes, the camera is used as a visual sensor and applied to a 2-DOF (yaw-pitch) manipulator platform with an eye-in-hand camera configuration. Although its operation is relatively simple, the yaw-pitch camera platform still needs a good control method to improve its performance. In this study, we propose a moving object tracking system on a prototype yaw-pitch platform. A m-synthesis controller was used to control the movement of the visual servo part and keep the target in the center of the image plane. The experimental results showed relatively good results from the proposed system to work in real-time conditions with high tracking accuracy in both indoor and outdoor environments.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46088261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultrasound Nerve Segmentation Using Deep Probabilistic Programming 基于深度概率规划的超声神经分割
IF 0.6 Q3 Computer Science Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.5
Iresha D. Rubasinghe, D. Meedeniya
Deep probabilistic programming concatenates the strengths of deep learning to the context of probabilistic modeling for efficient and flexible computation in practice. Being an evolving field, there exist only a few expressive programming languages for uncertainty management. This paper discusses an application for analysis of ultrasound nerve segmentation-based biomedical images. Our method uses the probabilistic programming language Edward with the U-Net model and generative adversarial networks under different optimizers. The segmentation process showed the least Dice loss (‑0.54) and the highest accuracy (0.99) with the Adam optimizer in the U-Net model with the least time consumption compared to other optimizers. The smallest amount of generative network loss in the generative adversarial network model gained was 0.69 for the Adam optimizer. The Dice loss, accuracy, time consumption and output image quality in the results show the applicability of deep probabilistic programming in the long run. Thus, we further propose a neuroscience decision support system based on the proposed approach.
深度概率编程将深度学习的优势与概率建模相结合,在实践中实现高效灵活的计算。作为一个不断发展的领域,用于不确定性管理的表达性编程语言屈指可数。本文讨论了超声神经分割在生物医学图像分析中的应用。我们的方法使用概率编程语言Edward和U-Net模型,并在不同的优化器下生成对抗性网络。与其他优化器相比,U-Net模型中的Adam优化器的分割过程显示出最小的骰子损失(’0.54)和最高的精度(0.99),时间消耗最少。Adam优化器在生成对抗性网络模型中获得的生成网络损失最小为0.69。结果中的骰子损失、精度、时间消耗和输出图像质量表明了深度概率规划在长期中的适用性。因此,我们进一步提出了一个基于所提出方法的神经科学决策支持系统。
{"title":"Ultrasound Nerve Segmentation Using Deep Probabilistic Programming","authors":"Iresha D. Rubasinghe, D. Meedeniya","doi":"10.5614/itbj.ict.res.appl.2019.13.3.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.5","url":null,"abstract":"Deep probabilistic programming concatenates the strengths of deep learning to the context of probabilistic modeling for efficient and flexible computation in practice. Being an evolving field, there exist only a few expressive programming languages for uncertainty management. This paper discusses an application for analysis of ultrasound nerve segmentation-based biomedical images. Our method uses the probabilistic programming language Edward with the U-Net model and generative adversarial networks under different optimizers. The segmentation process showed the least Dice loss (‑0.54) and the highest accuracy (0.99) with the Adam optimizer in the U-Net model with the least time consumption compared to other optimizers. The smallest amount of generative network loss in the generative adversarial network model gained was 0.69 for the Adam optimizer. The Dice loss, accuracy, time consumption and output image quality in the results show the applicability of deep probabilistic programming in the long run. Thus, we further propose a neuroscience decision support system based on the proposed approach.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46164262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Paraphrasing Method Based on Contextual Synonym Substitution 基于上下文同义词替换的句法分析方法
IF 0.6 Q3 Computer Science Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.6
A. Barmawi, Ali Muhammad
Generating paraphrases is an important component of natural language processing and generation. There are sev­eral applications that use paraphrasing, for example linguistic steganography, recommender systems, machine translation, etc. One method for paraphrasing sentences is by using synonym substitution, such as the NGM-based paraphrasing method proposed by Gadag et al. The weakness of this method is that ambiguous meanings frequently occur because the paraphrasing process is based solely on n-gram. This negatively affects the naturalness of the paraphrased sentences. For overcoming this problem, a contextual synonym substitution method is proposed, which aims to increase the naturalness of the paraphrased sentences. Using the proposed method, the paraphrasing process is not only based on n-gram but also on the context of the sentence such that the naturalness is increased. Based on the experimental result, the sentences generated using the proposed method had higher naturalness than the sentences generated using the original method.
