Journal of ICT Research and Applications最新文献

筛选
英文 中文
Design and Implementation of Moving Object Visual Tracking System using μ-Synthesis Controller μ-综合控制器在运动目标视觉跟踪系统中的设计与实现
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.1
S. Saripudin, Modestus Oliver Asali, B. Trilaksono, T. Indriyanto
{"title":"Design and Implementation of Moving Object Visual Tracking System using μ-Synthesis Controller","authors":"S. Saripudin, Modestus Oliver Asali, B. Trilaksono, T. Indriyanto","doi":"10.5614/itbj.ict.res.appl.2019.13.3.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.1","url":null,"abstract":"Considering the increasing use of security and surveillance systems, moving object tracking systems are an interesting research topic in the field of computer vision. In general, a moving object tracking system consists of two integrated parts, namely the video tracking part that predicts the position of the target in the image plane, and the visual servo part that controls the movement of the camera following the movement of objects in the image plane. For tracking purposes, the camera is used as a visual sensor and applied to a 2-DOF (yaw-pitch) manipulator platform with an eye-in-hand camera configuration. Although its operation is relatively simple, the yaw-pitch camera platform still needs a good control method to improve its performance. In this study, we propose a moving object tracking system on a prototype yaw-pitch platform. A m-synthesis controller was used to control the movement of the visual servo part and keep the target in the center of the image plane. The experimental results showed relatively good results from the proposed system to work in real-time conditions with high tracking accuracy in both indoor and outdoor environments.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46088261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultrasound Nerve Segmentation Using Deep Probabilistic Programming 基于深度概率规划的超声神经分割
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.5
Iresha D. Rubasinghe, D. Meedeniya
{"title":"Ultrasound Nerve Segmentation Using Deep Probabilistic Programming","authors":"Iresha D. Rubasinghe, D. Meedeniya","doi":"10.5614/itbj.ict.res.appl.2019.13.3.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.5","url":null,"abstract":"Deep probabilistic programming concatenates the strengths of deep learning to the context of probabilistic modeling for efficient and flexible computation in practice. Being an evolving field, there exist only a few expressive programming languages for uncertainty management. This paper discusses an application for analysis of ultrasound nerve segmentation-based biomedical images. Our method uses the probabilistic programming language Edward with the U-Net model and generative adversarial networks under different optimizers. The segmentation process showed the least Dice loss (‑0.54) and the highest accuracy (0.99) with the Adam optimizer in the U-Net model with the least time consumption compared to other optimizers. The smallest amount of generative network loss in the generative adversarial network model gained was 0.69 for the Adam optimizer. The Dice loss, accuracy, time consumption and output image quality in the results show the applicability of deep probabilistic programming in the long run. Thus, we further propose a neuroscience decision support system based on the proposed approach.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46164262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Paraphrasing Method Based on Contextual Synonym Substitution 基于上下文同义词替换的句法分析方法
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.6
A. Barmawi, Ali Muhammad
{"title":"Paraphrasing Method Based on Contextual Synonym Substitution","authors":"A. Barmawi, Ali Muhammad","doi":"10.5614/itbj.ict.res.appl.2019.13.3.6","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.6","url":null,"abstract":"Generating paraphrases is an important component of natural language processing and generation. There are sev­eral applications that use paraphrasing, for example linguistic steganography, recommender systems, machine translation, etc. One method for paraphrasing sentences is by using synonym substitution, such as the NGM-based paraphrasing method proposed by Gadag et al. The weakness of this method is that ambiguous meanings frequently occur because the paraphrasing process is based solely on n-gram. This negatively affects the naturalness of the paraphrased sentences. For overcoming this problem, a contextual synonym substitution method is proposed, which aims to increase the naturalness of the paraphrased sentences. Using the proposed method, the paraphrasing process is not only based on n-gram but also on the context of the sentence such that the naturalness is increased. Based on the experimental result, the sentences generated using the proposed method had higher naturalness than the sentences generated using the original method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48009527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Robust Algorithm for Emoji Detection in Smartphone Screenshot Images 智能手机截图图像中表情符号检测的鲁棒算法
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-12-31 DOI: 10.5614/itbj.ict.res.appl.2019.13.3.2
Bilal Bataineh, M. Y. Shambour
