{"title":"Study of Contactless Finger-Vein Identification System","authors":"Chih-Hsien Hsia, Hong-Jyun Wang, Zihua Yang","doi":"10.1109/ICKII55100.2022.9983581","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983581","url":null,"abstract":"A deep learning-based finger-vein identification system is introduced to detect fingers’ rotational and translational movements as well as interference from external lights. In addition, the effects of multiple preprocessing methods and the system’s effectiveness are investigated. The results demonstrate that the proposed system’s higher identification accuracy is 98.1 % for the SDUMLA-HMT public database. Finally, the system’s high accuracy and stability, and contactless applications indicate its practicality in midst of the COVID-19 pandemic.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128214492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel and Efficient Global Maximum Power Extracting Algorithm for Rapidly Varying and Partial Shading Conditions","authors":"S. Wang, Song-Pei Ye, Yi-Hua Liu","doi":"10.1109/ICKII55100.2022.9983599","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983599","url":null,"abstract":"This paper describes a novel two-phase-based global maximal power point (GMPP) tracking (GMPPT) technique to achieve GMPP harvest effectively. During the previous phase, the working voltage (WV) approaching the maximal power point (MPP) under various partial shading (PS) conditions (PSCs) is estimated by conducting wide-ranging simulations, the perturb-and-observe (P&O) with an alpha scaling factor (AF-P&O) algorithm, during the second phase, takes over the next searching from the obtained WV to fast and accurately manipulate the operating point at the GMPP. A prototype of 600 W MPPT system has been constructed. Simulations are done to authenticate theoretical analysis of the proposed GMPP tracker. Compared with the previous deterministic cuckoo searching method, the simulation results in all 120 PS scenarios with non-repeatable irradiance show that the average improvements in different tracking performance evaluation indexes were better than the prior counterpart.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132986526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning-Based Named Entity Recognition and Knowledge Graph for Accidents of Commercial Bank","authors":"Wenhao Kang, C. Cheung","doi":"10.1109/ICKII55100.2022.9983563","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983563","url":null,"abstract":"With the diversified development of business, the construction of the banking system has become increasingly complex, which is prone to accidents. Since system accidents are the result of the combined action of various risk factors, accident management requires comprehensive knowledge support. Although bank accident management has accumulated a large amount of data, there is still a lack of effective solutions to obtain the required knowledge from big data quickly and accurately when faced with a specific accident. To solve the above problems, we developed bank accident management from the perspective of knowledge support to introduce relevant methods and technologies in the field of artificial intelligence. Then, accident management based on named entity recognition and knowledge graph can be developed. The entity annotation corpus in banking accidents is constructed. For the context of each bank accident, key information (four types of entities: time, accident name, loss amount, and reason) is automatically extracted by the BERT-BiLSTM-CRF model. Various entities and relational knowledge elements in the knowledge graph are retained in the graph database Neo4j to form a knowledge graph in the field of banking accidents. We provide important references for the bank's accident analysis, cause investigation, resource allocation, and management decision-making.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125030105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of Sound Direction and Distance on Immersive Experience in VR Gaming","authors":"M. Huang, Chien-Wen Cheng","doi":"10.1109/ICKII55100.2022.9983604","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983604","url":null,"abstract":"Audio is an indispensable and emotion-guiding factor in horror-themed virtual reality games as it enhances the sense of immersion in the gameplay. We establish an enclosed environment in the shape of a corridor and modules such as windows, door frames, and broken parts in the upper, lower, left, and right sides of the space. All the externally visible environments are placed into black shadows to create a virtual environment within the room except the enclosed corridor. The game plot includes flashing lights and grisly characters that appear intermittently to induce the horror experience. Herein, under the same visual and plot settings, game audio processing (for the test group) is enhanced by the sound direction, distance of character actions, and distance to the player. The system is compared with the game audio processing (for the control group) that does not consider sound direction and distance to explore whether these factors can effectively guide and enhance players’ immersion in the horror game environment.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127995641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Platform for Distance Contest During COVID-19 Pandemic","authors":"Tsu-En Hsueh, Min-Xiou Chen, Wei-Che Chien","doi":"10.1109/ICKII55100.2022.9983562","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983562","url":null,"abstract":"Under the influence of the epidemic, many meetings or works have been changed to remote, and lots of competitions have been postponed or even suspended. Nowadays, few platforms replace physical competition in distance. Therefore, we provide and implement a platform for tug-of-war using strandbeest, enabling contestants from two places apart to compete at the same or different times. We create the strandbeest tug-of-war platform via the development board, database system, and backend logic. The uniqueness of the mac address of the development board and the current time of the round filter the strandbeests’ tension data and take the arithmetic average. After both contestants finish the round, the system compares the score of each contestant. The arithmetic average of the filtered tension data from the strandbeest is made to decide who the winner is. The maximum number of tension data is shown to be read and sent to the database at different times and the change before and after the round. Even if the pandemic slows down in the future, people can compete with this platform, especially contestants from different cities or countries, since it beats the constraint of distance.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123134643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Anomaly Mark Detection on Fabric Production Video by Artificial Intelligence Techniques","authors":"Nantachaporn Rueangsuwan, Nathapat Jariyapongsgul, Chien-Chang Chen, Cheng-Shian Lin, S. Ruengittinun, Chalothon Chootong","doi":"10.1109/ICKII55100.2022.9983584","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983584","url":null,"abstract":"In the previous era, humans played important roles in all aspects of industrial work. However, they indisputably made many errors that can be mitigated by automated manufacturing, thus revealing the importance of the latter. In this paper, an autoencoder-based fabric-defect detection method via video is presented. The fabric-production video is segmented using frames to produce images, and then a VGG16-based autoencoder is applied to reconstruct the original image. In the proposed scheme, each fabric-production image is normalized to 256 x 256 pixels, which provided excellent results compared with using various margin sizes in our experiments. We used the structural similarity index (SSIM), which measures similarity when checking whether image regions are normal or defective. Moreover, a masking algorithm is utilized to improve detection accuracy. Based on our experiments, we found that 0.5 is an appropriate value for setting the SSIM threshold as it produced the best detection performance with a defect detection accuracy of ~99%.