转述生成是自然语言处理和生成的重要组成部分。有几种使用转述的应用,例如语言隐写术、推荐系统、机器翻译等。转述句子的一种方法是使用同义词替换,例如Gadag等人提出的基于NGM的转述方法。这种方法的缺点是,由于转述过程完全基于n-gram,因此经常出现歧义。这会对转述句子的自然性产生负面影响。为了克服这一问题,提出了一种上下文同义词替换方法,旨在提高转述句的自然度。使用所提出的方法,转述过程不仅基于n-gram,而且基于句子的上下文,从而提高了自然度。根据实验结果,使用所提出的方法生成的句子比使用原始方法生成的语句具有更高的自然度。
{"title":"Paraphrasing Method Based on Contextual Synonym Substitution","authors":"A. Barmawi, Ali Muhammad","doi":"10.5614/itbj.ict.res.appl.2019.13.3.6","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.6","url":null,"abstract":"Generating paraphrases is an important component of natural language processing and generation. There are sev­eral applications that use paraphrasing, for example linguistic steganography, recommender systems, machine translation, etc. One method for paraphrasing sentences is by using synonym substitution, such as the NGM-based paraphrasing method proposed by Gadag et al. The weakness of this method is that ambiguous meanings frequently occur because the paraphrasing process is based solely on n-gram. This negatively affects the naturalness of the paraphrased sentences. For overcoming this problem, a contextual synonym substitution method is proposed, which aims to increase the naturalness of the paraphrased sentences. Using the proposed method, the paraphrasing process is not only based on n-gram but also on the context of the sentence such that the naturalness is increased. Based on the experimental result, the sentences generated using the proposed method had higher naturalness than the sentences generated using the original method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48009527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Robust Algorithm for Emoji Detection in Smartphone Screenshot Images 智能手机截图图像中表情符号检测的鲁棒算法
IF 0.6 Q3 Computer Science Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.2
Bilal Bataineh, M. Y. Shambour
The increasing use of smartphones and social media apps for communication results in a massive number of screenshot images. These images enrich the written language through text and emojis. In this regard, several studies in the image analysis field have considered text. However, they ignored the use of emojis. In this study, a robust two-stage algorithm for detecting emojis in screenshot images is proposed. The first stage localizes the regions of candidate emojis by using the proposed RGB-channel analysis method followed by a connected component method with a set of proposed rules. In the second verification stage, each of the emojis and non-emojis are classified by using proposed features with a decision tree classifier. Experiments were conducted to evaluate each stage independently and assess the performance of the proposed algorithm completely by using a self-collected dataset. The results showed that the proposed RGB-channel analysis method achieved better performance than the Niblack and Sauvola methods. Moreover, the proposed feature extraction method with decision tree classifier achieved more satisfactory performance than the LBP feature extraction method with all Bayesian network, perceptron neural network, and decision table rules. Overall, the proposed algorithm exhibited high efficiency in detecting emojis in screenshot images.
