首页 > 最新文献

Journal of ICT Research and Applications最新文献

英文 中文
Automated Defect Detection and Characterization on Pulse Thermography Images Using Computer Vision Techniques 基于计算机视觉技术的脉冲热成像图像缺陷自动检测与表征
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5
Meghana, M. P. Arakeri, D. Sharath, M. Menaka, B. Venkatraman
Defect detection and characterization plays a vital role in predicting the life span of materials. Defect detection using appropriate inspection technologies at various phases has gained huge importance in metal production lines. It can be accomplished through wise application of non-destructive testing and evaluation (NDE). It is important to characterize defects at an early stage in order to be able to overcome them or take corrective measures. Pulse thermography is a modern NDE method that can be used for defect detection in metal objects. Only a limited amount of work has been done on automated detection and characterization of defects due to thermal diffusion. This paper proposes a system for automatic defect detection and characterization in metal objects using pulse thermography images as well as various image processing algorithms and mathematical tools. An experiment was carried out using a sequence of 250 pulse thermography images of an AISI 316 L stainless steel sheet with synthetic defects. The proposed system was able to detect and characterize defects sized 10 mm, 8 mm, 6 mm, 4 mm and 2 mm with an average accuracy of 96%, 95%, 84%, 77%, 54% respectively. The proposed technique helps in the effective and efficient characterization of defects in metal objects.
缺陷检测和表征在预测材料寿命方面起着至关重要的作用。在金属生产线的各个阶段,采用合适的检测技术进行缺陷检测已经变得非常重要。这可以通过明智地应用无损检测和评估(NDE)来实现。为了能够克服缺陷或采取纠正措施,在早期阶段描述缺陷是很重要的。脉冲热成像是一种现代无损检测方法,可用于金属物体的缺陷检测。在热扩散缺陷的自动检测和表征方面只做了有限的工作。本文提出了一种基于脉冲热成像图像的金属物体缺陷自动检测和表征系统,以及各种图像处理算法和数学工具。利用aisi316l不锈钢板合成缺陷的250张脉冲热成像图像进行了实验。该系统能够检测和表征尺寸为10 mm、8 mm、6 mm、4 mm和2 mm的缺陷,平均精度分别为96%、95%、84%、77%和54%。所提出的技术有助于有效和高效地表征金属物体中的缺陷。
{"title":"Automated Defect Detection and Characterization on Pulse Thermography Images Using Computer Vision Techniques","authors":"Meghana, M. P. Arakeri, D. Sharath, M. Menaka, B. Venkatraman","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5","url":null,"abstract":"Defect detection and characterization plays a vital role in predicting the life span of materials. Defect detection using appropriate inspection technologies at various phases has gained huge importance in metal production lines. It can be accomplished through wise application of non-destructive testing and evaluation (NDE). It is important to characterize defects at an early stage in order to be able to overcome them or take corrective measures. Pulse thermography is a modern NDE method that can be used for defect detection in metal objects. Only a limited amount of work has been done on automated detection and characterization of defects due to thermal diffusion. This paper proposes a system for automatic defect detection and characterization in metal objects using pulse thermography images as well as various image processing algorithms and mathematical tools. An experiment was carried out using a sequence of 250 pulse thermography images of an AISI 316 L stainless steel sheet with synthetic defects. The proposed system was able to detect and characterize defects sized 10 mm, 8 mm, 6 mm, 4 mm and 2 mm with an average accuracy of 96%, 95%, 84%, 77%, 54% respectively. The proposed technique helps in the effective and efficient characterization of defects in metal objects.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44535586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accessibility Degradation Prediction on LTE/SAE Network Using Discrete Time Markov Chain (DTMC) Model 基于离散时间马尔可夫链(DTMC)模型的LTE/SAE网络可达性降级预测
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.1
H. Hendrawan
In this paper, an algorithm for predicting accessibility performance on an LTE/SAE network based on relevant historical key performance indicator (KPI) data is proposed. Since there are three KPIs related to accessibility, each representing different segments, a method to map these three KPI values onto the status of accessibility performance is proposed. The network conditions are categorized as high , acceptable or low for each time interval of observation. The first state shows that the system is running optimally, while the second state shows that the system has deteriorated and needs full attention, and the third state indicates that the system has gone into degraded conditions that cannot be tolerated. After the state sequence has been obtained, a transition probability matrix can be derived, which can be used to predict future conditions using a DTMC model. The results obtained are system predictions in terms of probability values for each state for a specific future time. These prediction values are required for proactive health monitoring and fault management. Accessibility degradation prediction is then conducted by using measurement data derived from an eNodeB in the LTE network for a period of one month.
