This document summarizes a study that developed a biometric identification system using augmented databases of androgenic hair patterns. 50 images were augmented into 2,000 images through rotation, reflection, color/intensity adjustment. A hierarchical Gaussian scale-space was built among the augmented images to analyze them at multiple resolutions. This improved recognition precision to 70%, over 2 times higher than using limited data alone. Extraction of skin color areas using HSV and YCbCr color spaces was also investigated. The augmented database with scale-space analysis provided better identification performance than just using augmented images.
Comparison of Interpolation Methods in Prediction the Pattern of Basal Stem R...Waqas Tariq
Basal Stem Rot is a diseases that caused by Ganoderma Boinense that is the most serious disease for oil palm trees in Malaysia. The analysis of plant disease has been carried extensively with the advancement in computer technology. Particularly, in terms of spatial and temporal, it is very complicated to be processed. Furthermore, the application of GIS in plant disease analysis is becoming more popular, precise and advance. In previous studies, Kriging has been used to predict the pattern of BSR disease. In this study, two commonly used interpolation methods for GIS, Kriging and Inverse Distance Weighting (IDW), are used to interpolate and predict the pattern of Basal Stem Rot disease. Since the IDW method is an exact method and is more accurate one, it was expected to see more accurate results. However, the accuracy results of both methods are the same. Based on the characteristic of both methods and according to advantages and disadvantages, the Inverse Distance Weighted is recommended in this study but, for more informative data, Ordinary Kriging is suggested to be the preferable method to be used as an alternative method. .
Content Based Image Retrieval : Classification Using Neural Networksijma
In a content-based image retrieval system (CBIR), the main issue is to extract the image features that
effectively represent the image contents in a database. Such an extraction requires a detailed evaluation of
retrieval performance of image features. This paper presents a review of fundamental aspects of content
based image retrieval including feature extraction of color and texture features. Commonly used color
features including color moments, color histogram and color correlogram and Gabor texture are
compared. The paper reviews the increase in efficiency of image retrieval when the color and texture
features are combined. The similarity measures based on which matches are made and images are
retrieved are also discussed. For effective indexing and fast searching of images based on visual features,
neural network based pattern learning can be used to achieve effective classification.
Histogram Equalization for Improving Quality of Low-Resolution Ultrasonograph...TELKOMNIKA JOURNAL
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 150 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MultiModal Identification System in Monozygotic TwinsCSCJournals
This document presents a multimodal biometric system for identifying identical twins using face, fingerprint, and iris recognition. It utilizes Fisher's linear discriminant analysis to extract features from faces, principal component analysis for fingerprints, and local binary pattern features for iris matching. These features are then fused for identification. The system is tested on a database of 50 pairs of identical twins and shows promising results compared to other techniques. Receiver operating characteristics also indicate the proposed method performs better than other studied techniques in distinguishing identical twins.
The document discusses multispectral palm image fusion for biometric authentication using ant colony optimization. It introduces intra-modal fusion of palmprint images from multiple spectra to improve accuracy. The key steps involve detecting the region of interest, fusing the images using wavelet transforms, extracting Gabor features, selecting optimal features using ant colony optimization, and classifying with support vector machines. Experimental results and conclusions are also presented.
Hybrid Multilevel Thresholding and Improved Harmony Search Algorithm for Segm...IJECEIAES
This paper proposes a new method for image segmentation is hybrid multilevel thresholding and improved harmony search algorithm. Improved harmony search algorithm which is a method for finding vector solutions by increasing its accuracy. The proposed method looks for a random candidate solution, then its quality is evaluated through the Otsu objective function. Furthermore, the operator continues to evolve the solution candidate circuit until the optimal solution is found. The dataset used in this study is the retina dataset, tongue, lenna, baboon, and cameraman. The experimental results show that this method produces the high performance as seen from peak signal-to-noise ratio analysis (PNSR). The PNSR result for retinal image averaged 40.342 dB while for the average tongue image 35.340 dB. For lenna, baboon and cameramen produce an average of 33.781 dB, 33.499 dB, and 34.869 dB. Furthermore, the process of object recognition and identification is expected to use this method to produce a high degree of accuracy.
