首页 > 最新文献

2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)最新文献

英文 中文
Graphical representation of the whole sequentially MRI images in a single view image sequences of human's whole head 在人类整个头部的单视图图像序列中,整个顺序MRI图像的图形表示
Varin Chouvatut, E. Boonchieng
Typically, a sequence of the Magnetic Resonance Imaging (MRI) images is composed of a certain number of images projecting some internal organs of a human, such as brain and eyeballs of the human's head, which is the case chosen for our demonstration. Each of MRI images in the sequence presents only a thin layer of the whole head. The image processing techniques proposed in this paper aims to allow all such sequential images to be visible through a single view. In other words, the whole head of a human can be visible in just one image and thus looks as a three-dimensional view of the head. Unfortunately, there may be some deviation in positions even between contiguous images in the sequence. Centroid of the human's head appeared in each image should be measured. To ensure a centroid's position is estimated well enough so that centroids of all sequential images are not so much deviated from each other, searching for the centroid of a human's whole head is done based on an approximate convex shape rather than a circular shape as usual. From our experimental results, there is no significant deviation of centroids between contiguous frames as expected.
通常,一系列磁共振成像(MRI)图像由一定数量的图像组成,这些图像投射出人类的一些内部器官,如大脑和人类头部的眼球,这是我们选择的例子。序列中的每张MRI图像只显示整个头部的薄层。本文提出的图像处理技术旨在通过单一视图可以看到所有这些序列图像。换句话说,一个人的整个头部可以在一张图像中看到,因此看起来像是头部的三维视图。不幸的是,即使在序列中相邻的图像之间,位置也可能存在一些偏差。测量每个图像中出现的人的头部质心。为了确保一个质心的位置估计得足够好,使所有序列图像的质心彼此之间不会偏离太多,搜索人类整个头部的质心是基于一个近似的凸形状,而不是通常的圆形形状。从我们的实验结果来看,连续帧之间的质心没有预期的明显偏差。
{"title":"Graphical representation of the whole sequentially MRI images in a single view image sequences of human's whole head","authors":"Varin Chouvatut, E. Boonchieng","doi":"10.1109/JCSSE.2017.8025941","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025941","url":null,"abstract":"Typically, a sequence of the Magnetic Resonance Imaging (MRI) images is composed of a certain number of images projecting some internal organs of a human, such as brain and eyeballs of the human's head, which is the case chosen for our demonstration. Each of MRI images in the sequence presents only a thin layer of the whole head. The image processing techniques proposed in this paper aims to allow all such sequential images to be visible through a single view. In other words, the whole head of a human can be visible in just one image and thus looks as a three-dimensional view of the head. Unfortunately, there may be some deviation in positions even between contiguous images in the sequence. Centroid of the human's head appeared in each image should be measured. To ensure a centroid's position is estimated well enough so that centroids of all sequential images are not so much deviated from each other, searching for the centroid of a human's whole head is done based on an approximate convex shape rather than a circular shape as usual. From our experimental results, there is no significant deviation of centroids between contiguous frames as expected.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"83 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache replacement mechanism with Content Popularity for Vehicular Content-Centric Networks (VCCN) 车载内容中心网络(VCCN)中具有内容流行度的缓存替换机制
Sangduan Chootong, Jirawat Thaenthong
Caching mechanism is usually used in Content-Centric Networking. Cache data is contained at provider node and all nodes along the path to the consumer node. The disadvantage of this mechanism is the data redundancy on several nodes. In the case of the cache size is limited, the cache hit of the request data is issued. In this paper proposed a Cache Replacement with Content Popularity (CRCP) mechanism that allows a node in a cluster of vehicles to make decision retaining data or performing cache replacement. The results demonstrate the performance of the proposed mechanism is better than the LFU and LRU in terms of average cache hit ratio.
