2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)最新文献

筛选
英文 中文
Scene text detection based on structural features 基于结构特征的场景文本检测
Khanh-Duy Nguyen, Ngo Duc Thanh
{"title":"Scene text detection based on structural features","authors":"Khanh-Duy Nguyen, Ngo Duc Thanh","doi":"10.1109/IC3INA.2016.7863022","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863022","url":null,"abstract":"While Optical Character Recognition (OCR) can be considered as a solved problem, text detection and recognition in real scene images is still extremely challenging and remains an open problem. Due to the wide variety of text appearances in real scenes, such as variations in font, size, color, orientation, partial occlusions, different distortions and illumination conditions, current results of both detection and recognition are still not satisfactory, as suggested by the low detection rates and recognition rates of state-of-the art approaches. One of the major reasons that degrade text detection and recognition accuracy is the large number of false positive characters, which is hard to handle due to diversity of text appearances in complex background. On the other hand, most of existing approaches do not provide an effective scheme to treat these false positive characters. In this paper, we propose a solution that takes into account the structural features of text strings. We prove these structural properties of text string can help obtain both removing false positive characters effectively and forming text-lines precisely. Experiments on the ICDAR Robust Reading Competition Dataset show a very competitive performance of our proposed approach.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114099446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance comparison of IEEE 802.11n and IEEE 802.11ac IEEE 802.11n和IEEE 802.11ac的性能比较
Adian Fatchur Rochim, R. F. Sari
{"title":"Performance comparison of IEEE 802.11n and IEEE 802.11ac","authors":"Adian Fatchur Rochim, R. F. Sari","doi":"10.1109/IC3INA.2016.7863023","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863023","url":null,"abstract":"This paper provide the performance comparison of the IEEE 802.11n and IEEE 802.11ac Wireless Local Area Network (WLAN). The IEEE 802.11ac protocol currently has been used widely. Network Simulator (NS-3) is used to simulate it. The advantages of the research using Network Simulator are shorter time to explore, low cost and flexibility on scenario developed. Our project analyzes and compares the 802.11ac and the 802.11n protocols. The goal of our project is to compare throughput between the IEEE 802.11 and IEEE 802.11ac using variety of Spatial Streams (SS), data rates and number of client. The parameters variation i.e. the number of clients, the index of the Modulation and Coding Set (MCS), load rates, Spatial Streams (SS) at the 802.11n (High Throughput MCS) (HtMcs) and the 802.11ac Very High Throughput MCS (VhtMcs). Result show that the throughput of the IEEE 802.11n is same as that of the IEEE 802.11ac in a bandwidth of 40 MHz, with a client and spatial streams of 1–4. Moreover, The throughput of the 802.11ac is higher than that of the IEEE 802.11n in the bandwidth of 40 MHz, and 2 clients (1–4SS).","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of projection optimization in compressive sensing framework into reconstruction performance 压缩感知框架下投影优化对重构性能的影响分析
Nur Afny C. Andryani, D. Sudiana, D. Gunawan
{"title":"Analysis of projection optimization in compressive sensing framework into reconstruction performance","authors":"Nur Afny C. Andryani, D. Sudiana, D. Gunawan","doi":"10.1109/IC3INA.2016.7863035","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863035","url":null,"abstract":"Compressive Sensing (CS), which is firmly mathematically formulated by Danoho D, Candes E, Romberg J, and Tao T, is much developed especially for sensing and signal reconstruction. Its advantage framework on reducing number of measurement data while maintaining the performance of reconstruction quality, makes many researchers concern on developing the compressive sensing performance. The main parameters in CS are projection matrix and sparse base representation (dictionary). Subject to Restricted Isometric Property, the more incoherence between projection matrix and the dictionary, the more precise the signal reconstruction. Thus, a number of fundamental researches regarding projection optimization to optimize the incoherence between projection matrix and the dictionary have been developed. This paper elaborate the analysis of projection optimization's impact into reconstruction performance on signal with random and structured projection matrix. The simulations show that the projection optimization does not always imply better reconstruction especially for signal reconstruction with structured projection matrix.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123305516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spatial co-location pattern discovery using multiple neighborhood relationship function 基于多邻域关系函数的空间共位模式发现
E. Piantari, Saiful Akbar