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feasibility Study of Using Hybrid Artificial Intelligence Architecture for Recognizing Execution Styles of Players in Tennis Match","authors":"Shu-Kai Liang, J. Chiang, Kerwin Wang","doi":"10.1109/ICKII55100.2022.9983570","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983570","url":null,"abstract":"A feasibility study of using a hybrid artificial intelligence architecture is presented for identifying basic tennis stroke types and players’ positions with tennis court labels by collecting the statistical data for studying player execution styles in a tennis match. The hybrid architecture consists of a machine-learning-based system for video processing and a rule-based system for identifying tennis strokes and players’ positions. It utilizes less computing resources than entirely machine-learning-based approaches. This architecture performs spatiotemporal information extraction to understand the players’ style, such as the time and court positions of classified tennis strokes.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131579531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(n, n) XOR-based Visual Multi-secrets Sharing Scheme with Meaningful Shares","authors":"Sheng-Yao Huang, An-hui Lo, J. Juan","doi":"10.1109/ICKII55100.2022.9983574","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983574","url":null,"abstract":"Due to the rise of the Internet and the development of digital technology, lifestyles have become rich and diverse. People are also used to transmitting important information over the Internet. With the popularity of the Internet, the methods of cybercrime are constantly innovating, becoming common and complex, and information security is under increasing threat. Naor and Shamir put up the fundamental design for visual cryptography (VC) in 1994. When the secret image is restored without relying on any complicated equipment, it is only necessary to stack those shares, and the secret image can be observed through human vision. Since then, scholars have started to research visual cryptography (VC). One of the recent advancements in visual cryptography, XOR-based VC addresses the issue of OR-based VC's poor image quality of the restored image through recent hardware cost reductions. After all n shares are collected, the restoration operation is performed by the XOR operation, so that the restored image has higher visual quality. In this study, we propose an XOR-based VCS that encrypts multiple secret images at the same time and makes each share meaningful separately so that its protection is improved. Encrypting by XOR operation makes the restored image with high visual quality. According to theoretical analysis and experimental findings, the approach is safe and efficient. The proposed VCS has better capabilities than earlier approaches.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127479479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-Pigeon Device to Drive Away Feral Pigeons from Windowsills Considering Positive Punishment Strategy","authors":"Shih-Miao Huang, Wu-Jeng Li","doi":"10.1109/ICKII55100.2022.9983597","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983597","url":null,"abstract":"We adopted a positive punishment strategy to develop an anti-pigeon device, called APD to resolve the pitfalls of current off-the-shelf devices. The feral pigeon memorizes the unpleasure experience when encountering the APD, resulting in deterring and keeping it away effectively. The APD is a flat device installed on windowsills, not blocking high-floor views. The function mechanism of APD is the same as the electric mosquito swatter. It includes an ultrasonic sensor, a relay, a microcontroller platform, two 3V-button batteries, a MicroSD adapter, an SD card, a 9V PPP battery, a set of circuits, and a set of electric nets. The circuit set includes an oscillation circuit, a transformer, and a voltage multiplier. When the ultrasonic sensor detects a pigeon approaching the APD, the controller directly counts and records them into the SD card. Immediately, the relay initiates the circuits to raise the transient voltage to 1.5kv. Subsequently, the pigeon touches the nets and experiences an electric shock. Once the pigeon leaves, the relay immediately turns off the set of the circuit. The APD was tested in real environments to verify its effectiveness. The result demonstrated that no feral pigeons approached or stayed on the windowsill in the seven-day observation, and the windowsill was still clean without pigeon excrement. The positive punishment strategy operated well in keeping the nuisance pigeons away.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pattapon Prayurahong, P. Phunchongharn, V. C. Barroso
{"title":"A Topic Modeling for ALICE'S Log Messages using Latent Dirichlet Allocation","authors":"Pattapon Prayurahong, P. Phunchongharn, V. C. Barroso","doi":"10.1109/ICKII55100.2022.9983522","DOIUrl":"https://doi.org/10.1109/ICKII55100.2022.9983522","url":null,"abstract":"In modern-day software where digital technology is everywhere, the system can generate a massive amount of log messages every second. Like other data, a log can provide insight and depth knowledge of the system given enough resources and time. However, not all systems have an organized log system, and an unorganized log is messy and difficult to navigate. There are many challenging points for organizing the log messages. As the amount of log data generated is massive, it is impossible to be handled by human labor alone. A log message is not regular human communication. To thoroughly understand the content inside the log, assistance from specialists of that particular system is required. These problems exist everywhere, and there is no exception even for high-performance computing systems like those used in the ALICE experiment at CERN. In this paper, we propose a topic modeling for ALICE’s log messages using the Latent Dirichlet Allocation algorithm. The objective is to convert the messy log messages into categorized ones. We handled the log messages and preprocessed them using Bag of Word. Then we performed hyperparameter-tuning to find the suitable number of topics using topic coherence as an evaluated measurement. Additionally, we also applied the same method to the log dataset of HDFS, to ensure the valid ability of the model. Finally, the outputs were then handed to CERN domain experts to give the final evaluation. From the result, we could create a practical topic modeling framework for ALICE’s log messages in a real scenario.","PeriodicalId":352222,"journal":{"name":"2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII )","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114514667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}