缓存机制通常用于以内容为中心的网络。缓存数据包含在提供者节点和到使用者节点路径上的所有节点上。这种机制的缺点是多个节点上的数据冗余。在缓存大小有限的情况下,发出请求数据的缓存命中。本文提出了一种基于内容流行度的缓存替换(CRCP)机制,该机制允许车辆集群中的节点做出保留数据或执行缓存替换的决策。结果表明,该机制在平均缓存命中率方面优于LFU和LRU。
{"title":"Cache replacement mechanism with Content Popularity for Vehicular Content-Centric Networks (VCCN)","authors":"Sangduan Chootong, Jirawat Thaenthong","doi":"10.1109/JCSSE.2017.8025901","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025901","url":null,"abstract":"Caching mechanism is usually used in Content-Centric Networking. Cache data is contained at provider node and all nodes along the path to the consumer node. The disadvantage of this mechanism is the data redundancy on several nodes. In the case of the cache size is limited, the cache hit of the request data is issued. In this paper proposed a Cache Replacement with Content Popularity (CRCP) mechanism that allows a node in a cluster of vehicles to make decision retaining data or performing cache replacement. The results demonstrate the performance of the proposed mechanism is better than the LFU and LRU in terms of average cache hit ratio.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"271 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83027308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Burn in Zone: Real time Heart Rate monitoring for physical activity 烧伤区:实时心率监测的身体活动
Sakchai Muangsrinoon, P. Boonbrahm
The number of time that heart beats per one minute we call it as the heart rate or pulse. It is an indicator for monitoring health. In this paper, we present the Burn in Zone: Physical activity real-time heart rate monitoring, a novel model to help people who prefer to have a more physical activity to continue their intention in the long term. We were mainly interested in real-time heart rate monitoring and target heart rate zone, not its ability to change behavior. This model will help those people to monitor their heart rate while having physical activity in line with their target heart rate or training heart rate (THR). THR is the desired range of heart rate reached during physical activity. It is calculated from the percentage of the physical activity intensity (PAI) multiply with Maximum Heart Rate (MHR), the highest heart rate of each person can work efficiently and safely without severe problems through exercise stress. In this research, we developed an android wear application for getting a real-time pulse from the heart sensor in Android Smart Watch. We had collected data from undergraduate and graduate students from the School of Informatics, Walailak University, who volunteer to be part of this experiment. There are twenty-six volunteers with age ranges from nineteen to forty-two-year-olds. Among the volunteers, there are twelve males (46.15%) and fourteen females (53.85%). We separated the samples into two groups, controlled group and experimental group. The experimental criteria are cycling on a stationary bicycle with six minutes for each people. Results from the experiment showed that the percentage of heart rate of the controlled group and the experimental group were consistent with the experimental setup criteria for monitoring the heart rate data on Android wear. For future work, we plan to implement the game design elements to encourage the people to have more level of physical activity and continue their physical activity.
心脏每分钟跳动的次数我们称之为心率或脉搏。它是监视运行状况的指示器。在本文中,我们提出了烧伤区:身体活动实时心率监测,这是一个新的模型,可以帮助那些喜欢进行更多身体活动的人长期坚持他们的意图。我们主要对实时心率监测和目标心率区域感兴趣,而不是它改变行为的能力。这个模型将帮助这些人在进行符合目标心率或训练心率(THR)的体育活动时监测他们的心率。THR是在体育活动中达到的理想心率范围。它是由身体活动强度(PAI)乘以最大心率(MHR)的百分比计算出来的,每个人的最高心率可以有效和安全地工作,而不会因为运动压力而产生严重的问题。在本研究中,我们开发了一个android穿戴应用程序,用于获取android智能手表中心脏传感器的实时脉搏。我们收集了来自瓦拉拉克大学信息学院的本科生和研究生的数据,他们自愿成为这个实验的一部分。共有26名志愿者,年龄从19岁到42岁不等。其中男性12人(46.15%),女性14人(53.85%)。我们将样品分为两组,对照组和实验组。实验标准是每人骑6分钟的固定自行车。实验结果表明,对照组和实验组的心率百分比符合Android佩戴心率数据监测的实验设置标准。对于未来的工作,我们计划实施游戏设计元素,以鼓励人们有更多的体育活动水平,并继续他们的体育活动。
{"title":"Burn in Zone: Real time Heart Rate monitoring for physical activity","authors":"Sakchai Muangsrinoon, P. Boonbrahm","doi":"10.1109/JCSSE.2017.8025953","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025953","url":null,"abstract":"The number of time that heart beats per one minute we call it as the heart rate or pulse. It is an indicator for monitoring health. In this paper, we present the Burn in Zone: Physical activity real-time heart rate monitoring, a novel model to help people who prefer to have a more physical activity to continue their intention in the long term. We were mainly interested in real-time heart rate monitoring and target heart rate zone, not its ability to change behavior. This model will help those people to monitor their heart rate while having physical activity in line with their target heart rate or training heart rate (THR). THR is the desired range of heart rate reached during physical activity. It is calculated from the percentage of the physical activity intensity (PAI) multiply with Maximum Heart Rate (MHR), the highest heart rate of each person can work efficiently and safely without severe problems through exercise stress. In this research, we developed an android wear application for getting a real-time pulse from the heart sensor in Android Smart Watch. We had collected data from undergraduate and graduate students from the School of Informatics, Walailak University, who volunteer to be part of this experiment. There are twenty-six volunteers with age ranges from nineteen to forty-two-year-olds. Among the volunteers, there are twelve males (46.15%) and fourteen females (53.85%). We separated the samples into two groups, controlled group and experimental group. The experimental criteria are cycling on a stationary bicycle with six minutes for each people. Results from the experiment showed that the percentage of heart rate of the controlled group and the experimental group were consistent with the experimental setup criteria for monitoring the heart rate data on Android wear. For future work, we plan to implement the game design elements to encourage the people to have more level of physical activity and continue their physical activity.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"126 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87854128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A linear discriminant analysis using weighted local structure information 基于加权局部结构信息的线性判别分析
Raywut Ketsuwan, P. Padungweang
The linear discriminant analysis (LDA) is one of the most efficient supervised dimensionality reduction technique widely used in face recognition. This paper proposed a new weighted LDA to improve the performance of the discriminant analysis. Confusable pair of classes is considered as the primary goal in our objective function. The proposed technique not only improves the minimization of the within-class scatter, but also improves the maximization of the between classes scatter to extract better discriminant feature subset. The experimental results a real word dataset demonstrate that the proposed method achieve higher recognition rate than that traditional LDA as well as other weighted LDA.
线性判别分析(LDA)是目前广泛应用于人脸识别的最有效的监督降维技术之一。为了提高判别分析的性能,本文提出了一种新的加权LDA。在我们的目标函数中,可混淆的类对被认为是主要目标。该方法不仅提高了类内散点的最小化,而且提高了类间散点的最大化,从而提取出更好的判别特征子集。在真实单词数据集上的实验结果表明,该方法比传统LDA和其他加权LDA具有更高的识别率。
{"title":"A linear discriminant analysis using weighted local structure information","authors":"Raywut Ketsuwan, P. Padungweang","doi":"10.1109/JCSSE.2017.8025907","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025907","url":null,"abstract":"The linear discriminant analysis (LDA) is one of the most efficient supervised dimensionality reduction technique widely used in face recognition. This paper proposed a new weighted LDA to improve the performance of the discriminant analysis. Confusable pair of classes is considered as the primary goal in our objective function. The proposed technique not only improves the minimization of the within-class scatter, but also improves the maximization of the between classes scatter to extract better discriminant feature subset. The experimental results a real word dataset demonstrate that the proposed method achieve higher recognition rate than that traditional LDA as well as other weighted LDA.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76063648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Two factor image-based password authentication for junior high school students 基于双因素图像的初中生密码认证
Niramai Cherdmuangpak, Tanapat Anusas-Amornkul, B. Limthanmaphon
Internet is popular for people at all ages. A computer is used to access the Internet but a user needs to authenticate himself to the system in order to gain access. The problem of a typical authentication technique is to memorize a password. Lots of junior high school students in Pakthongchaiprachaniramit School cannot remember their own password and this work is proposed to solve the problem by using an image-based password technique instead. However, a normal image-based password can be easily hacked using a shoulder surfing attack. This work proposed the two factor image-based password technique using image and random questions. However, when the percentage of successful log-in was compared, this work outperformed the alphanumeric-based password. When the third log-in (15 days after registration) was conducted, the percentage of successful log-in of our proposed work was 95% comparing to 58.33% of alphanumeric-based password. In addition, the proposed technique was able to prevent from the shoulder surfing attack.
