2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)最新文献

筛选
英文 中文
Boosting performance of face detection by using an efficient skin segmentation algorithm 利用高效的皮肤分割算法提高人脸检测性能
M. Mahmoodi, S. Sayedi
{"title":"Boosting performance of face detection by using an efficient skin segmentation algorithm","authors":"M. Mahmoodi, S. Sayedi","doi":"10.1109/ICITEED.2014.7007899","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007899","url":null,"abstract":"Skin detection plays a very essential role in many image processing applications such as face localization, face recognition, gesture recognition and human identification. A robust pre-processing skin detection algorithm can significantly increase the performance of an application in both terms of speed and accuracy. Skin segmentation is often computationally simple, though in many conditions, uneven and nonlinear illumination degrades its performance. Recently, many methods have been proposed to solve the problem, yet most of them are not applicable in different conditions and disparate illuminations. This paper proposes an algorithm which employs not only a pixel-based processing, but also an additional neighbor-based and region-based processing. This enhances the output of the algorithm. Also a novel method in which the YCbCr image is converted to a ternary image by means of a set of decisive rules is employed. In a further processing stage, a region-based algorithm is used to decide with a high certainly on the pixels which are not skin. Results demonstrate that the proposed algorithm is robust and capable of detecting skin windows comparable with state of the art algorithms.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Frequency dependent model of underground cables for harmonic calculations in frequency domain 地下电缆频域谐波计算的频率依赖模型
K. Malekian, U. Schmidt, Abudllah Hoshmeh, A. Shirvani
{"title":"Frequency dependent model of underground cables for harmonic calculations in frequency domain","authors":"K. Malekian, U. Schmidt, Abudllah Hoshmeh, A. Shirvani","doi":"10.1109/ICITEED.2014.7007938","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007938","url":null,"abstract":"Modeling underground cables for application in harmonic calculations in frequency domain is discussed thoroughly in this paper. At first, equations and frequency-dependent parameters to describe the zero-, negative-, and positive-sequence cable impedances as well as the coupling between them are presented. Afterwards, the influence of cable arrangement on the zero-, negative-, and positive-sequence cable impedances is investigated over the frequency. In this regard, some representative cable systems with different arrangements are simulated. Physical interpretation of the simulation results for the different cable arrangements contributes to comprehend the behavior of underground cables over the frequency in zero, negative, and positive sequences. Subsequently, based on the findings, modeling underground cables for harmonic calculations in the frequency domain is discussed. Finally, the validity of the proposed model is proved by comparing the simulation results with measurements on a medium voltage cable.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126505770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance of Repeat-Accumulate Codes (RAC) for decode-and-forward wireless relay channel 解码转发无线中继信道中重复累加码(RAC)的性能
Daryus Chandra, A. Susanto, S. Kusumawardani
{"title":"Performance of Repeat-Accumulate Codes (RAC) for decode-and-forward wireless relay channel","authors":"Daryus Chandra, A. Susanto, S. Kusumawardani","doi":"10.1109/ICITEED.2014.7007928","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007928","url":null,"abstract":"Repeat-Accumulate Codes (RAC) are one of alternative choice code besides turbo codes and low-density parity-check (LDPC) codes. This paper presented decode-and-forward protocol for wireless relay channel by utilizing repeat-accumulate codes as the coding scheme in the relay. The main advantages of the RAC over another code that makes the RAC is more considered for this research are the complexity of encoding is linear in the code length, have a simpler design, and easier to combine with modulator or detector. Simplicity is the main factor for using RAC in this research because in the multihop wireless communication concept, the information processing that occurs in every node or in every relay should not be complicated. In this paper, RAC is employed in wireless relay channel for the LOS model and urban model. The result shows that in the LOS model, RAC only show BER improvement when the relay position is exactly in the mid between information source (S) and destination (D). In urban channel model, the BER improvement can be observed, whether the relay is positioned ¼, ½ or ¾ between the information source (S) and the destination (D).","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133420184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Benchmarking of feature selection techniques for coronary artery disease diagnosis 冠状动脉疾病诊断特征选择技术的标杆分析
N. A. Setiawan, D. W. Prabowo, H. A. Nugroho