{"title":"A Robust Algorithm for Emoji Detection in Smartphone Screenshot Images","authors":"Bilal Bataineh, M. Y. Shambour","doi":"10.5614/itbj.ict.res.appl.2019.13.3.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.2","url":null,"abstract":"The increasing use of smartphones and social media apps for communication results in a massive number of screenshot images. These images enrich the written language through text and emojis. In this regard, several studies in the image analysis field have considered text. However, they ignored the use of emojis. In this study, a robust two-stage algorithm for detecting emojis in screenshot images is proposed. The first stage localizes the regions of candidate emojis by using the proposed RGB-channel analysis method followed by a connected component method with a set of proposed rules. In the second verification stage, each of the emojis and non-emojis are classified by using proposed features with a decision tree classifier. Experiments were conducted to evaluate each stage independently and assess the performance of the proposed algorithm completely by using a self-collected dataset. The results showed that the proposed RGB-channel analysis method achieved better performance than the Niblack and Sauvola methods. Moreover, the proposed feature extraction method with decision tree classifier achieved more satisfactory performance than the LBP feature extraction method with all Bayesian network, perceptron neural network, and decision table rules. Overall, the proposed algorithm exhibited high efficiency in detecting emojis in screenshot images.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43466635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Fake Facebook Profiles Using Data Mining Techniques 使用数据挖掘技术识别虚假Facebook个人资料
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.2
Mohammed Basil Albayati, A. Altamimi
{"title":"Identifying Fake Facebook Profiles Using Data Mining Techniques","authors":"Mohammed Basil Albayati, A. Altamimi","doi":"10.5614/itbj.ict.res.appl.2019.13.2.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.2","url":null,"abstract":"Facebook, the popular online social network, has changed our lives. Users can create a customized profile to share information about themselves with others that have agreed to be their ‘friend’. However, this gigantic social network can be misused for carrying out malicious activities. Facebook faces the problem of fake accounts that enable scammers to violate users’ privacy by creating fake profiles to infiltrate personal social networks. Many techniques have been proposed to address this issue. Most of them are based on detecting fake profiles/accounts, considering the characteristics of the user profile. However, the limited profile data made publicly available by Facebook makes it ineligible for applying the existing approaches in fake profile identification. Therefore, this research utilized data mining techniques to detect fake profiles. A set of supervised (ID3 decision tree, k-NN, and SVM) and unsupervised (k-Means and k-medoids) algorithms were applied to 12 behavioral and non-behavioral discriminative profile attributes from a dataset of 982 profiles. The results showed that ID3 had the highest accuracy in the detection process while k-medoids had the lowest accuracy.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46460185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using Customer Emotional Experience from E-Commerce for Generating Natural Language Evaluation and Advice Reports on Game Products 基于电子商务客户情感体验生成游戏产品自然语言评价与建议报告
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.5
Hamdan Gani, Kiyoshi Tomimatsu
{"title":"Using Customer Emotional Experience from E-Commerce for Generating Natural Language Evaluation and Advice Reports on Game Products","authors":"Hamdan Gani, Kiyoshi Tomimatsu","doi":"10.5614/itbj.ict.res.appl.2019.13.2.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.5","url":null,"abstract":"Investigating customer emotional experience using natural language processing (NLP) is an example of a way to obtain product insight. However, it relies on interpreting and representing the results understandably. Currently, the results of NLP are presented in numerical or graphical form, and human experts still need to provide an explanation in natural language. It is desirable to develop a computational system that can automatically transform NLP results into a descriptive report in natural language. The goal of this study was to develop a computational linguistic description method to generate evaluation and advice reports on game products. This study used NLP to extract emotional experiences (emotions and sentiments) from e-commerce customer reviews in the form of numerical information. This paper also presents a linguistic description method to generate evaluation and advice reports, adopting the Granular Linguistic Model of a Phenomenon (GLMP) method for analyzing the results of the NLP method. The test result showed that the proposed method could successfully generate evaluation and advice reports assessing the quality of 5 game products based on the emotional experience of customers.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45983497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Image Edge Using Quantum Canny Edge Detection Algorithm 基于量子Canny边缘检测算法的图像边缘识别
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.4
D. Sundani, S. Widiyanto, Y. Karyanti, D. T. Wardani
{"title":"Identification of Image Edge Using Quantum Canny Edge Detection Algorithm","authors":"D. Sundani, S. Widiyanto, Y. Karyanti, D. T. Wardani","doi":"10.5614/itbj.ict.res.appl.2019.13.2.4","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.4","url":null,"abstract":"Identification of image edges using edge detection is done to obtain images that are sharp and clear. The selection of the edge detection algorithm will affect the result. Canny operators have an advantage compared to other edge detection operators because of their ability to detect not only strong edges but also weak edges. Until now, Canny edge detection has been done using classical computing where data are expressed in bits, 0 or 1. This paper proposes the identification of image edges using a quantum Canny edge detection algorithm, where data are expressed in the form of quantum bits (qubits). Besides 0 or 1, a value can also be 0 and 1 simultaneously so there will be many more possible values that can be obtained. There are three stages in the proposed method, namely the input image stage, the preprocessing stage, and the quantum edge detection stage. Visually, the results show that quantum Canny edge detection can detect more edges compared to classic Canny edge detection, with an average increase of 4.05% .","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49559223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Big Data Assisted CRAN Enabled 5G SON Architecture 大数据辅助支持CRAN的5G SON架构