互联网受各个年龄段的人欢迎。计算机是用来访问Internet的,但是用户需要向系统验证自己才能访问。典型的身份验证技术的问题是要记住密码。Pakthongchaiprachaniramit学校的很多初中生都记不住自己的密码,本文提出用基于图像的密码技术来解决这个问题。然而,普通的基于图像的密码可以很容易地通过肩部冲浪攻击被破解。本文提出了基于图像和随机问题的双因素图像密码技术。但是,当比较成功登录的百分比时,这种工作优于基于字母数字的密码。在第三次登录时(注册后15天),我们建议的工作的登录成功率为95%,而基于字母数字的密码的登录成功率为58.33%。此外,所提出的技术能够防止肩冲浪攻击。
{"title":"Two factor image-based password authentication for junior high school students","authors":"Niramai Cherdmuangpak, Tanapat Anusas-Amornkul, B. Limthanmaphon","doi":"10.1109/JCSSE.2017.8025913","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025913","url":null,"abstract":"Internet is popular for people at all ages. A computer is used to access the Internet but a user needs to authenticate himself to the system in order to gain access. The problem of a typical authentication technique is to memorize a password. Lots of junior high school students in Pakthongchaiprachaniramit School cannot remember their own password and this work is proposed to solve the problem by using an image-based password technique instead. However, a normal image-based password can be easily hacked using a shoulder surfing attack. This work proposed the two factor image-based password technique using image and random questions. However, when the percentage of successful log-in was compared, this work outperformed the alphanumeric-based password. When the third log-in (15 days after registration) was conducted, the percentage of successful log-in of our proposed work was 95% comparing to 58.33% of alphanumeric-based password. In addition, the proposed technique was able to prevent from the shoulder surfing attack.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73777099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Workflow simulation based on cloud platform for office automation system 基于云平台的办公自动化系统工作流仿真
Kanittha Promsakul, S. Limsiroratana
This research focuses on improving business process worked under workflow simulation. In the business process, there are several properties to be considered such as person, cost, time. The current workflow simulation cannot combine these properties to simulate the situation for business decision making. In this paper, the improving business workflow simulation is proposed by adding the business properties to the workflow simulation. Then, our simulation is able to simulate his/her work and monitor/collect status data for analysis. Both Apache Oozie and Apache Hadoop are used in this work as fundamental framework. Oozie is a workflow engine job scheduler system which is performed by the Apache Hadoop. Apache Hadoop is big data framework that provides distributed processing and storage. As a result, our workflow simulation can increase the efficiency of workflow management and scalable for solving the big business workflow process.
