{"title":"Non-Lambertian Surfaces and Their Challenges for Visual SLAM","authors":"Sara Pyykölä;Niclas Joswig;Laura Ruotsalainen","doi":"10.1109/OJCS.2024.3419832","DOIUrl":"10.1109/OJCS.2024.3419832","url":null,"abstract":"Non-Lambertian surfaces are special surfaces that can cause specific type of reflectances called specularities, which pose a potential issue in industrial SLAM. This article reviews fundamental surface reflectance models, modern state-of-the-art computer vision algorithms and two public datasets, KITTI and DiLiGenT, related to non-Lambertian surfaces' research. A new dataset, SPINS, is presented for the purpose of studying non-Lambertian surfaces in navigation and an empirical performance evaluation with ResNeXt-101-WSL, ORB SLAM 3 and TartanVO is performed on the data. The article concludes with discussion about the results of empirical evaluation and the findings of the survey.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"430-445"},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10574359","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141503708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remya S;Anjali T;Abhishek S;Somula Ramasubbareddy;Yongyun Cho
{"title":"The Power of Vision Transformers and Acoustic Sensors for Cotton Pest Detection","authors":"Remya S;Anjali T;Abhishek S;Somula Ramasubbareddy;Yongyun Cho","doi":"10.1109/OJCS.2024.3419027","DOIUrl":"10.1109/OJCS.2024.3419027","url":null,"abstract":"Whitefly infestations have posed a severe threats to cotton crops in recent years, affecting farmers globally. These little insects consume food on cotton plants, causing leaf damage and lower crop yields. In response to this agricultural dilemma, we developed a novel method for detecting whitefly infestations in cotton fields. To improve pest detection accuracy, we use the combined efficiency of visual transformers and low-cost acoustic sensors. We train the vision transformer with a large dataset of cotton fields with and without whitefly infestations. Our studies yielded encouraging results, with the vision transformer obtaining an amazing 99% accuracy. Surprisingly, this high degree of accuracy is reached after only 10-20 training epochs, outperforming benchmark approaches, which normally give accuracies ranging from 80% to 90%. These outcomes underline the cost-effective potential of the vision transformer in detecting whitefly attacks on cotton crops. Moreover, the successful integration of acoustic sensors and vision transformers opens doors for further research and advancements in the domain of cotton pest detection, promising more robust and efficient solutions for farmers facing the challenges of whitefly infestations.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"356-367"},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10571347","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141503709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suman Majumder;Sangram Ray;Dipanwita Sadhukhan;Mou Dasgupta;Ashok Kumar Das;Youngho Park
{"title":"ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment","authors":"Suman Majumder;Sangram Ray;Dipanwita Sadhukhan;Mou Dasgupta;Ashok Kumar Das;Youngho Park","doi":"10.1109/OJCS.2024.3406142","DOIUrl":"https://doi.org/10.1109/OJCS.2024.3406142","url":null,"abstract":"Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the Internet of Things (IoT) network due to its autonomous data collection as well as transfer incurring low costs. To overcome the insecure exchange of tracking data and to prevent unauthorized access, parallel dependency RFID grouping-proof protocol is applied by the reader to authenticate tags simultaneously. However, conventional grouping-proof authentication schemes are not sufficient for the memory constraint RFID tags due to the recurrent utilization of a 128-bit PRNG (Pseudo Random Number Generator) function. Alternatively, the existing parallel-dependency grouping-proof schemes are not able to overcome numerous limitations regarding session establishment, efficient key management, and multicast message communication within the specified group. In this research, a lightweight, secure, and efficient communication protocol is proposed to overcome the aforementioned limitations using Elliptic Curve Cryptography (ECC) and Zero-Knowledge property to establish a session key among the participated tags, reader, and remote server. The proposed scheme can work in offline mode. The proposed ECC-based parallel dependency grouping-proof scheme is referred to as ECC-PDGPP which abides by the rules of the EPC class-1 gen-2 (C1 G2) standard of RFID tags. Finally, the proposed protocol is analyzed using a formal random oracle model and simulated using a well-known AVISPA simulation tool that shows the proposed scheme is well protected against all potential security threats.