本文提出了一种基于相关历史关键性能指标(KPI)数据预测LTE/SAE网络可达性性能的算法。由于有三个KPI与可访问性相关,每个KPI代表不同的细分市场,因此提出了一种将这三个KPI值映射到可访问性性能状态的方法。对于每个观测时间间隔,网络条件被分类为高、可接受或低。第一种状态表示系统处于最佳运行状态,而第二种状态则表示系统已经恶化,需要充分关注,第三种状态则表明系统已进入无法容忍的降级状态。在获得状态序列之后,可以导出转换概率矩阵,该矩阵可以用于使用DTMC模型预测未来条件。所获得的结果是针对特定未来时间的每个状态的概率值的系统预测。这些预测值是主动健康监测和故障管理所必需的。然后通过使用从LTE网络中的eNodeB导出的测量数据在一个月的时间段内进行可达性降级预测。
{"title":"Accessibility Degradation Prediction on LTE/SAE Network Using Discrete Time Markov Chain (DTMC) Model","authors":"H. Hendrawan","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.1","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.1","url":null,"abstract":"In this paper, an algorithm for predicting accessibility performance on an LTE/SAE network based on relevant historical key performance indicator (KPI) data is proposed. Since there are three KPIs related to accessibility, each representing different segments, a method to map these three KPI values onto the status of accessibility performance is proposed. The network conditions are categorized as high , acceptable or low for each time interval of observation. The first state shows that the system is running optimally, while the second state shows that the system has deteriorated and needs full attention, and the third state indicates that the system has gone into degraded conditions that cannot be tolerated. After the state sequence has been obtained, a transition probability matrix can be derived, which can be used to predict future conditions using a DTMC model. The results obtained are system predictions in terms of probability values for each state for a specific future time. These prediction values are required for proactive health monitoring and fault management. Accessibility degradation prediction is then conducted by using measurement data derived from an eNodeB in the LTE network for a period of one month.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43581378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-Life Optimum Shift Scheduling Design 现实生活中的最佳排班设计
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.2
Lee Kong Weng, Sze San Nah
In many industries, manpower shift scheduling poses problems that require immediate solutions. The fundamental need in this domain is to ensure that all shifts are assigned to cover all or as many jobs as possible. The shifts should additionally be planned with minimum manpower utilization, minimum manpower idleness and enhanced adaptability of employee schedules. The approach used in this study was to utilize an existing manpower prediction method to decide the minimum manpower required to complete all jobs. Based on the minimum manpower number and shift criteria, the shifts were assigned to form schedules using random pick and criteria-based selection methods. The potential schedules were then optimized and the best ones selected. Based on several realistic test instances, the proposed heuristic approach appears to offer promising solutions for shift scheduling as it improves shift idle time, complies with better shift starting time and significantly reduces the manpower needed and the time spent on creating schedules, regardless of data size.