Edge detection of herbal plants is a set of mathematical methods which aim at identifying points in a digital image at which the image brightness changes sharply and has discontinuities. They are defined as the set of curved line segments termed edges. Effective edge detection for microscopic image of herbal plant is proposed through this paper which compares the edge detected images and then performs further segmentation. Comparison between Sobel operator, Prewitt, Canny and Robert cross operators is performed. Our method after efficient edge detection performs Gabor filter and K-means clustering to procure a better image. It is then subjected to further segmentation. Experimental methods in our proposed algorithm show that our method achieves a better edge detection as compared to other edge detector operators. Our proposed algorithm provides the maximum PSNR value of 43.684 amongst the other commercial edge detection operators.
Comparison of Interpolation Methods in Prediction the Pattern of Basal Stem R...Waqas Tariq
Basal Stem Rot is a diseases that caused by Ganoderma Boinense that is the most serious disease for oil palm trees in Malaysia. The analysis of plant disease has been carried extensively with the advancement in computer technology. Particularly, in terms of spatial and temporal, it is very complicated to be processed. Furthermore, the application of GIS in plant disease analysis is becoming more popular, precise and advance. In previous studies, Kriging has been used to predict the pattern of BSR disease. In this study, two commonly used interpolation methods for GIS, Kriging and Inverse Distance Weighting (IDW), are used to interpolate and predict the pattern of Basal Stem Rot disease. Since the IDW method is an exact method and is more accurate one, it was expected to see more accurate results. However, the accuracy results of both methods are the same. Based on the characteristic of both methods and according to advantages and disadvantages, the Inverse Distance Weighted is recommended in this study but, for more informative data, Ordinary Kriging is suggested to be the preferable method to be used as an alternative method. .
Content Based Image Retrieval : Classification Using Neural Networksijma
In a content-based image retrieval system (CBIR), the main issue is to extract the image features that
effectively represent the image contents in a database. Such an extraction requires a detailed evaluation of
retrieval performance of image features. This paper presents a review of fundamental aspects of content
based image retrieval including feature extraction of color and texture features. Commonly used color
features including color moments, color histogram and color correlogram and Gabor texture are
compared. The paper reviews the increase in efficiency of image retrieval when the color and texture
features are combined. The similarity measures based on which matches are made and images are
retrieved are also discussed. For effective indexing and fast searching of images based on visual features,
neural network based pattern learning can be used to achieve effective classification.
Histogram Equalization for Improving Quality of Low-Resolution Ultrasonograph...TELKOMNIKA JOURNAL
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 150 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MultiModal Identification System in Monozygotic TwinsCSCJournals
This document presents a multimodal biometric system for identifying identical twins using face, fingerprint, and iris recognition. It utilizes Fisher's linear discriminant analysis to extract features from faces, principal component analysis for fingerprints, and local binary pattern features for iris matching. These features are then fused for identification. The system is tested on a database of 50 pairs of identical twins and shows promising results compared to other techniques. Receiver operating characteristics also indicate the proposed method performs better than other studied techniques in distinguishing identical twins.
The document discusses multispectral palm image fusion for biometric authentication using ant colony optimization. It introduces intra-modal fusion of palmprint images from multiple spectra to improve accuracy. The key steps involve detecting the region of interest, fusing the images using wavelet transforms, extracting Gabor features, selecting optimal features using ant colony optimization, and classifying with support vector machines. Experimental results and conclusions are also presented.
Hybrid Multilevel Thresholding and Improved Harmony Search Algorithm for Segm...IJECEIAES
This paper proposes a new method for image segmentation is hybrid multilevel thresholding and improved harmony search algorithm. Improved harmony search algorithm which is a method for finding vector solutions by increasing its accuracy. The proposed method looks for a random candidate solution, then its quality is evaluated through the Otsu objective function. Furthermore, the operator continues to evolve the solution candidate circuit until the optimal solution is found. The dataset used in this study is the retina dataset, tongue, lenna, baboon, and cameraman. The experimental results show that this method produces the high performance as seen from peak signal-to-noise ratio analysis (PNSR). The PNSR result for retinal image averaged 40.342 dB while for the average tongue image 35.340 dB. For lenna, baboon and cameramen produce an average of 33.781 dB, 33.499 dB, and 34.869 dB. Furthermore, the process of object recognition and identification is expected to use this method to produce a high degree of accuracy.