越来越多地使用智能手机和社交媒体应用程序进行交流,导致大量的截图图像。这些图像通过文字和表情符号丰富了书面语言。在这方面,图像分析领域的一些研究已经考虑了文本。然而,他们忽略了表情符号的使用。在本研究中,提出了一种鲁棒的两阶段算法来检测截图图像中的表情符号。第一阶段使用提出的rgb通道分析方法定位候选表情符号的区域,然后使用一组建议规则的连接组件方法定位候选表情符号。在第二个验证阶段,使用决策树分类器对每个表情符号和非表情符号进行分类。实验对每个阶段进行独立评估,并使用自收集的数据集对所提算法的性能进行全面评估。结果表明,所提出的rgb通道分析方法比Niblack和Sauvola方法具有更好的性能。此外,基于决策树分类器的特征提取方法比基于贝叶斯网络、感知器神经网络和决策表规则的LBP特征提取方法取得了更满意的性能。总体而言,该算法在检测截图图像中的表情符号方面表现出较高的效率。
{"title":"A Robust Algorithm for Emoji Detection in Smartphone Screenshot Images","authors":"Bilal Bataineh, M. Y. Shambour","doi":"10.5614/itbj.ict.res.appl.2019.13.3.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.2","url":null,"abstract":"The increasing use of smartphones and social media apps for communication results in a massive number of screenshot images. These images enrich the written language through text and emojis. In this regard, several studies in the image analysis field have considered text. However, they ignored the use of emojis. In this study, a robust two-stage algorithm for detecting emojis in screenshot images is proposed. The first stage localizes the regions of candidate emojis by using the proposed RGB-channel analysis method followed by a connected component method with a set of proposed rules. In the second verification stage, each of the emojis and non-emojis are classified by using proposed features with a decision tree classifier. Experiments were conducted to evaluate each stage independently and assess the performance of the proposed algorithm completely by using a self-collected dataset. The results showed that the proposed RGB-channel analysis method achieved better performance than the Niblack and Sauvola methods. Moreover, the proposed feature extraction method with decision tree classifier achieved more satisfactory performance than the LBP feature extraction method with all Bayesian network, perceptron neural network, and decision table rules. Overall, the proposed algorithm exhibited high efficiency in detecting emojis in screenshot images.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43466635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Fake Facebook Profiles Using Data Mining Techniques 使用数据挖掘技术识别虚假Facebook个人资料
IF 0.6 Q3 Computer Science Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.2
Mohammed Basil Albayati, A. Altamimi
Facebook, the popular online social network, has changed our lives. Users can create a customized profile to share information about themselves with others that have agreed to be their ‘friend’. However, this gigantic social network can be misused for carrying out malicious activities. Facebook faces the problem of fake accounts that enable scammers to violate users’ privacy by creating fake profiles to infiltrate personal social networks. Many techniques have been proposed to address this issue. Most of them are based on detecting fake profiles/accounts, considering the characteristics of the user profile. However, the limited profile data made publicly available by Facebook makes it ineligible for applying the existing approaches in fake profile identification. Therefore, this research utilized data mining techniques to detect fake profiles. A set of supervised (ID3 decision tree, k-NN, and SVM) and unsupervised (k-Means and k-medoids) algorithms were applied to 12 behavioral and non-behavioral discriminative profile attributes from a dataset of 982 profiles. The results showed that ID3 had the highest accuracy in the detection process while k-medoids had the lowest accuracy.