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.1
K. Khurshid, A. Khan, Haroon Siddiqui, Imran Rashid, M. Hadi
{"title":"Big Data Assisted CRAN Enabled 5G SON Architecture","authors":"K. Khurshid, A. Khan, Haroon Siddiqui, Imran Rashid, M. Hadi","doi":"10.5614/itbj.ict.res.appl.2019.13.2.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.1","url":null,"abstract":"The recent development of Big Data, Internet of Things (IoT) and 5G network technology offers a plethora of opportunities to the IT industry and mobile network operators. 5G cellular technology promises to offer connectivity to massive numbers of IoT devices while meeting low-latency data transmission requirements. A deficiency of the current 4G networks is that the data from IoT devices and mobile nodes are merely passed on to the cloud and the communication infrastructure does not play a part in data analysis. Instead of only passing data on to the cloud, the system could also contribute to data analysis and decision-making. In this work, a Big Data driven self-optimized 5G network design is proposed using the knowledge of emerging technologies CRAN, NVF and SDN. Also, some technical impediments in 5G network optimization are discussed. A case study is presented to demonstrate the assistance of Big Data in solving the resource allocation problem.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47161189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Tunnel Settlement Prediction by Transfer Learning 基于迁移学习的隧道沉降预测
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-09-30 DOI: 10.5614/itbj.ict.res.appl.2019.13.2.3
Qicai Zhou, Hehong Shen, Jiong Zhao, Xiaolei Xiong
{"title":"Tunnel Settlement Prediction by Transfer Learning","authors":"Qicai Zhou, Hehong Shen, Jiong Zhao, Xiaolei Xiong","doi":"10.5614/itbj.ict.res.appl.2019.13.2.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.2.3","url":null,"abstract":"Tunnel settlement has a significant impact on property security and personal safety. Accurate tunnel-settlement predictions can quickly reveal problems that may be addressed to prevent accidents. However, each acquisition point in the tunnel is only monitored once daily for around two months. This paper presents a new method for predicting tunnel settlement via transfer learning. First, a source model is constructed and trained by deep learning, then parameter transfer is used to transfer the knowledge gained from the source model to the target model, which has a small dataset. Based on this, the training complexity and training time of the target model can be reduced. The proposed method was tested to predict tunnel settlement in the tunnel of Shanghai metro line 13 at Jinshajiang Road and proven to be effective. Artificial neural network and support vector machines were also tested for comparison. The results showed that the transfer-learning method provided the most accurate tunnel-settlement prediction.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43158124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated Defect Detection and Characterization on Pulse Thermography Images Using Computer Vision Techniques 基于计算机视觉技术的脉冲热成像图像缺陷自动检测与表征
IF 0.6
Journal of ICT Research and Applications Pub Date : 2019-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5
Meghana, M. P. Arakeri, D. Sharath, M. Menaka, B. Venkatraman
{"title":"Automated Defect Detection and Characterization on Pulse Thermography Images Using Computer Vision Techniques","authors":"Meghana, M. P. Arakeri, D. Sharath, M. Menaka, B. Venkatraman","doi":"10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2019.13.1.5","url":null,"abstract":"Defect detection and characterization plays a vital role in predicting the life span of materials. Defect detection using appropriate inspection technologies at various phases has gained huge importance in metal production lines. It can be accomplished through wise application of non-destructive testing and evaluation (NDE). It is important to characterize defects at an early stage in order to be able to overcome them or take corrective measures. Pulse thermography is a modern NDE method that can be used for defect detection in metal objects. Only a limited amount of work has been done on automated detection and characterization of defects due to thermal diffusion. This paper proposes a system for automatic defect detection and characterization in metal objects using pulse thermography images as well as various image processing algorithms and mathematical tools. An experiment was carried out using a sequence of 250 pulse thermography images of an AISI 316 L stainless steel sheet with synthetic defects. The proposed system was able to detect and characterize defects sized 10 mm, 8 mm, 6 mm, 4 mm and 2 mm with an average accuracy of 96%, 95%, 84%, 77%, 54% respectively. The proposed technique helps in the effective and efficient characterization of defects in metal objects.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44535586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信