Edge detection of herbal plants is a set of mathematical methods which aim at identifying points in a digital image at which the image brightness changes sharply and has discontinuities. They are defined as the set of curved line segments termed edges. Effective edge detection for microscopic image of herbal plant is proposed through this paper which compares the edge detected images and then performs further segmentation. Comparison between Sobel operator, Prewitt, Canny and Robert cross operators is performed. Our method after efficient edge detection performs Gabor filter and K-means clustering to procure a better image. It is then subjected to further segmentation. Experimental methods in our proposed algorithm show that our method achieves a better edge detection as compared to other edge detector operators. Our proposed algorithm provides the maximum PSNR value of 43.684 amongst the other commercial edge detection operators.
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...idescitation
Skin detection remains a challenging task over
several decades in spite of many techniques evolved. It is the
elementary step of most of the computer vision applications
like face recognition, human computer interaction, etc. It
depends on the suitability of color space chosen, skin modeling
and classification of skin and non-skin pixels under varying
illumination conditions. This paper presents a symbolic
interpretation on the performance of the color spaces using
piecewise linear decision boundary classifier in color images
to find the winning color space (s). The whole task is divided
into three processes: analysis of color spaces individually;
analysis of the combination of two color spaces; and finally
making a comparative analysis among the results obtained by
the above two processes. For performing the fair evaluation,
the whole experiment is tested over commonly used databases.
Based on the success rate, false positive and false negative of
each color spaces, the winner(s) has been chosen among single
and the combination of color spaces.
Comparative performance analysis of segmentation techniquesIAEME Publication
This document compares the performance of several image segmentation techniques: global thresholding, adaptive thresholding, region growing, and level set segmentation. It applies these techniques to medical and synthetic images corrupted with noise and evaluates the segmentation results using binary classification metrics like sensitivity, specificity, accuracy, and precision. The results show that level set segmentation best preserves object boundaries, adaptive thresholding captures most image details, and global thresholding has the highest success rate at extracting regions of interest. Overall, the study aims to determine the optimal segmentation method for medical images from CT scans.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESIJCSEA Journal
Early detection of lung cancer is a challenging problem, the world faces today. Prior to classify glandular cells as malignant or benign a reliable segmentation technique is required. In this paper we present a novel lung glandular cell segmentation technique. The technique uses a combination of multiple color spaces and various clustering algorithms to automatically find the best possible segmentation result. Unsupervised clustering methods of K-means and Fuzzy C-means were used on multiple color spaces such as HSV, LAB, LUV, xyY. Experimental results of segmentation using various color spaces are provided to show the performance of the proposed system.
Pollination based optimization for color image segmentationIAEME Publication
This document presents a new optimization method called Pollination Based Optimization (PBO) to select optimal color clusters for image segmentation. The methodology involves four steps: color space conversion, generating candidate clusters using Fuzzy K-Means clustering, using PBO to select optimal cluster centers, and segmenting the image. PBO models the natural process of pollination in plants to optimize cluster selection. The method is tested on three images and shows improved segmentation accuracy and reduced computation time compared to other methods.
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERcscpconf
Medical image segmentation is a frequent processing step in image understanding and computer
aided diagnosis. In this paper, we propose medical image texture segmentation using texture
filter. Three different image enhancement techniques are utilized to remove strong speckle noise as well enhance the weak boundaries of medical images. We propose to exploit the concept of range filtering to extract the texture content of medical image. Experiment is conducted on ImageCLEF2010 database. Results show the efficacy of our proposed medical image texture segmentation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The accurate determination of the sex and age of human skull is a critical challenge in skeleton anthropology and crime department. In the forensic
laboratory they determine both the sex and age of skeleton using carbon content of the bones. The teeth, pelvis and skull are the most widely used sites
for determination of sex and age of the skeleton. This paper introduces a technique for objective qualification of age and sexual dimorphic features
using wavelet transformation, it is a multiscale mathematical technique that allows determination of shape variation that are hide at various scale of
resolution. We use a 2D discrete wavelet transform in the proposed method. In the skull the supraorbital margin is consider to determine sex of skull
and the area occupation of upper part of skull is used to estimate the age of the skull. SVM is a classifier used for classification. We used both
supervised and unsupervised SVM for both sex and age detection of the skull.