{"title":"Benchmarking of feature selection techniques for coronary artery disease diagnosis","authors":"N. A. Setiawan, D. W. Prabowo, H. A. Nugroho","doi":"10.1109/ICITEED.2014.7007898","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007898","url":null,"abstract":"Coronary artery disease (CAD) is a disease that causes many deaths in human. CAD occurs when the atherosclerosis (fatty deposits) blocks blood flow to the heart muscle in the coronary arteries. The gold standard method to diagnose CAD is coronary angiography. However, this method is invasive, risky and costly. Therefore, it is necessary to develop a method for diagnosing the CAD before coronary angiography is performed. The objective of this research is to provide a benchmark comparison of the feature selection techniques in the diagnosis of CAD. A total of four feature selection methods are used. These methods are motivated feature selection (MFS), correlation based feature selection (CFS), wrapper based feature selection (WFS) and rough set based feature selection (RST). The Naïve Bayes and J48 classifiers are used to diagnose the presence of CAD. The result shows that WFS and CFS are superior compared to MFS and RST.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Dynamic CFO reduction in various mobilities based on extended Kalman filter for broadband wireless access technology 基于扩展卡尔曼滤波的宽带无线接入技术中各种移动的动态CFO缩减
Asri Diliyanzah, R. P. Astuti, Budi Syihabuddin
{"title":"Dynamic CFO reduction in various mobilities based on extended Kalman filter for broadband wireless access technology","authors":"Asri Diliyanzah, R. P. Astuti, Budi Syihabuddin","doi":"10.1109/ICITEED.2014.7007921","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007921","url":null,"abstract":"Alteration of user's speed and direction to the base station cause Carrier Frequency Offset (CFO). CFO is able to damage orthogonality among subcarriers and decrease system performance significantly. There are several researches already focused on ICI mitigation, however most of them only employed restricted inputs for CFO in order to generate Inter Carrier Interference (ICI). This research proposes modified dynamic CFO resulted from Doppler shift and oscillator accuracy tolerance. The CFO value takes user's velocity and random user's direction as well as involving oscillator instability. The main purpose of this research is to reduce CFO in dynamic propagation nature in various users' velocities using Extended Kalman Filter (EKF) method. The result showed that those dynamic CFO values can be reduced using EKF method and thereby enhance OFDM system performance, in this case Mobile WiMAX 802.16e. Besides, this proposed system has the adaptability upon different CFO values by adjusting better improvement for higher speed and worse oscillator's quality.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of embedded gateway for Wireless Sensor Network and Internet Protocol interoperability 无线传感器网络嵌入式网关的开发与互联网协议互操作性
S. Wibowo, Guntur Dharma Putra, B. Hantono
{"title":"Development of embedded gateway for Wireless Sensor Network and Internet Protocol interoperability","authors":"S. Wibowo, Guntur Dharma Putra, B. Hantono","doi":"10.1109/ICITEED.2014.7007920","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007920","url":null,"abstract":"Wireless Sensor Network (WSN) usage for buildings and household has been increasingly popular because it offers various benefits, such as home automation and home surveillance. Therefore, in order to increase WSN usage flexibility, remote controlling which enables remote administration is required. In fact, generally WSN is controlled by a coordinator (sink node) that is located closely to the WSN area itself. By utilizing iterative development, which is suitable for main and supporting application development with several iterations, this research proposes WSN and Internet Protocol (IP) interoperability that enables remote controlling and managing through Internet. Eventually, this research creates a web-based application which will be implemented to a wireless Access Point (AP) for easier WSN remote controlling. Furthermore, it could accommodate WSN from various vendors by software only solution.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129432179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
FSS-based planar bandpass filter using strip slotted-lines 基于fss的平面带状开槽带通滤波器
Eric Simbolon, A. Munir