在许多行业中,人力轮班调度带来了需要立即解决的问题。这个领域的基本需求是确保所有班次都被分配到尽可能多的工作上。此外,班次计划应尽量减少人力利用率,尽量减少人力闲置,提高员工时间表的适应性。本研究使用的方法是利用现有的人力预测方法来确定完成所有工作所需的最小人力。采用随机选择和基于标准的选择方法,以最小人力数量和班次标准为基础,分配班次形成时间表。然后对潜在的时间表进行优化并选择最佳时间表。基于几个实际的测试实例,所提出的启发式方法似乎为班次调度提供了有希望的解决方案,因为它改善了班次空闲时间,符合更好的班次开始时间,并显着减少了所需的人力和创建调度所花费的时间,而不管数据大小。
{"title":"Real-Life Optimum Shift Scheduling Design","authors":"Lee Kong Weng, Sze San Nah","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.2","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.2","url":null,"abstract":"In many industries, manpower shift scheduling poses problems that require immediate solutions. The fundamental need in this domain is to ensure that all shifts are assigned to cover all or as many jobs as possible. The shifts should additionally be planned with minimum manpower utilization, minimum manpower idleness and enhanced adaptability of employee schedules. The approach used in this study was to utilize an existing manpower prediction method to decide the minimum manpower required to complete all jobs. Based on the minimum manpower number and shift criteria, the shifts were assigned to form schedules using random pick and criteria-based selection methods. The potential schedules were then optimized and the best ones selected. Based on several realistic test instances, the proposed heuristic approach appears to offer promising solutions for shift scheduling as it improves shift idle time, complies with better shift starting time and significantly reduces the manpower needed and the time spent on creating schedules, regardless of data size.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43516857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network 基于Beta分布的基于信任的无线传感器网络自私节点检测机制
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.6
K. Devi, R. Ganesan
Wireless sensor networks (WSNs) are placed in open environments for the collection of data and are vulnerable to external and internal attacks. The cryptographic mechanisms implemented so far, such as authorization and authentication, are used to restrict external sensor node attacks but cannot prevent internal node attacks. In order to evade internal attacks trust mechanisms are used. In trust mechanisms, firstly, the sensor nodes are monitored using the popular Watchdog mechanism. However, traditional trust models do not pay much attention to selective forwarding and consecutive packet dropping. Sometimes, sensitive data are dropped by internal attackers. This problem is addressed in our proposed model by detecting selective forwarding and consecutive failure of sending packets using the Beta probability density function model.
无线传感器网络(wsn)被放置在开放的环境中收集数据,容易受到外部和内部攻击。目前实现的加密机制(如授权和认证)用于限制外部传感器节点的攻击,而不能防止内部节点的攻击。为了避免内部攻击,采用了信任机制。在信任机制中,首先使用流行的Watchdog机制对传感器节点进行监控。然而,传统的信任模型并不重视选择性转发和连续丢包。有时,内部攻击者会丢失敏感数据。在我们提出的模型中,通过使用Beta概率密度函数模型检测选择性转发和连续发送数据包的失败,解决了这个问题。
{"title":"Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network","authors":"K. Devi, R. Ganesan","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.6","url":null,"abstract":"Wireless sensor networks (WSNs) are placed in open environments for the collection of data and are vulnerable to external and internal attacks. The cryptographic mechanisms implemented so far, such as authorization and authentication, are used to restrict external sensor node attacks but cannot prevent internal node attacks. In order to evade internal attacks trust mechanisms are used. In trust mechanisms, firstly, the sensor nodes are monitored using the popular Watchdog mechanism. However, traditional trust models do not pay much attention to selective forwarding and consecutive packet dropping. Sometimes, sensitive data are dropped by internal attackers. This problem is addressed in our proposed model by detecting selective forwarding and consecutive failure of sending packets using the Beta probability density function model.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43386092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling of Decision-making Processes to Ensure Sustainable Operation of Multiservice Communication Network 多业务通信网络可持续运行决策过程建模
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.4
A. Muradova
This paper shows the modeling of decision-making processes to ensure stable operation of multiservice communication networks (MCNs) using the mathematical apparatus of fuzzy logic models. A classification of the main factors affecting the stability of an MCN is given. The main factors affecting the structural stability of MCNs are external factors, internal factors, energy factors, and maintenance factors. A decision-making strategy (DM) was chosen. The main factors that affect the stability of the functioning of an MCN are characterized by heterogeneity. Therefore, the task of the DM to ensure stability of the functioning of the MCN was reduced to producing a sequential solution of the following interrelated tasks: identification of the MCN by a systematic analysis of the main factors affecting the stability of the MCN, ranking the states of the MCN, and definition of the decision-making criteria. The first point is implemented by setting up a complex model of the MCN based on integration of the principles of fuzzy set theory (FST). A promising method for choosing a rational alternative is the method of non-dominated alternatives (MNDA), based on the aggregation of fuzzy information to characterize the relationship between the alternatives according to certain criteria.