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"329-342"},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10547007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Rules Mining Algorithm for Combinatorially Exploded Decision Trees With Modified Aitchison-Aitken Function-Based Bayesian Optimization","authors":"Yuto Omae;Masaya Mori;Yohei Kakimoto","doi":"10.1109/OJCS.2024.3394928","DOIUrl":"10.1109/OJCS.2024.3394928","url":null,"abstract":"Decision trees offer the benefit of easy interpretation because they allow the classification of input data based on if–then rules. However, as decision trees are constructed by an algorithm that achieves clear classification with minimum necessary rules, the trees possess the drawback of extracting only minimum rules, even when various latent rules exist in data. Approaches that construct multiple trees using randomly selected feature subsets do exist. However, the number of trees that can be constructed remains at the same scale because the number of feature subsets is a combinatorial explosion. Additionally, when multiple trees are constructed, numerous rules are generated, of which several are untrustworthy and/or highly similar. Therefore, we propose “MAABO-MT” and “GS-MRM” algorithms that strategically construct trees with high estimation performance among all possible trees with small computational complexity and extract only reliable and non-similar rules, respectively. Experiments are conducted using several open datasets to analyze the effectiveness of the proposed method. The results confirm that MAABO-MT can discover reliable rules at a lower computational cost than other methods that rely on randomness. Furthermore, the proposed method is confirmed to provide deeper insights than single decision trees commonly used in previous studies. Therefore, MAABO-MT and GS-MRM can efficiently extract rules from combinatorially exploded decision trees.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"215-226"},"PeriodicalIF":0.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10510571","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Affective Computing and the Road to an Emotionally Intelligent Metaverse","authors":"Farrukh Pervez;Moazzam Shoukat;Muhammad Usama;Moid Sandhu;Siddique Latif;Junaid Qadir","doi":"10.1109/OJCS.2024.3389462","DOIUrl":"10.1109/OJCS.2024.3389462","url":null,"abstract":"The metaverse is currently undergoing a profound transformation, fundamentally reshaping our perception of reality. It has transcended its origins to become an expansion of human consciousness, seamlessly blending the physical and virtual worlds. Amidst this transformative evolution, numerous applications are striving to mould the metaverse into a digital counterpart capable of delivering immersive human-like experiences. These applications envisage a future where users effortlessly traverse between physical and digital dimensions. Taking a step forward, affective computing technologies can be utilised to identify users' emotional cues and convey authentic emotions, enhancing genuine, meaningful, and context-aware interactions in the digital world. In this paper, we explore how integrating emotional intelligence can enhance the traditional metaverse, birthing an emotionally intelligent metaverse (EIM). Our work illuminates the multifaceted potential of EIM across diverse sectors, including healthcare, education, gaming, automotive, customer service, human resources, marketing, and urban metaverse cyberspace. Through our examination of these sectors, we uncover how infusing emotional intelligence enriches user interactions and experiences within the metaverse. Nonetheless, this transformative journey is riddled with challenges, and we address the obstacles hindering the realisation of EIM's full potential. By doing so, we lay the groundwork for future research endeavours aimed at further enhancing and refining the captivating journey into the world of EIM.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"195-214"},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10504882","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140626556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Neighborhood Contexts in Explainable AI: An Explanandum-Based Evaluation","authors":"Urja Pawar;Donna O'Shea;Ruairi O'Reilly;Maebh Costello;Christian Beder","doi":"10.1109/OJCS.2024.3389781","DOIUrl":"10.1109/OJCS.2024.3389781","url":null,"abstract":"Over the years, several frameworks have been proposed in the domain of Explainable AI (XAI), however their practical applicability and utility need to be clarified. The neighbourhood contexts are shown to significantly impact the explanations generated by XAI frameworks, thus directly affecting their utility in addressing specific questions, or “explananda”. This work introduces a methodology that use