本研究的重点是改进工作流仿真下的业务流程。在业务流程中,有几个属性需要考虑,比如人员、成本、时间。当前的工作流模拟不能结合这些属性来模拟业务决策的情况。本文提出了在工作流仿真中加入业务属性来改进业务工作流仿真的方法。然后,我们的仿真能够模拟他/她的工作,并监控/收集状态数据进行分析。在这项工作中,Apache Oozie和Apache Hadoop都被用作基础框架。Oozie是一个由Apache Hadoop执行的工作流引擎作业调度系统。Apache Hadoop是提供分布式处理和存储的大数据框架。因此,我们的工作流模拟可以提高工作流管理的效率和可扩展性,用于解决大型业务工作流过程。
{"title":"Workflow simulation based on cloud platform for office automation system","authors":"Kanittha Promsakul, S. Limsiroratana","doi":"10.1109/JCSSE.2017.8025947","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025947","url":null,"abstract":"This research focuses on improving business process worked under workflow simulation. In the business process, there are several properties to be considered such as person, cost, time. The current workflow simulation cannot combine these properties to simulate the situation for business decision making. In this paper, the improving business workflow simulation is proposed by adding the business properties to the workflow simulation. Then, our simulation is able to simulate his/her work and monitor/collect status data for analysis. Both Apache Oozie and Apache Hadoop are used in this work as fundamental framework. Oozie is a workflow engine job scheduler system which is performed by the Apache Hadoop. Apache Hadoop is big data framework that provides distributed processing and storage. As a result, our workflow simulation can increase the efficiency of workflow management and scalable for solving the big business workflow process.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83643002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved least-squares quadratic mutual information clustering via Laplacian Eigenmap 基于拉普拉斯特征映射的改进最小二乘二次互信息聚类
J. Sainui
Dependence-maximization clustering is another line of clustering framework, which clusters samples by maximizing the statistical dependence on samples in the same group. Recently, dependence-maximization clustering method based on least-squares quadratic mutual information (LSQMI), called LSQMI based clustering (LSQMIC), was proposed. A notable advantage of LSQMIC over other dependence-maximization clustering methods is that it works well even though the data containing outliers. However, the performance of this method tends to decrease in case samples are low density. To deal with this problem, in this paper, we apply Laplacian Eigenmap incorporating with local scaling similarity for representing data so that the samples in the same class will stay as close as possible. Through experiments, we demonstrate that LSQMIC performs better on Laplacian Eigenmap embedded with no losing of the high robustness against outliers.
依赖性最大化聚类是另一种聚类框架,它通过最大化对同一组样本的统计依赖性来聚类样本。近年来,提出了一种基于最小二乘二次互信息(LSQMI)的依赖最大化聚类方法,称为基于LSQMI的聚类(LSQMIC)。与其他依赖最大化聚类方法相比,LSQMIC的一个显著优势是,即使数据包含离群值,它也能很好地工作。然而,在样本密度较低的情况下,该方法的性能有下降的趋势。为了解决这一问题,本文采用结合局部尺度相似度的拉普拉斯特征映射来表示数据,使同一类的样本尽可能接近。通过实验,我们证明LSQMIC在拉普拉斯特征映射嵌入上有更好的表现,并且没有失去对异常值的高鲁棒性。
{"title":"Improved least-squares quadratic mutual information clustering via Laplacian Eigenmap","authors":"J. Sainui","doi":"10.1109/JCSSE.2017.8025928","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025928","url":null,"abstract":"Dependence-maximization clustering is another line of clustering framework, which clusters samples by maximizing the statistical dependence on samples in the same group. Recently, dependence-maximization clustering method based on least-squares quadratic mutual information (LSQMI), called LSQMI based clustering (LSQMIC), was proposed. A notable advantage of LSQMIC over other dependence-maximization clustering methods is that it works well even though the data containing outliers. However, the performance of this method tends to decrease in case samples are low density. To deal with this problem, in this paper, we apply Laplacian Eigenmap incorporating with local scaling similarity for representing data so that the samples in the same class will stay as close as possible. Through experiments, we demonstrate that LSQMIC performs better on Laplacian Eigenmap embedded with no losing of the high robustness against outliers.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"41 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84056849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain tumor's approximate correspondence and area with interior holes filled 脑瘤的近似对应和面积与内部孔洞填充
Varin Chouvatut, E. Boonchieng
Measuring area of tumor in human's brain from only single image may provide incorrect information for further diagnosis. Generally, a doctor or an expert must examine a brain tumor from several sequential MRI images to conclude its size or the severity level of patient's illness. To imitate the way a doctor diagnosing such case in a real situation, some digital image processing techniques are proposed and applied in order to provide support for a tentative or an initial analysis to the doctor. Thus, correspondence of appearances of a tumor presented in all MRI images should be linked and considered. In image processing, a closed area can be seen as an object and based on the similarity of its interior shadings, the object's centroid can be estimated. Unfortunately, although an object's centroid may be calculated even there exists slightly different shadings which are still considered as having similarity inside the closed shape of the object, only a small hole can cause deviation of computed centroid from its expected position. Since the typical thresholding techniques still leave a hole whose area has a certain amount of different shading from the major shading of the object's area. Thus, we proposed a number of image processing techniques for the purpose of tumor area approximation. Moreover, the proposed methods include a correspondence technique would also support multiple-object detection and linking centroids of the same object, which is a brain tumor in this case, presented in a pair of contiguous images.