{"title":"Spatial co-location pattern discovery using multiple neighborhood relationship function","authors":"E. Piantari, Saiful Akbar","doi":"10.1109/IC3INA.2016.7863028","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863028","url":null,"abstract":"Co-location pattern discovery is a process to find a subset of Boolean spatial feature that is frequently located in the same geographic area. There are some approaches have used for this process. Mostly co-location mining discovery has been done for point type and the feature has the same domain. But in reality spatial data has three types, which are point, line, and polygon. In this paper, we tried to discover spatial co-location pattern that involves three types of data spatial from a different domain. We propose multiple neighborhood relationship function to find neighborhood relation from the multiple types and multiples domains of data spatial and apply co-location mining with join less approach to find co-location pattern. The evaluation of our proposed method that using real data shows that multiple neighborhood relationship function is needed to extract the correct and complete spatial relationship to the data that have expansion of the data types and heterogeneous data source.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131785271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational optimization for violent scenes detection 暴力场景检测的计算优化
Vu Lam, Sang Phan Le, Tien Do, T. Ngo, Duy-Dinh Le, D. Duong
{"title":"Computational optimization for violent scenes detection","authors":"Vu Lam, Sang Phan Le, Tien Do, T. Ngo, Duy-Dinh Le, D. Duong","doi":"10.1109/IC3INA.2016.7863039","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863039","url":null,"abstract":"Violent scenes detection (VSD) can be considered as a specific problem of multimedia event detection. One popular approach to this problem is to employ multiple modals for presentation. By combining complementary modals, it has been shown remarkable improvement in accuracy. But, such an approach also requires high computational cost to process all features globally and locally extracted from static frames, video sequences, audio streams, or deep visual features. In this paper, we address the problem of modal selection (i.e. feature selection) when the computing resource (including both CPU and GPU) is limited. We evaluated possible combinations of features with different specifications of the computing resource. Evaluation results can be used to choose the optimal set of features for high accuracy regarding a pre-selected resource. We conducted experiments on the benchmark dataset MedialEval VSD 2014 (total of 60 hours).","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart dog feeder design using wireless communication, MQTT and Android client 智能喂狗器设计采用无线通信、MQTT和Android客户端
Vania, K. Karyono, I. Nugroho
{"title":"Smart dog feeder design using wireless communication, MQTT and Android client","authors":"Vania, K. Karyono, I. Nugroho","doi":"10.1109/IC3INA.2016.7863048","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863048","url":null,"abstract":"Regular feeding is one of the problems in dog's maintenance. Owners often forget to feed their pets because of their work. Smart Dog Feeder is the answer to these problems. This device can provide regular feeding without disrupting owner's work. Owners can monitor feeding process with their Android smartphone virtually. Smart Dog Feeder can give authentication with RFID, set feeding time and portion per serving through Android smartphone, send feeding report (eaten or partially eaten), and dog arrival when the feeding time has arrived. Every setting about feeding time, portion, stock and waiting time will be set on Android with minimum requirement of Jelly Bean version, SDK 18 and has been installed with Appliance Hub application. Smart Dog Feeder has stock information, feed schedule, waiting time and owner's name from server uses MQTT protocol. All information will be sent in JSON format and will be processed by Smart Dog Feeder, Android and server. Smart Dog Feeder will save the schedule and set RTC alarm which will interrupt when the feed time has arrived. Authentication process is done by checking RFID tag which is attached on dog collar. Food will be served based on user's setting and be measured by load cell. Experiment is done by seeing punctuality, portion congruence, delivery of settings and notification within devices. The result of experiment is Smart Dog Feeder can receive messages from server and do feeding at the right time. Next development can be done by adding other devices in Appliance Hub system.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"71 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115638698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Strengthening the security of critical data in cyberspace, a policy review 加强网络空间关键数据安全,一项政策审查
Ahmad Budi Setiawan, A. S. Sastrosubroto
{"title":"Strengthening the security of critical data in cyberspace, a policy review","authors":"Ahmad Budi Setiawan, A. S. Sastrosubroto","doi":"10.1109/IC3INA.2016.7863047","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863047","url":null,"abstract":"Securing critical data in cyberspace against growing and evolving cyber threats requires a layered approach. It involves strategy, regulations and also policies. Cyberspace is composed of hundreds of thousands of interconnected computers, servers, etc that allow critical infrastructures and data to work. The National Strategy to secure cyberspace is part of our overall effort to protect the Nation. Strengthening the security of critical data in cyberspace aims to protect basic interests of nation-states is related to the three aspects of cyber security, which are confidentiality, integrity and availability. The foundation for the government's cyber security requires assigning clear and unambiguous