本文利用模糊逻辑模型的数学装置,对保证多业务通信网络稳定运行的决策过程进行了建模。对影响MCN稳定性的主要因素进行了分类。影响MCN结构稳定性的主要因素有外部因素、内部因素、能量因素和维护因素。选择了一种决策策略(DM)。影响MCN功能稳定性的主要因素具有异质性。因此,DM确保MCN功能稳定性的任务被简化为产生以下相关任务的顺序解决方案:通过系统分析影响MCN稳定性的主要因素来识别MCN,对MCN的状态进行排序,并定义决策标准。第一点是在综合模糊集合论原理的基础上,建立了MCN的复杂模型。选择合理备选方案的一种很有前途的方法是非支配备选方案法(MNDA),该方法基于模糊信息的集合,根据某些标准来表征备选方案之间的关系。
{"title":"Modeling of Decision-making Processes to Ensure Sustainable Operation of Multiservice Communication Network","authors":"A. Muradova","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.4","url":null,"abstract":"This paper shows the modeling of decision-making processes to ensure stable operation of multiservice communication networks (MCNs) using the mathematical apparatus of fuzzy logic models. A classification of the main factors affecting the stability of an MCN is given. The main factors affecting the structural stability of MCNs are external factors, internal factors, energy factors, and maintenance factors. A decision-making strategy (DM) was chosen. The main factors that affect the stability of the functioning of an MCN are characterized by heterogeneity. Therefore, the task of the DM to ensure stability of the functioning of the MCN was reduced to producing a sequential solution of the following interrelated tasks: identification of the MCN by a systematic analysis of the main factors affecting the stability of the MCN, ranking the states of the MCN, and definition of the decision-making criteria. The first point is implemented by setting up a complex model of the MCN based on integration of the principles of fuzzy set theory (FST). A promising method for choosing a rational alternative is the method of non-dominated alternatives (MNDA), based on the aggregation of fuzzy information to characterize the relationship between the alternatives according to certain criteria.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48319689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Hierarchical Emotion Classification Technique for Thai Reviews 一种用于泰语评论的层次情感分类技术
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.3.6
Jirawan Charoensuk, O. Sornil
Emotion classification is an interesting problem in affective computing that can be applied in various tasks, such as speech synthesis, image processing and text processing. With the increasing amount of textual data on the Internet, especially reviews of customers that express opinions and emotions about products. These reviews are important feedback for companies. Emotion classification aims to identify an emotion label for each review. This research investigated three approaches for emotion classification of opinions in the Thai language, written in unstructured format, free form or informal style. Different sets of features were studied in detail and analyzed. The experimental results showed that a hierarchical approach, where the subjectivity of the review is determined first, then the polarity of opinion is identified and finally the emotional label is calculated, yielded the highest performance, with precision, recall and F-measure at 0.691, 0.743 and 0.709, respectively.