流行的在线社交网络Facebook改变了我们的生活。用户可以创建一个自定义的个人资料,与同意成为其“朋友”的其他人共享有关自己的信息。然而,这个庞大的社交网络可能会被滥用来进行恶意活动。脸书面临着虚假账户的问题,骗子通过创建虚假个人资料来渗透个人社交网络,从而侵犯用户隐私。已经提出了许多技术来解决这个问题。其中大多数都是基于检测虚假的个人资料/账户,考虑到用户个人资料的特点。然而,脸书公开的有限个人资料数据使其没有资格在虚假个人资料识别中应用现有方法。因此,本研究利用数据挖掘技术来检测虚假档案。将一组有监督(ID3决策树、k-NN和SVM)和无监督(k-Means和k-medoid)算法应用于982个简档数据集中的12个行为和非行为判别简档属性。结果表明,ID3在检测过程中的准确度最高,而k-类药物的准确度最低。
{"title":"Identifying Fake Facebook Profiles Using Data Mining Techniques","authors":"Mohammed Basil Albayati, A. Altamimi","doi":"10.5614/itbj.ict.res.appl.2019.13.2.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.2","url":null,"abstract":"Facebook, the popular online social network, has changed our lives. Users can create a customized profile to share information about themselves with others that have agreed to be their ‘friend’. However, this gigantic social network can be misused for carrying out malicious activities. Facebook faces the problem of fake accounts that enable scammers to violate users’ privacy by creating fake profiles to infiltrate personal social networks. Many techniques have been proposed to address this issue. Most of them are based on detecting fake profiles/accounts, considering the characteristics of the user profile. However, the limited profile data made publicly available by Facebook makes it ineligible for applying the existing approaches in fake profile identification. Therefore, this research utilized data mining techniques to detect fake profiles. A set of supervised (ID3 decision tree, k-NN, and SVM) and unsupervised (k-Means and k-medoids) algorithms were applied to 12 behavioral and non-behavioral discriminative profile attributes from a dataset of 982 profiles. The results showed that ID3 had the highest accuracy in the detection process while k-medoids had the lowest accuracy.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46460185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Customer Emotional Experience from E-Commerce for Generating Natural Language Evaluation and Advice Reports on Game Products 基于电子商务客户情感体验生成游戏产品自然语言评价与建议报告
IF 0.6 Q3 Computer Science Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.5
Hamdan Gani, Kiyoshi Tomimatsu
Investigating customer emotional experience using natural language processing (NLP) is an example of a way to obtain product insight. However, it relies on interpreting and representing the results understandably. Currently, the results of NLP are presented in numerical or graphical form, and human experts still need to provide an explanation in natural language. It is desirable to develop a computational system that can automatically transform NLP results into a descriptive report in natural language. The goal of this study was to develop a computational linguistic description method to generate evaluation and advice reports on game products. This study used NLP to extract emotional experiences (emotions and sentiments) from e-commerce customer reviews in the form of numerical information. This paper also presents a linguistic description method to generate evaluation and advice reports, adopting the Granular Linguistic Model of a Phenomenon (GLMP) method for analyzing the results of the NLP method. The test result showed that the proposed method could successfully generate evaluation and advice reports assessing the quality of 5 game products based on the emotional experience of customers.
使用自然语言处理(NLP)调查客户情感体验是获得产品洞察力的一种方法。然而,它依赖于可以理解地解释和表示结果。目前,自然语言处理的结果以数字或图形的形式呈现,人类专家仍然需要用自然语言提供解释。开发一种能够将自然语言处理结果自动转换为自然语言描述报告的计算系统是很有必要的。本研究的目标是开发一种计算语言描述方法,以生成游戏产品的评估和建议报告。本研究采用NLP方法,以数字信息的形式从电子商务顾客评论中提取情感体验(情绪和情绪)。本文还提出了一种生成评价和建议报告的语言描述方法,采用现象粒度语言模型(GLMP)方法对NLP方法的结果进行分析。测试结果表明,所提出的方法能够成功生成基于用户情感体验的5款游戏产品质量评估建议报告。
{"title":"Using Customer Emotional Experience from E-Commerce for Generating Natural Language Evaluation and Advice Reports on Game Products","authors":"Hamdan Gani, Kiyoshi Tomimatsu","doi":"10.5614/itbj.ict.res.appl.2019.13.2.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.5","url":null,"abstract":"Investigating customer emotional experience using natural language processing (NLP) is an example of a way to obtain product insight. However, it relies on interpreting and representing the results understandably. Currently, the results of NLP are presented in numerical or graphical form, and human experts still need to provide an explanation in natural language. It is desirable to develop a computational system that can automatically transform NLP results into a descriptive report in natural language. The goal of this study was to develop a computational linguistic description method to generate evaluation and advice reports on game products. This study used NLP to extract emotional experiences (emotions and sentiments) from e-commerce customer reviews in the form of numerical information. This paper also presents a linguistic description method to generate evaluation and advice reports, adopting the Granular Linguistic Model of a Phenomenon (GLMP) method for analyzing the results of the NLP method. The test result showed that the proposed method could successfully generate evaluation and advice reports assessing the quality of 5 game products based on the emotional experience of customers.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45983497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Image Edge Using Quantum Canny Edge Detection Algorithm 基于量子Canny边缘检测算法的图像边缘识别
IF 0.6 Q3 Computer Science Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.4
D. Sundani, S. Widiyanto, Y. Karyanti, D. T. Wardani
Identification of image edges using edge detection is done to obtain images that are sharp and clear. The selection of the edge detection algorithm will affect the result. Canny operators have an advantage compared to other edge detection operators because of their ability to detect not only strong edges but also weak edges. Until now, Canny edge detection has been done using classical computing where data are expressed in bits, 0 or 1. This paper proposes the identification of image edges using a quantum Canny edge detection algorithm, where data are expressed in the form of quantum bits (qubits). Besides 0 or 1, a value can also be 0 and 1 simultaneously so there will be many more possible values that can be obtained. There are three stages in the proposed method, namely the input image stage, the preprocessing stage, and the quantum edge detection stage. Visually, the results show that quantum Canny edge detection can detect more edges compared to classic Canny edge detection, with an average increase of 4.05% .