a comprehensive range of neighbourhood contexts to evaluate and enhance the utility of specific XAI techniques, particularly Feature Importance and CounterFactuals. In this evaluation, two explananda are targeted. The first one examines whether features' collection should be halted as per the AI model based on the sufficiency of the current set of information. Here, the information refers to the features present in the data used to train the AI-based system. The second one explores what is the most effective information (features) that should be collected next to ensure that the AI outputs the same classification as it would have generated with all the information present. These questions serve as a platform to demonstrate our methodology's ability to assess the impact of customised neighbourhood contexts on the utility of XAI.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"181-194"},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10504877","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140626718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Path Loss Prediction Approach Based on Integrated Sensing and Communications for Future Vehicular Networks","authors":"Zixiang Wei;Bomin Mao;Hongzhi Guo;Yijie Xun;Jiajia Liu;Nei Kato","doi":"10.1109/OJCS.2024.3386733","DOIUrl":"10.1109/OJCS.2024.3386733","url":null,"abstract":"The developments of communication technologies, Internet of Things (IoT), and Artificial Intelligence (AI) have significantly accelerated the advancement of Intelligent Transportation Systems (ITS) and Autonomous Driving (AD) in recent years. The exchange of sensed information by widely deployed radars, cameras, and other sensors on vehicles and roadside infrastructure can improve the traffic awareness of drivers and pedestrians. However, wireless data transmission in vehicular networks is challenged by highly dynamic path loss due to utilized frequency bands, weather conditions, traffic overheads, and geographical conditions. In this paper, we propose an Integrated Sensing and Communication System (ISAC) based path loss prediction approach to improve the knowledge of wireless data transmissions in vehicular networks, which utilizes multi-modal data collected by millimeter-wave (mmWave) radars, laser radars, and cameras to forecast the end-to-end path loss distribution. By leveraging a generative adversarial network for parameter initialization coupled with fine-tuning through supervised learning, the model's accuracy can be significantly improved. To increase the model's scalability, the effects of weather conditions, geographical conditions, traffic overheads, and frequency bands are all analyzed. According to the simulation results, our model achieves excellent accuracy with Mean Squared Error (MSE) of the predicted path loss distribution below \u0000<inline-formula><tex-math>$3e^{-3}$</tex-math></inline-formula>\u0000 across five different scenarios.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"170-180"},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10495097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140593286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mir Ali Rezazadeh Baee;Leonie Simpson;Warren Armstrong
{"title":"Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata","authors":"Mir Ali Rezazadeh Baee;Leonie Simpson;Warren Armstrong","doi":"10.1109/OJCS.2024.3386715","DOIUrl":"10.1109/OJCS.2024.3386715","url":null,"abstract":"Large scale enterprise networks often use Enterprise Key-Management (EKM) platforms for unified management of cryptographic keys. In such a system, requests and responses commonly use the Key Management Interoperability Protocol (KMIP) format. The KMIP client and server use Transport Layer Security (TLS) to negotiate a mutually-authenti cated connection. Although KMIP traffic is encrypted, monitoring traffic and usage patterns of EKM Systems (EKMS) may enable detection of anomalous (possibly malicious) activity in the enterprise network that is notdetectable by other means. Metadata analysis of enterprise system traffic has been widely studied (for example at the TLS protocol level). However, KMIP metadata in EKMS has not been used for anomaly detection. In this paper, wepresent a framework for automated outlier rejection and anomaly detection. This involves investigati on of KMIP metadata, determining characteristics to extract for dataset generation, and looking for patt erns from which behaviors can be inferred. For automated labeling and detection, a deep learning-based model is applied to thegenerated datasets: Long Short-Term Memory (LSTM) auto-encoder neural networks with specific parameters. As aproof of concept, we simulated an enterprise environment, collected relevant KMIP metadata, and deployed this framework. Although our implementati on used Quintessence Labs EKMS, the framework we proposed is vendorneutral. The experimental results (Precision, Recall, F1 = 1.0) demonstrate that our framework can accurately detectall anomalous enterprise network activities. This approach could be integrated with other enterprise information toenhance detection capabilities. Our proposal can be used as a general-purpose framework for anomaly detecti on and diagnosis.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"156-169"},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10495152","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140593715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mir Ali Rezazadeh Baee;Leonie Simpson;Warren Armstrong