{"title":"FSS-based planar bandpass filter using strip slotted-lines","authors":"Eric Simbolon, A. Munir","doi":"10.1109/ICITEED.2014.7007924","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007924","url":null,"abstract":"In this paper, a planar bandpass filter which is developed based on frequency selective surfaces (FSS) is proposed to be designed numerically and experimentally. Two basic patterns of FSS unit cells are posed to be established by using strip slotted-line which have asymmetric and symmetric structures, namely hexapole and octapole slotted-lines. The geometry parameter of strip slotted line in each unit cell is varied to analyze its impact to the resonant frequency shift and the characteristic response. After obtaining desired performances, the final design is then built up by constructing 10 × 10 unit cells for each structure. From numerical characterization results, it shows that the structure with hexapole slotted-line unit cell has resonant frequency of 2.46GHz with S11 value of -10.76dB and S12 value of -3.92dB, while the structure with octapole slotted-line unit cell has resonant frequency of 2.38GHz with S11 and S12 values of -19.04dB and -3.17dB, respectively. In addition, a hardware realization is also investigated for experimental characterization.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126048692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Emoticon-based steganography for securing sensitive data 基于表情符号的隐写术,用于保护敏感数据
T. Ahmad, Gregory Sukanto, H. Studiawan, W. Wibisono, R. Ijtihadie
{"title":"Emoticon-based steganography for securing sensitive data","authors":"T. Ahmad, Gregory Sukanto, H. Studiawan, W. Wibisono, R. Ijtihadie","doi":"10.1109/ICITEED.2014.7007904","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007904","url":null,"abstract":"Transferring information between nodes in this digital era has been made it easy for users to communicate. Sensitive data, however, requires protection during transmission to prevent unauthorized users from exploiting it. In this paper, we propose to hide secret data by developing emoticon-based steganography. Here, the data is embedded to the emoticon which is sent along with the cover text via chatting. The experimental result, which is obtained from various types of data, depicts that this proposed method, in general, has higher performance than that of existing one. That is, each emoticon has been able to dynamically hold more information. Specifically, the method without preprocessing is better.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A hybrid technique for enhancement of Periductal fibrosis ultrasound images for Cholangiocacinoma surveillance 一种用于胆管癌监测的导管周围纤维化超声图像增强的混合技术
P. Wayalun, Saiyan Saiyod, N. Chamadol
{"title":"A hybrid technique for enhancement of Periductal fibrosis ultrasound images for Cholangiocacinoma surveillance","authors":"P. Wayalun, Saiyan Saiyod, N. Chamadol","doi":"10.1109/ICITEED.2014.7006989","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7006989","url":null,"abstract":"The Cholangiocarcinoma (CCA) is the most common in northeast Thailand that is second most common worldwide. The Periductal fibrosis (PDF) ultrasound images can be applied for the CCA surveillance system which increased patient in endemic area of Opisthorchis viverrini (OV). However, the ultrasound images are lack of contrast and a lot of speckle noise. This paper presented the enhanced algorithm of PDF ultrasound images (EPDF) for the CCA surveillance system in which consist of the Histogram equalization (HE), Speckle reduction method, and Anisotropic diffusion. Firstly, the HE method performed to improve the lack of contrast of the PDF ultrasound images. Then, the speckle reduction method performed to reduce the speckle noise and preserving the edge in the PDF ultrasound images. Finally, the Anisotropic diffusion performed to smooth region in the PDF ultrasound images. The data set in the experimental studies consist of 30 pictures. The performance of the EPDF algorithm from the experimental results gave the best for the CCA surveillance. A successful percentage of the EPDF system achieved at 80.36%. Thus, the EPDF system has the potential to increase the performance for enhancing the PDF in ultrasound images for CCA surveillance system.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Calories analysis of food intake using image recognition 使用图像识别分析食物摄入的卡路里
Natta Tammachat, N. Pantuwong
{"title":"Calories analysis of food intake using image recognition","authors":"Natta Tammachat, N. Pantuwong","doi":"10.1109/ICITEED.2014.7007901","DOIUrl":"https://doi.org/10.1109/ICITEED.2014.7007901","url":null,"abstract":"In recent year, healthy is a topic that people concern. It is obviously that eating the food with high amount of calories cause several problems to our health. Recording the amount of calories of the food intake in each meal is one of the stretchy to solve such problem. Although the people can record their meal and discuss with doctors or experts, it is not so convenient and they cannot know the amount of calories before the meal. This paper presents a technique of image processing to recognize images of food taken by users. From the input food images, the users can understand the amount of calories they will take in each meal by using the proposed algorithm. Our method creates feature vector using several features about texture and color, then classify the food images using SVM. In this study, we focused on Thai food. To train the SVM, we group the example food images by food type and the amount of calories. We conduct the experiment to evaluate the performance of the proposed algorithm for both groups of example food.","PeriodicalId":148115,"journal":{"name":"2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE)","volume":"9 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信