An efficient fuzzy classifier with feature selection basedssairayousaf
This document presents an efficient fuzzy classifier with feature selection capabilities. A fuzzy entropy measure is used to partition the input feature space into non-overlapping decision regions and to select relevant features. Fuzzy entropy evaluates the information of pattern distribution in the pattern space. The decision regions do not overlap, reducing computational complexity and load. Classification speed is extremely fast while still achieving good performance by correctly determining decision region boundaries. Feature selection via fuzzy entropy reduces dimensionality by discarding noisy, redundant, and unimportant features. The proposed classifier is applied to two databases with good classification results, demonstrating its effectiveness.
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSijcseit
Object segmentation plays an important role in human visual perception, medical image processing and content based image retrieval. It provides information for recognition and interpretation. This paper uses mathematical morphology for image segmentation. Object segmentation is difficult because one usually does not know a priori what type of object exists in an image, how many different shapes are there and what regions the image has. To carryout discrimination and segmentation several innovative segmentation methods, based on morphology are proposed. The present study proposes segmentation method based on multiscale morphological reconstructions. Various sizes of structuring elements have been used to segment simple and complex shapes. It enhances local boundaries that may lead to improve segmentation accuracy.The method is tested on various datasets and results shows that it can be used for both interactive and automatic segmentation.
Image Compression based on DCT and BPSO for MRI and Standard ImagesIJERA Editor
Nowadays, digital image compression has become a crucial factor of modern telecommunication systems. Image compression is the process of reducing total bits required to represent an image by reducing redundancies while preserving the image quality as much as possible. Various applications including internet, multimedia, satellite imaging, medical imaging uses image compression in order to store and transmit images in an efficient manner. Selection of compression technique is an application-specific process. In this paper, an improved compression technique based on Butterfly-Particle Swarm Optimization (BPSO) is proposed. BPSO is an intelligence-based iterative algorithm utilized for finding optimal solution from a set of possible values. The dominant factors of BPSO over other optimization techniques are higher convergence rate, searching ability and overall performance. The proposed technique divides the input image into 88 blocks. Discrete Cosine Transform (DCT) is applied to each block to obtain the coefficients. Then, the threshold values are obtained from BPSO. Based on this threshold, values of the coefficients are modified. Finally, quantization followed by the Huffman encoding is used to encode the image. Experimental results show the effectiveness of the proposed method over the existing method.
This document presents a novel technique for detecting the breast boundary (also known as the skin-air interface or skin-line) in mammogram images using entropy estimation. The proposed method applies a logarithmic transform to increase contrast near the skin line, calculates entropy across the image which changes significantly at the boundary, and uses an exponential transform to enhance boundary detection. The algorithm was tested on 103 mammogram images and evaluated by an expert, achieving accurate boundary detection. The method provides a noise resistant way to detect the important but low-contrast breast boundary for use in computer-aided diagnosis systems.
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
Segmentation is a process of partitioning the image into several objects. It plays a vital role in many fields
such as satellite, remote sensing, object identification, face tracking and most importantly in medical field.
In radiology, magnetic resonance imaging (MRI) is used to investigate the human body processes and
functions of organisms. In hospitals, this technique has been using widely for medical diagnosis, to find the
disease stage and follow-up without exposure to ionizing radiation.Here in this paper, we proposed a novel
MR brain image segmentation method for detecting the tumor and finding the tumor area with improved
performance over conventional segmentation techniques such as fuzzy c means (FCM), K-means and even
that of manual segmentation in terms of precision time and accuracy. Simulation performance shows that
the proposed scheme has performed superior to the existing segmentation methods.
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesIRJET Journal
This document discusses using a genetic algorithm to analyze and segment overlapping medical images, specifically chromosome images. It begins with an abstract describing how genetic algorithms and image segmentation can be used to identify chromosomal abnormalities by segmenting overlapping chromosome structures. It then provides background on chromosomes and genetic algorithms. The proposed method uses genetic algorithms to optimize an energy function and segment overlapping regions in chromosome images by identifying contrast regions as the fitness function. Masks are created to determine overlapping zones and the cropped image helps identify overlapping regions. The document describes the various steps involved, including binary mapping, image enhancement, contour detection, segmentation of overlapping regions, and identification of overlapping regions using genetic algorithms.