{"title":"Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework","authors":"Mir Ali Rezazadeh Baee;Leonie Simpson;Warren Armstrong","doi":"10.1109/OJCS.2024.3407547","DOIUrl":"10.1109/OJCS.2024.3407547","url":null,"abstract":"Large scale enterprise networks often use Enterprise Key-Management (EKM) platforms for unified management of cryptographic keys. Monitoring access and usage patterns of EKM Systems (EKMS) may enable detection of anomalous (possibly malicious) activity in the enterprise network that is not detectable by other means. Analysis of enterprise system logs has been widely studied (for example at the operating system level). However, to the best of our knowledge, EKMS metadata has not been used for anomaly detection. In this article we present a framework for anomaly detection based on EKMS metadata. The framework involves automated outlier rejection, normal heuristics collection, automated anomaly detection, and system notification and integration with other security tools. This is developed through investigation of EKMS metadata, determining characteristics to extract for dataset generation, and looking for patterns from which behaviors can be inferred. For automated labeling and detection, a deep learning-based model is applied to the generated datasets: Long Short-Term Memory (LSTM) auto-encoder neural networks with specific parameters. This generates heuristics based on categories of behavior. As a proof of concept, we simulated an enterprise environment, collected the EKMS metadata, and deployed this framework. Our implementation used QuintessenceLabs EKMS. However, the framework is vendor neutral. The results demonstrate that our framework can accurately detect all anomalous enterprise network activities. This approach could be integrated with other enterprise information to enhance detection capabilities. Further, our proposal can be used as a general-purpose framework for anomaly detection and diagnosis.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"315-328"},"PeriodicalIF":0.0,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10542382","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
FARZAM TAJDARI;TOON HUYSMANS;XINHE YAO;JUN XU;MARYAM ZEBARJADI;YU SONG
{"title":"4D Feet: Registering Walking Foot Shapes Using Attention Enhanced Dynamic-Synchronized Graph Convolutional LSTM Network","authors":"FARZAM TAJDARI;TOON HUYSMANS;XINHE YAO;JUN XU;MARYAM ZEBARJADI;YU SONG","doi":"10.1109/OJCS.2024.3406645","DOIUrl":"10.1109/OJCS.2024.3406645","url":null,"abstract":"4D-scans of dynamic deformable human body parts help researchers have a better understanding of spatiotemporal features. However, reconstructing 4D-scans utilizing multiple asynchronous cameras encounters two main challenges: 1) finding dynamic correspondences among different frames captured by each camera at the timestamps of the camera in terms of dynamic feature recognition, and 2) reconstructing 3D-shapes from the combined point clouds captured by different cameras at asynchronous timestamps in terms of multi-view fusion. Here, we introduce a generic framework able to 1) find and align dynamic features in the 3D-scans captured by each camera using the nonrigid-iterative-closest-farthest-points algorithm; 2) synchronize scans captured by asynchronous cameras through a novel ADGC-LSTM-based-network capable of aligning 3D-scans captured by different cameras to the timeline of a specific camera; and 3) register a high-quality template to synchronized scans at each timestamp to form a high-quality 3D-mesh model using a non-rigid registration method. With a newly developed 4D-foot-scanner, we validate the framework and create the first open-access data-set, namely the 4D-feet. It includes 4D-shapes (15 fps) of the right and left feet of 58 participants (116 feet including 5147 3D-frames), covering significant phases of the gait cycle. The results demonstrate the effectiveness of the proposed framework, especially in synchronizing asynchronous 4D-scans.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"343-355"},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10541055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}