使用边缘检测来识别图像边缘,以获得清晰的图像。边缘检测算法的选择将影响结果。与其他边缘检测算子相比,Canny算子具有优势,因为它们不仅能够检测强边缘,而且能够检测弱边缘。到目前为止,Canny边缘检测是使用经典计算完成的,其中数据以比特0或1表示。本文提出了使用量子Canny边缘检测算法来识别图像边缘,其中数据以量子比特(量子位)的形式表示。除了0或1之外,一个值也可以同时为0和1,因此可以获得更多可能的值。该方法分为三个阶段,即输入图像阶段、预处理阶段和量子边缘检测阶段。从视觉上看,结果表明,与经典的Canny边缘检测相比,量子Canny边缘探测可以检测到更多的边缘,平均提高4.05%。
{"title":"Identification of Image Edge Using Quantum Canny Edge Detection Algorithm","authors":"D. Sundani, S. Widiyanto, Y. Karyanti, D. T. Wardani","doi":"10.5614/itbj.ict.res.appl.2019.13.2.4","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.4","url":null,"abstract":"Identification of image edges using edge detection is done to obtain images that are sharp and clear. The selection of the edge detection algorithm will affect the result. Canny operators have an advantage compared to other edge detection operators because of their ability to detect not only strong edges but also weak edges. Until now, Canny edge detection has been done using classical computing where data are expressed in bits, 0 or 1. This paper proposes the identification of image edges using a quantum Canny edge detection algorithm, where data are expressed in the form of quantum bits (qubits). Besides 0 or 1, a value can also be 0 and 1 simultaneously so there will be many more possible values that can be obtained. There are three stages in the proposed method, namely the input image stage, the preprocessing stage, and the quantum edge detection stage. Visually, the results show that quantum Canny edge detection can detect more edges compared to classic Canny edge detection, with an average increase of 4.05% .","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49559223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Big Data Assisted CRAN Enabled 5G SON Architecture 大数据辅助支持CRAN的5G SON架构
IF 0.6 Q3 Computer Science Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.1
K. Khurshid, A. Khan, Haroon Siddiqui, Imran Rashid, M. Hadi
The recent development of Big Data, Internet of Things (IoT) and 5G network technology offers a plethora of opportunities to the IT industry and mobile network operators. 5G cellular technology promises to offer connectivity to massive numbers of IoT devices while meeting low-latency data transmission requirements. A deficiency of the current 4G networks is that the data from IoT devices and mobile nodes are merely passed on to the cloud and the communication infrastructure does not play a part in data analysis. Instead of only passing data on to the cloud, the system could also contribute to data analysis and decision-making. In this work, a Big Data driven self-optimized 5G network design is proposed using the knowledge of emerging technologies CRAN, NVF and SDN. Also, some technical impediments in 5G network optimization are discussed. A case study is presented to demonstrate the assistance of Big Data in solving the resource allocation problem.