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
Abstract We are considering: local-content (LC) information, global-content (GC) information from PubMed and MESH (medical subject heading-MS) for the clustering of bio-medical documents. The performances of MEDLINE document clustering are enhanced from previous methods by combining both the LC and GC. We propose a semi-supervised spectral clustering method to overcome the limitations of representation space of earlier methods. Keywords- document clustering, semi-supervised clustering, spectral clustering
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...csandit
The aim of this paper is to present a comparative s
tudy of two linear dimension reduction
methods namely PCA (Principal Component Analysis) a
nd LDA (Linear Discriminant Analysis).
The main idea of PCA is to transform the high dimen
sional input space onto the feature space
where the maximal variance is displayed. The featur
e selection in traditional LDA is obtained
by maximizing the difference between classes and mi
nimizing the distance within classes. PCA
finds the axes with maximum variance for the whole
data set where LDA tries to find the axes
for best class seperability. The proposed method is
experimented over a general image database
using Matlab. The performance of these systems has
been evaluated by Precision and Recall
measures. Experimental results show that PCA based
dimension reduction method gives the
better performance in terms of higher precision and
recall values with lesser computational
complexity than the LDA based method.
This paper proposes a system gives for explicit content image detection based on Computer Vision Algorithms, pattern recognition and FTK software Explicit Image Detection. In the first stage, HSV color model is used for the input images for the purpose of discriminating elements that are not human skin images. Then the image is filtered using skin detection. The output image only contains the areas of which it is composed. The results show a comparison between the proposed system and the company software Access Data called Forensic Toolkit 3.1 Explicit Image Detection isperformed.
Texture features from Chaos Game Representation Images of GenomesCSCJournals
The proposed work investigates the effectiveness of coarse measures of the Chaos Game Representation (CGR) images in differentiating genomes of various organisms. Major work in this area is seen to focus on feature extraction using Frequency Chaos Game Representation (FCGR) matrices. Although it is biologically significant, FCGR matrix has an inherent error which is associated with the insufficient computing as well as the screen resolutions. Hence the CGR image is converted to a texture image and corresponding feature vectors extracted. Features such as the texture properties and the subsequent wavelet coefficients of the texture image are used. Our work suggests that texture features characterize genomes well further; their wavelet coefficients yield better distinguishing capabilities.
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%.
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionTELKOMNIKA JOURNAL
Androgenic hair pattern stated to be the new biometric trait since 2014. The research to improve
the performance of androgenic hair pattern recognition system has begun to be developed due to the
problems that occurred when other apparent biometric trait such as face is hidden from sight. The
recognition system was built with hierarchical Gaussian scale-space using 4 octaves and 3 levels in each
octave. The system also implemented the equalization process to adjust image’s intensity by using
histogram equalization. We analyzed 400 images of androgenic hair in the database that were analyzed
using 2-fold and 10-fold cross validation and Euclidean distance to classify it. The experimental results
showed that our proposed method gave better performance compared to previous work that used Haar
wavelet transformation and principal component analysis as the main method. The best recognition
precision was 94.23 % obtained from the base octave with the third level using histogram equalization and
10-fold cross validation.
Wavelet-Based Color Histogram on Content-Based Image RetrievalTELKOMNIKA JOURNAL
The growth of image databases in many domains, including fashion, biometric, graphic design,
architecture, etc. has increased rapidly. Content Based Image Retrieval System (CBIR) is a technique used
for finding relevant images from those huge and unannotated image databases based on low-level features
of the query images. In this study, an attempt to employ 2nd level Wavelet Based Color Histogram (WBCH)
on a CBIR system is proposed. Image database used in this study are taken from Wang’s image database
containing 1000 color images. The experiment results show that 2nd level WBCH gives better precision
(0.777) than the other methods, including 1st level WBCH, Color Histogram, Color Co-occurrence Matrix,
and Wavelet texture feature. It can be concluded that the 2nd Level of WBCH can be applied to CBIR system.
Human Re-identification with Global and Local Siamese Convolution Neural NetworkTELKOMNIKA JOURNAL
This document proposes a global and local structure of Siamese Convolution Neural Network (SCNN) to perform human re-identification in single-shot approaches. The network extracts features from global and local parts of input images. A decision fusion technique then combines the global and local features. Experimental results on the VIPeR dataset show the proposed method achieves a normalized Area Under Curve score of 95.75% without occlusion, outperforming using local or global features alone. With occlusion, the score is 77.5%, still better than alternatives. The method performs well for re-identification including in occlusion cases by leveraging both global and local information.