authority and responsibility for security, holding officials accountable for fulfilling those responsibilities, and integrating security requirements into policies and regulations. Since disruption to the sovereignty of critical data will impact to the economy, then cyberspace security should become the spirit for all Information and Communication Technology (ICT) policies and regulations. This study reviews the Indonesian Government's policies for strengthening crititical data sovereignty and proposes initial recommendation for securing National critical data in cyberspace. It is shown that many cyber security policies and regulations are not properly implemented and enforced yet. This include the fact that even the regulation to store critical data in country, is not implemented yet, raising questions on the awareness of cyber security in Indonesia. The study also include recommendations for necessary actions as well as further studies required.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Heart rate prediction based on cycling cadence using feedforward neural network 基于循环节奏的前馈神经网络心率预测
K. Mutijarsa, M. Ichwan, Dina Budhi Utami
{"title":"Heart rate prediction based on cycling cadence using feedforward neural network","authors":"K. Mutijarsa, M. Ichwan, Dina Budhi Utami","doi":"10.1109/IC3INA.2016.7863026","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863026","url":null,"abstract":"It is important to monitor heart rate during cycling. By monitoring heart rate during cycling, cyclists can control the cycling session such as cycling cadence to determine the intensity of exercise. By controlling the intensity of cycling, cyclists can avoid the risks of over training and heart attack. Exercise intensity can be measured by heart rate of cyclist. The heart rate can be measured by wearable sensor. But there are data that are not recorded by the sensor at a regular time for example, one second, two seconds, etc. So we need a prediction model of heart rate to complete the missing data. The purpose of this study is to create a predictive model for heart rate based on cycling cadence using Feedforward Neural Network. The inputs are heart rate (HRt) and cadence (cadt) on the second. The output is the predictive value of heart rate on the next second (HRt+1). Feedforward Neural Network is used as a mathematical model of the relationship between heart rate and cycling cadence. The prediction model was trained using 10000 data of cyclist number 1 in a cycling session. The test data use dataset of 6 cyclists. Experiments show that the prediction model generates the predictive value of heart rate that is close to the value of heart rate measured by the sensor. The error of training data is 2.43 while the average error of test data is 3.02.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129149547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Circle detection based on hough transform and Mexican Hat filter 基于霍夫变换和墨西哥帽滤波的圆检测
Nova Hadi Lestriandoko, Rifki Sadikin
{"title":"Circle detection based on hough transform and Mexican Hat filter","authors":"Nova Hadi Lestriandoko, Rifki Sadikin","doi":"10.1109/IC3INA.2016.7863041","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863041","url":null,"abstract":"Circles detection is an important part of object recognition in image processing and computer vision. In this paper, we propose an adaptive method based on Hough transform to detect the circle shapes in digital image. The Mexican Hat filter derived from edge filter is used to concentrate the peaks of Hough local maxima. So, the circle center and its radius can be extracted easily and accurate. The comparison of adaptive method and traditional Hough transform will be analyzed. Experimental results over several digital images with varying ranges of complexity showed the efficiency of proposed method that more efficient than traditional Hough transform. Finally, The development of circles detection is still needed to get the best results, especially for circles shape with any noise.","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128610462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Extending XQuery evaluation in parallel and distributed environment 在并行和分布式环境中扩展XQuery求值
Andria Arisal
{"title":"Extending XQuery evaluation in parallel and distributed environment","authors":"Andria Arisal","doi":"10.1109/IC3INA.2016.7863053","DOIUrl":"https://doi.org/10.1109/IC3INA.2016.7863053","url":null,"abstract":"XML has been evolved from being used for data representation to a structured document format. It has also grown in size from several bytes of small number of files to giga-or terabytes of size with millions of files. XML databases have been developed to efficiently store XML documents with XQuery as querying language from XML documents. However, they have difficulties in dealing with huge number of files and larger space, while most of XML database systems are implemented as centralized systems. Therefore, we explore possibilities to utilize distributed and parallel computing architecture in order to improve its performance. This paper describes directions and simple attempts to take advantage of distributed and parallel computing architecture by extending XQuery processor facilities. Attempts is carried out in an emerging native XML database (BaseX [1]).","PeriodicalId":225675,"journal":{"name":"2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114575685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信