大数据、物联网(IoT)和5G网络技术的最新发展为IT行业和移动网络运营商提供了大量机会。5G蜂窝技术有望为大量物联网设备提供连接,同时满足低延迟数据传输要求。当前4G网络的一个缺陷是,来自物联网设备和移动节点的数据仅传递到云,通信基础设施在数据分析中没有发挥作用。该系统不仅可以将数据传递到云端,还可以为数据分析和决策做出贡献。在这项工作中,利用新兴技术CRAN、NVF和SDN的知识,提出了一种大数据驱动的自优化5G网络设计。此外,还讨论了5G网络优化中的一些技术障碍。通过一个案例来证明大数据在解决资源分配问题方面的辅助作用。
{"title":"Big Data Assisted CRAN Enabled 5G SON Architecture","authors":"K. Khurshid, A. Khan, Haroon Siddiqui, Imran Rashid, M. Hadi","doi":"10.5614/itbj.ict.res.appl.2019.13.2.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.1","url":null,"abstract":"The recent development of Big Data, Internet of Things (IoT) and 5G network technology offers a plethora of opportunities to the IT industry and mobile network operators. 5G cellular technology promises to offer connectivity to massive numbers of IoT devices while meeting low-latency data transmission requirements. A deficiency of the current 4G networks is that the data from IoT devices and mobile nodes are merely passed on to the cloud and the communication infrastructure does not play a part in data analysis. Instead of only passing data on to the cloud, the system could also contribute to data analysis and decision-making. In this work, a Big Data driven self-optimized 5G network design is proposed using the knowledge of emerging technologies CRAN, NVF and SDN. Also, some technical impediments in 5G network optimization are discussed. A case study is presented to demonstrate the assistance of Big Data in solving the resource allocation problem.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47161189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Tunnel Settlement Prediction by Transfer Learning 基于迁移学习的隧道沉降预测
IF 0.6 Q3 Computer Science Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.3
Qicai Zhou, Hehong Shen, Jiong Zhao, Xiaolei Xiong
Tunnel settlement has a significant impact on property security and personal safety. Accurate tunnel-settlement predictions can quickly reveal problems that may be addressed to prevent accidents. However, each acquisition point in the tunnel is only monitored once daily for around two months. This paper presents a new method for predicting tunnel settlement via transfer learning. First, a source model is constructed and trained by deep learning, then parameter transfer is used to transfer the knowledge gained from the source model to the target model, which has a small dataset. Based on this, the training complexity and training time of the target model can be reduced. The proposed method was tested to predict tunnel settlement in the tunnel of Shanghai metro line 13 at Jinshajiang Road and proven to be effective. Artificial neural network and support vector machines were also tested for comparison. The results showed that the transfer-learning method provided the most accurate tunnel-settlement prediction.
隧道沉降对财产安全和人身安全有重大影响。准确的隧道沉降预测可以迅速揭示可能解决的问题,以防止事故发生。然而,在大约两个月的时间里,隧道中的每个采集点每天只监测一次。本文提出了一种基于迁移学习的隧道沉降预测新方法。首先,通过深度学习构建源模型并对其进行训练,然后利用参数传递方法将源模型中获得的知识传递到数据集较小的目标模型中。在此基础上,可以降低目标模型的训练复杂度和训练时间。以上海地铁13号线金沙江路隧道为例,验证了该方法的有效性。人工神经网络和支持向量机也进行了比较测试。结果表明,迁移学习方法能提供最准确的隧道沉降预测。
{"title":"Tunnel Settlement Prediction by Transfer Learning","authors":"Qicai Zhou, Hehong Shen, Jiong Zhao, Xiaolei Xiong","doi":"10.5614/itbj.ict.res.appl.2019.13.2.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.3","url":null,"abstract":"Tunnel settlement has a significant impact on property security and personal safety. Accurate tunnel-settlement predictions can quickly reveal problems that may be addressed to prevent accidents. However, each acquisition point in the tunnel is only monitored once daily for around two months. This paper presents a new method for predicting tunnel settlement via transfer learning. First, a source model is constructed and trained by deep learning, then parameter transfer is used to transfer the knowledge gained from the source model to the target model, which has a small dataset. Based on this, the training complexity and training time of the target model can be reduced. The proposed method was tested to predict tunnel settlement in the tunnel of Shanghai metro line 13 at Jinshajiang Road and proven to be effective. Artificial neural network and support vector machines were also tested for comparison. The results showed that the transfer-learning method provided the most accurate tunnel-settlement prediction.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43158124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated Defect Detection and Characterization on Pulse Thermography Images Using Computer Vision Techniques 基于计算机视觉技术的脉冲热成像图像缺陷自动检测与表征