仅凭单幅图像测量人脑肿瘤面积可能会为进一步诊断提供不正确的信息。一般来说,医生或专家必须从几个连续的MRI图像中检查脑肿瘤,以确定其大小或患者疾病的严重程度。为了模仿医生在真实情况下诊断此类病例的方式,提出并应用了一些数字图像处理技术,以便为医生的初步或初步分析提供支持。因此,应将所有MRI图像中肿瘤表现的一致性联系起来并加以考虑。在图像处理中,一个封闭的区域可以看作一个物体,根据其内部阴影的相似性,可以估计出物体的质心。不幸的是,即使在物体的封闭形状内部存在细微的不同阴影,但仍然认为这些阴影具有相似性,也可以计算出物体的质心,但只要一个小孔就会导致计算出的质心偏离其期望位置。由于典型的阈值化技术仍然会留下一个洞,其区域与物体区域的主要阴影有一定数量的不同阴影。因此,我们提出了一些以肿瘤面积近似为目的的图像处理技术。此外,所提出的方法还包括一种通信技术,该技术还支持多目标检测和连接同一目标的质心,在这种情况下,该目标是一个脑肿瘤,在一对连续的图像中呈现。
{"title":"Brain tumor's approximate correspondence and area with interior holes filled","authors":"Varin Chouvatut, E. Boonchieng","doi":"10.1109/JCSSE.2017.8025957","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025957","url":null,"abstract":"Measuring area of tumor in human's brain from only single image may provide incorrect information for further diagnosis. Generally, a doctor or an expert must examine a brain tumor from several sequential MRI images to conclude its size or the severity level of patient's illness. To imitate the way a doctor diagnosing such case in a real situation, some digital image processing techniques are proposed and applied in order to provide support for a tentative or an initial analysis to the doctor. Thus, correspondence of appearances of a tumor presented in all MRI images should be linked and considered. In image processing, a closed area can be seen as an object and based on the similarity of its interior shadings, the object's centroid can be estimated. Unfortunately, although an object's centroid may be calculated even there exists slightly different shadings which are still considered as having similarity inside the closed shape of the object, only a small hole can cause deviation of computed centroid from its expected position. Since the typical thresholding techniques still leave a hole whose area has a certain amount of different shading from the major shading of the object's area. Thus, we proposed a number of image processing techniques for the purpose of tumor area approximation. Moreover, the proposed methods include a correspondence technique would also support multiple-object detection and linking centroids of the same object, which is a brain tumor in this case, presented in a pair of contiguous images.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"36 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85487914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Separation of occluded leaves using direction field 利用方向场分离被遮挡的叶片
Nicha Piemkaroonwong, U. Watchareeruetai
This paper proposes a method that separates the region of each leaf from an image of occluded leaves and produces a set of single-leaf images as an output. To identify the region of a single leaf, intersection points and direction field are required. An intersection point, which is defined as a concave point between leaves, is used as the starting position of leaf estimation process. Direction field, which describes the average direction of edges in a local area, is used to guide the estimation process. Leaf separation process applies the result of leaf estimation process to create an output. Experimental results show that 71.23% of testing leaf images were correctly separated from each other with a segmentation accuracy of 88.80%.