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...idescitation
Skin detection remains a challenging task over
several decades in spite of many techniques evolved. It is the
elementary step of most of the computer vision applications
like face recognition, human computer interaction, etc. It
depends on the suitability of color space chosen, skin modeling
and classification of skin and non-skin pixels under varying
illumination conditions. This paper presents a symbolic
interpretation on the performance of the color spaces using
piecewise linear decision boundary classifier in color images
to find the winning color space (s). The whole task is divided
into three processes: analysis of color spaces individually;
analysis of the combination of two color spaces; and finally
making a comparative analysis among the results obtained by
the above two processes. For performing the fair evaluation,
the whole experiment is tested over commonly used databases.
Based on the success rate, false positive and false negative of
each color spaces, the winner(s) has been chosen among single
and the combination of color spaces.
Comparative performance analysis of segmentation techniquesIAEME Publication
This document compares the performance of several image segmentation techniques: global thresholding, adaptive thresholding, region growing, and level set segmentation. It applies these techniques to medical and synthetic images corrupted with noise and evaluates the segmentation results using binary classification metrics like sensitivity, specificity, accuracy, and precision. The results show that level set segmentation best preserves object boundaries, adaptive thresholding captures most image details, and global thresholding has the highest success rate at extracting regions of interest. Overall, the study aims to determine the optimal segmentation method for medical images from CT scans.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
SEGMENTATION OF LUNG GLANDULAR CELLS USING MULTIPLE COLOR SPACESIJCSEA Journal
Early detection of lung cancer is a challenging problem, the world faces today. Prior to classify glandular cells as malignant or benign a reliable segmentation technique is required. In this paper we present a novel lung glandular cell segmentation technique. The technique uses a combination of multiple color spaces and various clustering algorithms to automatically find the best possible segmentation result. Unsupervised clustering methods of K-means and Fuzzy C-means were used on multiple color spaces such as HSV, LAB, LUV, xyY. Experimental results of segmentation using various color spaces are provided to show the performance of the proposed system.
Pollination based optimization for color image segmentationIAEME Publication
This document presents a new optimization method called Pollination Based Optimization (PBO) to select optimal color clusters for image segmentation. The methodology involves four steps: color space conversion, generating candidate clusters using Fuzzy K-Means clustering, using PBO to select optimal cluster centers, and segmenting the image. PBO models the natural process of pollination in plants to optimize cluster selection. The method is tested on three images and shows improved segmentation accuracy and reduced computation time compared to other methods.
MEDICAL IMAGE TEXTURE SEGMENTATION USINGRANGE FILTERcscpconf
Medical image segmentation is a frequent processing step in image understanding and computer
aided diagnosis. In this paper, we propose medical image texture segmentation using texture
filter. Three different image enhancement techniques are utilized to remove strong speckle noise as well enhance the weak boundaries of medical images. We propose to exploit the concept of range filtering to extract the texture content of medical image. Experiment is conducted on ImageCLEF2010 database. Results show the efficacy of our proposed medical image texture segmentation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The accurate determination of the sex and age of human skull is a critical challenge in skeleton anthropology and crime department. In the forensic
laboratory they determine both the sex and age of skeleton using carbon content of the bones. The teeth, pelvis and skull are the most widely used sites
for determination of sex and age of the skeleton. This paper introduces a technique for objective qualification of age and sexual dimorphic features
using wavelet transformation, it is a multiscale mathematical technique that allows determination of shape variation that are hide at various scale of
resolution. We use a 2D discrete wavelet transform in the proposed method. In the skull the supraorbital margin is consider to determine sex of skull
and the area occupation of upper part of skull is used to estimate the age of the skull. SVM is a classifier used for classification. We used both
supervised and unsupervised SVM for both sex and age detection of the skull.
An efficient fuzzy classifier with feature selection basedssairayousaf
This document presents an efficient fuzzy classifier with feature selection capabilities. A fuzzy entropy measure is used to partition the input feature space into non-overlapping decision regions and to select relevant features. Fuzzy entropy evaluates the information of pattern distribution in the pattern space. The decision regions do not overlap, reducing computational complexity and load. Classification speed is extremely fast while still achieving good performance by correctly determining decision region boundaries. Feature selection via fuzzy entropy reduces dimensionality by discarding noisy, redundant, and unimportant features. The proposed classifier is applied to two databases with good classification results, demonstrating its effectiveness.