IF 0.6 Q3 Computer Science Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5
Meghana, M. P. Arakeri, D. Sharath, M. Menaka, B. Venkatraman
Defect detection and characterization plays a vital role in predicting the life span of materials. Defect detection using appropriate inspection technologies at various phases has gained huge importance in metal production lines. It can be accomplished through wise application of non-destructive testing and evaluation (NDE). It is important to characterize defects at an early stage in order to be able to overcome them or take corrective measures. Pulse thermography is a modern NDE method that can be used for defect detection in metal objects. Only a limited amount of work has been done on automated detection and characterization of defects due to thermal diffusion. This paper proposes a system for automatic defect detection and characterization in metal objects using pulse thermography images as well as various image processing algorithms and mathematical tools. An experiment was carried out using a sequence of 250 pulse thermography images of an AISI 316 L stainless steel sheet with synthetic defects. The proposed system was able to detect and characterize defects sized 10 mm, 8 mm, 6 mm, 4 mm and 2 mm with an average accuracy of 96%, 95%, 84%, 77%, 54% respectively. The proposed technique helps in the effective and efficient characterization of defects in metal objects.
缺陷检测和表征在预测材料寿命方面起着至关重要的作用。在金属生产线的各个阶段,采用合适的检测技术进行缺陷检测已经变得非常重要。这可以通过明智地应用无损检测和评估(NDE)来实现。为了能够克服缺陷或采取纠正措施,在早期阶段描述缺陷是很重要的。脉冲热成像是一种现代无损检测方法,可用于金属物体的缺陷检测。在热扩散缺陷的自动检测和表征方面只做了有限的工作。本文提出了一种基于脉冲热成像图像的金属物体缺陷自动检测和表征系统,以及各种图像处理算法和数学工具。利用aisi316l不锈钢板合成缺陷的250张脉冲热成像图像进行了实验。该系统能够检测和表征尺寸为10 mm、8 mm、6 mm、4 mm和2 mm的缺陷,平均精度分别为96%、95%、84%、77%和54%。所提出的技术有助于有效和高效地表征金属物体中的缺陷。
{"title":"Automated Defect Detection and Characterization on Pulse Thermography Images Using Computer Vision Techniques","authors":"Meghana, M. P. Arakeri, D. Sharath, M. Menaka, B. Venkatraman","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5","url":null,"abstract":"Defect detection and characterization plays a vital role in predicting the life span of materials. Defect detection using appropriate inspection technologies at various phases has gained huge importance in metal production lines. It can be accomplished through wise application of non-destructive testing and evaluation (NDE). It is important to characterize defects at an early stage in order to be able to overcome them or take corrective measures. Pulse thermography is a modern NDE method that can be used for defect detection in metal objects. Only a limited amount of work has been done on automated detection and characterization of defects due to thermal diffusion. This paper proposes a system for automatic defect detection and characterization in metal objects using pulse thermography images as well as various image processing algorithms and mathematical tools. An experiment was carried out using a sequence of 250 pulse thermography images of an AISI 316 L stainless steel sheet with synthetic defects. The proposed system was able to detect and characterize defects sized 10 mm, 8 mm, 6 mm, 4 mm and 2 mm with an average accuracy of 96%, 95%, 84%, 77%, 54% respectively. The proposed technique helps in the effective and efficient characterization of defects in metal objects.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44535586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of ICT Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1