本文提出了一种将每片叶子的区域从被遮挡的叶子图像中分离出来,并产生一组单叶图像作为输出的方法。为了识别单叶的区域,需要交点和方向场。将叶片间的凹点定义为交点,作为叶片估计过程的起始位置。方向场描述了局部区域内边缘的平均方向,用来指导估计过程。叶片分离过程应用叶片估计过程的结果来创建输出。实验结果表明,71.23%的测试叶片图像被正确分离,分割精度为88.80%。
{"title":"Separation of occluded leaves using direction field","authors":"Nicha Piemkaroonwong, U. Watchareeruetai","doi":"10.1109/JCSSE.2017.8025929","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025929","url":null,"abstract":"This paper proposes a method that separates the region of each leaf from an image of occluded leaves and produces a set of single-leaf images as an output. To identify the region of a single leaf, intersection points and direction field are required. An intersection point, which is defined as a concave point between leaves, is used as the starting position of leaf estimation process. Direction field, which describes the average direction of edges in a local area, is used to guide the estimation process. Leaf separation process applies the result of leaf estimation process to create an output. Experimental results show that 71.23% of testing leaf images were correctly separated from each other with a segmentation accuracy of 88.80%.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"143 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78589159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed consensus-based Sybil nodes detection in VANETs VANETs中基于共识的Sybil节点检测
Chea Sowattana, Wantanee Viriyasitavat, A. Khurat
Vehicular Ad-hoc Networks (VANETs) is a research area focusing on improving road safety and traffic management. However, VANETs are still vulnerable to different kind of security attacks due to its infrastructure-less networking. Sybil Attack is a well-known attack in VANET. It forges multiple nodes with different identities to broadcast fake messages to manipulate the road traffic and information. In this paper, we propose a distributed detection mechanism using the neighborhood information. In our approach, a node is considered as a Sybil node if its position is inside the intersected area of two communication nodes, but it does not acknowledge by one of them. Each vehicle exchanges the information of their neighbors periodically via beacon message. The received neighbor information, from each neighbor, will be used to vote on each of the receiver node's neighbor whether they are Sybil. Simulation on different test cases are performed to observe the performance of our algorithm in term of its detection rate and false positive rate. The result depicts the increase of detection rate in the scenario where the number of surrounding neighbors is high.
车辆自组织网络(Vehicular Ad-hoc Networks, VANETs)是一个致力于改善道路安全和交通管理的研究领域。然而,由于其无基础设施的网络,VANETs仍然容易受到各种安全攻击。西比尔攻击在VANET是一个众所周知的攻击。它通过伪造多个具有不同身份的节点来广播虚假消息,从而操纵道路交通和信息。本文提出了一种基于邻域信息的分布式检测机制。在我们的方法中,如果一个节点的位置在两个通信节点的相交区域内,但它不被其中一个通信节点承认,则将其视为Sybil节点。每辆车通过信标信息定期交换其邻居的信息。从每个邻居接收到的邻居信息将用于对每个接收节点的邻居是否为Sybil进行投票。在不同的测试用例上进行了仿真,观察了算法在检测率和误报率方面的性能。结果描述了在周边邻居数量较多的情况下,检测率的提高。
{"title":"Distributed consensus-based Sybil nodes detection in VANETs","authors":"Chea Sowattana, Wantanee Viriyasitavat, A. Khurat","doi":"10.1109/JCSSE.2017.8025908","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025908","url":null,"abstract":"Vehicular Ad-hoc Networks (VANETs) is a research area focusing on improving road safety and traffic management. However, VANETs are still vulnerable to different kind of security attacks due to its infrastructure-less networking. Sybil Attack is a well-known attack in VANET. It forges multiple nodes with different identities to broadcast fake messages to manipulate the road traffic and information. In this paper, we propose a distributed detection mechanism using the neighborhood information. In our approach, a node is considered as a Sybil node if its position is inside the intersected area of two communication nodes, but it does not acknowledge by one of them. Each vehicle exchanges the information of their neighbors periodically via beacon message. The received neighbor information, from each neighbor, will be used to vote on each of the receiver node's neighbor whether they are Sybil. Simulation on different test cases are performed to observe the performance of our algorithm in term of its detection rate and false positive rate. The result depicts the increase of detection rate in the scenario where the number of surrounding neighbors is high.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84199587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1