情感分类是情感计算中的一个有趣的问题,可以应用于各种任务,如语音合成、图像处理和文本处理。随着互联网上文本数据的不断增加,尤其是客户对产品表达意见和情感的评论。这些评论对公司来说是重要的反馈。情绪分类的目的是为每个评论识别一个情绪标签。本研究探讨了泰文意见的三种情绪分类方法,即非结构化格式、自由格式和非正式风格。对不同的特征集进行了详细的研究和分析。实验结果表明,首先确定评论的主观性,然后确定意见的极性,最后计算情感标签的分层方法产生了最高的性能,精度,召回率和F-measure分别为0.691,0.743和0.709。
{"title":"A Hierarchical Emotion Classification Technique for Thai Reviews","authors":"Jirawan Charoensuk, O. Sornil","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.3.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.3.6","url":null,"abstract":"Emotion classification is an interesting problem in affective computing that can be applied in various tasks, such as speech synthesis, image processing and text processing. With the increasing amount of textual data on the Internet, especially reviews of customers that express opinions and emotions about products. These reviews are important feedback for companies. Emotion classification aims to identify an emotion label for each review. This research investigated three approaches for emotion classification of opinions in the Thai language, written in unstructured format, free form or informal style. Different sets of features were studied in detail and analyzed. The experimental results showed that a hierarchical approach, where the subjectivity of the review is determined first, then the polarity of opinion is identified and finally the emotional label is calculated, yielded the highest performance, with precision, recall and F-measure at 0.691, 0.743 and 0.709, respectively.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42984024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Vacant Parking Lot Information System Using Transfer Learning and IoT 基于迁移学习和物联网的空置停车场信息系统
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.3.1
E. Jose, S. Veni
Parking information systems have become very important, especially in metropolitan areas as they help to save time, effort and fuel when searching for parking. This paper offers a novel low-cost deep learning approach to easily implement vacancy detection at outdoor parking spaces with CCTV surveillance. The proposed method also addresses issues due to perspective distortion in CCTV images. The architecture consists of three classifiers for checking the availability of parking spaces. They were developed on the TensorFlow platform by re-training MobileNet (a pre-trained Convolutional Neural Network (CNN)) model using the transfer learning technique. A performance analysis showed 88% accuracy for vacancy detection. An end-to-end application model with Internet of Things (IoT) and an Android application is also presented. Users can interact with the cloud using their Android application to get real-time updates on parking space availability and the parking location. In the future, an autonomous car could use this system as a V2I (Vehicle to Infrastructure) application in deciding the nearest parking space.
停车信息系统变得非常重要,尤其是在大都市地区,因为它们有助于在搜索停车时节省时间、精力和燃料。本文提供了一种新的低成本深度学习方法,可以通过CCTV监控轻松实现室外停车位的空置检测。所提出的方法还解决了由于CCTV图像中的透视失真而引起的问题。该体系结构由三个分类器组成,用于检查停车位的可用性。它们是在TensorFlow平台上通过使用迁移学习技术重新训练MobileNet(一种预先训练的卷积神经网络(CNN))模型而开发的。性能分析显示空位检测的准确率为88%。还提出了一个具有物联网(IoT)和安卓应用程序的端到端应用程序模型。用户可以使用他们的Android应用程序与云进行交互,以实时更新停车位的可用性和停车位置。未来,自动驾驶汽车可以使用该系统作为V2I(车辆到基础设施)应用程序来决定最近的停车位。
{"title":"Vacant Parking Lot Information System Using Transfer Learning and IoT","authors":"E. Jose, S. Veni","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.3.1","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.3.1","url":null,"abstract":"Parking information systems have become very important, especially in metropolitan areas as they help to save time, effort and fuel when searching for parking. This paper offers a novel low-cost deep learning approach to easily implement vacancy detection at outdoor parking spaces with CCTV surveillance. The proposed method also addresses issues due to perspective distortion in CCTV images. The architecture consists of three classifiers for checking the availability of parking spaces. They were developed on the TensorFlow platform by re-training MobileNet (a pre-trained Convolutional Neural Network (CNN)) model using the transfer learning technique. A performance analysis showed 88% accuracy for vacancy detection. An end-to-end application model with Internet of Things (IoT) and an Android application is also presented. Users can interact with the cloud using their Android application to get real-time updates on parking space availability and the parking location. In the future, an autonomous car could use this system as a V2I (Vehicle to Infrastructure) application in deciding the nearest parking space.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41370223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of LEACH and LEACH-C Protocols in Wireless Sensor Networks 无线传感器网络中LEACH和LEACH- c协议的性能比较
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.3.2
A. Al-Shaikh, Hebatallah Khattab, S. Al-Sharaeh
Wireless Sensor Networks (WSNs) draw the attention of researchers due to the diversity of applications that use them. Basically, a WSN comprises many sensor nodes that are supplied with power by means of a small battery installed in the node itself; the node can also be self-charged by a solar cell. Sometimes it is impossible to change the power supply of battery-operated nodes. This dictates that sensor nodes must utilize the energy they have in an optimal manner. Data communication is the main cause of energy dissipation. In this context, designing protocols for WSNs demands more attention to the design of energy-efficient routing protocols that allow communications between sensor nodes and their base station (BS) with the least cost. LEACH is a prominent hierarchical cluster-based routing protocol. It groups sensor nodes into clusters to reduce energy dissipation. On the other hand, LEACH-C is a protocol based on LEACH that claims to improve energy dissipation over LEACH. In this paper, a successful attempt was made to compare these two protocols using MATLAB. The results show that LEACH-C has better performance than LEACH in terms of power dissipation.
无线传感器网络(WSNs)由于其应用的多样性而引起了研究人员的关注。基本上,WSN由许多传感器节点组成,这些节点通过安装在节点本身的小电池供电;该节点还可以通过太阳能电池自行充电。有时不可能改变电池供电节点的电源。这就要求传感器节点必须以最优的方式利用它们所拥有的能量。数据通信是造成能量耗散的主要原因。在这种情况下,设计WSNs协议需要更多地关注节能路由协议的设计,使传感器节点与基站之间的通信成本最低。LEACH是一种杰出的基于分层集群的路由协议。它将传感器节点分组以减少能量消耗。另一方面,LEACH- c是一种基于LEACH的协议,声称可以改善LEACH的能量耗散。本文利用MATLAB对这两种协议进行了成功的比较。结果表明,LEACH- c在功耗方面优于LEACH。
{"title":"Performance Comparison of LEACH and LEACH-C Protocols in Wireless Sensor Networks","authors":"A. Al-Shaikh, Hebatallah Khattab, S. Al-Sharaeh","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.3.2","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.3.2","url":null,"abstract":"Wireless Sensor Networks (WSNs) draw the attention of researchers due to the diversity of applications that use them. Basically, a WSN comprises many sensor nodes that are supplied with power by means of a small battery installed in the node itself; the node can also be self-charged by a solar cell. Sometimes it is impossible to change the power supply of battery-operated nodes. This dictates that sensor nodes must utilize the energy they have in an optimal manner. Data communication is the main cause of energy dissipation. In this context, designing protocols for WSNs demands more attention to the design of energy-efficient routing protocols that allow communications between sensor nodes and their base station (BS) with the least cost. LEACH is a prominent hierarchical cluster-based routing protocol. It groups sensor nodes into clusters to reduce energy dissipation. On the other hand, LEACH-C is a protocol based on LEACH that claims to improve energy dissipation over LEACH. In this paper, a successful attempt was made to compare these two protocols using MATLAB. The results show that LEACH-C has better performance than LEACH in terms of power dissipation.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44527125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance Analysis of BigDecimal Arithmetic Operation in Java Java中BigDecimal算术运算的性能分析
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.3.5
J. T. Tarigan, E. M. Zamzami, C. L. Ginting
The Java programming language provides binary floating-point primitive data types such as float and double to represent decimal numbers. However, these data types cannot represent decimal numbers with complete accuracy, which may cause precision errors while performing calculations. To achieve better precision, Java provides the BigDecimal class. Unlike float and double, which use approximation, this class is able to represent the exact value of a decimal number. However, it comes with a drawback: BigDecimal is treated as an object and requires additional CPU and memory usage to operate with. In this paper, statistical data are presented of performance impact on using BigDecimal compared to the double data type. As test cases, common mathematical processes were used, such as calculating mean value, sorting, and multiplying matrices.
Java编程语言提供了二进制浮点基本数据类型(如float和double)来表示十进制数。但是,这些数据类型不能完全精确地表示十进制数,这可能会在执行计算时导致精度错误。为了获得更好的精度,Java提供了BigDecimal类。与使用近似值的float和double类型不同,这个类能够表示十进制数的精确值。然而,它有一个缺点:BigDecimal被视为对象,需要使用额外的CPU和内存来操作。本文给出了使用BigDecimal与使用double数据类型相比对性能影响的统计数据。作为测试用例,使用了常见的数学过程,例如计算平均值、排序和矩阵相乘。
{"title":"Performance Analysis of BigDecimal Arithmetic Operation in Java","authors":"J. T. Tarigan, E. M. Zamzami, C. L. Ginting","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.3.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.3.5","url":null,"abstract":"The Java programming language provides binary floating-point primitive data types such as float and double to represent decimal numbers. However, these data types cannot represent decimal numbers with complete accuracy, which may cause precision errors while performing calculations. To achieve better precision, Java provides the BigDecimal class. Unlike float and double, which use approximation, this class is able to represent the exact value of a decimal number. However, it comes with a drawback: BigDecimal is treated as an object and requires additional CPU and memory usage to operate with. In this paper, statistical data are presented of performance impact on using BigDecimal compared to the double data type. As test cases, common mathematical processes were used, such as calculating mean value, sorting, and multiplying matrices.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42366488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DT-MSOF Strategy and its Application to Reduce the Number of Operations in AHP DT-MSOF策略及其在AHP中减少操作次数的应用
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.3.3
F. A. Yulianto, K. Kuspriyanto, Teguh Nurhadi Suharsono
A computing strategy called Double Track–Most Significant Operation First (DT-MSOF) is proposed. The goal of this strategy is to reduce computation time by reducing the number of operations that need to be executed, while maintaining a correct final result. Executions are conducted on a sequence of computing operations that have previously been sorted based on significance. Computation will only run until the result meets the needs of the user. In this study, the DT-MSOF strategy was used to modify the Analytic Hierarchy Process (AHP) algorithm into MD-AHP in order to reduce the number of operations that need to be done. The conventional AHP uses a run-to-completion approach, in which decisions can only be obtained after all of the operations have been completed. On the other hand, the calculations in MD-AHP are carried out iteratively only until the conditions are reached where a decision can be made. The simulation results show that MD-AHP can reduce the number of operations that need to be done to obtain the same results (decisions) as obtained by conventional AHP. It was also found that the more uneven the distribution of priority values, the more the number of operations could be reduced.
提出了一种称为双轨-最重要操作优先(DT-MSOF)的计算策略。该策略的目标是通过减少需要执行的操作数量来减少计算时间,同时保持正确的最终结果。执行是在先前已根据重要性排序的计算操作序列上进行的。只有当结果满足用户的需求时,计算才会运行。在本研究中,使用DT-MSOF策略将层次分析法(AHP)算法修改为MD-AHP,以减少需要进行的操作数量。传统的AHP使用运行到完成的方法,其中只有在所有操作完成后才能获得决策。另一方面,MD-AHP中的计算仅迭代进行,直到达到可以做出决定的条件为止。仿真结果表明,MD-AHP可以减少需要进行的操作次数,以获得与传统AHP相同的结果(决策)。还发现,优先级值的分布越不均匀,可以减少的操作次数就越多。
{"title":"DT-MSOF Strategy and its Application to Reduce the Number of Operations in AHP","authors":"F. A. Yulianto, K. Kuspriyanto, Teguh Nurhadi Suharsono","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.3.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.3.3","url":null,"abstract":"A computing strategy called Double Track–Most Significant Operation First (DT-MSOF) is proposed. The goal of this strategy is to reduce computation time by reducing the number of operations that need to be executed, while maintaining a correct final result. Executions are conducted on a sequence of computing operations that have previously been sorted based on significance. Computation will only run until the result meets the needs of the user. In this study, the DT-MSOF strategy was used to modify the Analytic Hierarchy Process (AHP) algorithm into MD-AHP in order to reduce the number of operations that need to be done. The conventional AHP uses a run-to-completion approach, in which decisions can only be obtained after all of the operations have been completed. On the other hand, the calculations in MD-AHP are carried out iteratively only until the conditions are reached where a decision can be made. The simulation results show that MD-AHP can reduce the number of operations that need to be done to obtain the same results (decisions) as obtained by conventional AHP. It was also found that the more uneven the distribution of priority values, the more the number of operations could be reduced.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49310055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of ICT Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1