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSijcseit
Object segmentation plays an important role in human visual perception, medical image processing and content based image retrieval. It provides information for recognition and interpretation. This paper uses mathematical morphology for image segmentation. Object segmentation is difficult because one usually does not know a priori what type of object exists in an image, how many different shapes are there and what regions the image has. To carryout discrimination and segmentation several innovative segmentation methods, based on morphology are proposed. The present study proposes segmentation method based on multiscale morphological reconstructions. Various sizes of structuring elements have been used to segment simple and complex shapes. It enhances local boundaries that may lead to improve segmentation accuracy.The method is tested on various datasets and results shows that it can be used for both interactive and automatic segmentation.
Image Compression based on DCT and BPSO for MRI and Standard ImagesIJERA Editor
Nowadays, digital image compression has become a crucial factor of modern telecommunication systems. Image compression is the process of reducing total bits required to represent an image by reducing redundancies while preserving the image quality as much as possible. Various applications including internet, multimedia, satellite imaging, medical imaging uses image compression in order to store and transmit images in an efficient manner. Selection of compression technique is an application-specific process. In this paper, an improved compression technique based on Butterfly-Particle Swarm Optimization (BPSO) is proposed. BPSO is an intelligence-based iterative algorithm utilized for finding optimal solution from a set of possible values. The dominant factors of BPSO over other optimization techniques are higher convergence rate, searching ability and overall performance. The proposed technique divides the input image into 88 blocks. Discrete Cosine Transform (DCT) is applied to each block to obtain the coefficients. Then, the threshold values are obtained from BPSO. Based on this threshold, values of the coefficients are modified. Finally, quantization followed by the Huffman encoding is used to encode the image. Experimental results show the effectiveness of the proposed method over the existing method.
This document presents a novel technique for detecting the breast boundary (also known as the skin-air interface or skin-line) in mammogram images using entropy estimation. The proposed method applies a logarithmic transform to increase contrast near the skin line, calculates entropy across the image which changes significantly at the boundary, and uses an exponential transform to enhance boundary detection. The algorithm was tested on 103 mammogram images and evaluated by an expert, achieving accurate boundary detection. The method provides a noise resistant way to detect the important but low-contrast breast boundary for use in computer-aided diagnosis systems.
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
Segmentation is a process of partitioning the image into several objects. It plays a vital role in many fields
such as satellite, remote sensing, object identification, face tracking and most importantly in medical field.
In radiology, magnetic resonance imaging (MRI) is used to investigate the human body processes and
functions of organisms. In hospitals, this technique has been using widely for medical diagnosis, to find the
disease stage and follow-up without exposure to ionizing radiation.Here in this paper, we proposed a novel
MR brain image segmentation method for detecting the tumor and finding the tumor area with improved
performance over conventional segmentation techniques such as fuzzy c means (FCM), K-means and even
that of manual segmentation in terms of precision time and accuracy. Simulation performance shows that
the proposed scheme has performed superior to the existing segmentation methods.
Genetic Algorithm based Analysis of Rigid and Non Rigid Medical ImagesIRJET Journal
This document discusses using a genetic algorithm to analyze and segment overlapping medical images, specifically chromosome images. It begins with an abstract describing how genetic algorithms and image segmentation can be used to identify chromosomal abnormalities by segmenting overlapping chromosome structures. It then provides background on chromosomes and genetic algorithms. The proposed method uses genetic algorithms to optimize an energy function and segment overlapping regions in chromosome images by identifying contrast regions as the fitness function. Masks are created to determine overlapping zones and the cropped image helps identify overlapping regions. The document describes the various steps involved, including binary mapping, image enhancement, contour detection, segmentation of overlapping regions, and identification of overlapping regions using genetic algorithms.
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
Abstract We are considering: local-content (LC) information, global-content (GC) information from PubMed and MESH (medical subject heading-MS) for the clustering of bio-medical documents. The performances of MEDLINE document clustering are enhanced from previous methods by combining both the LC and GC. We propose a semi-supervised spectral clustering method to overcome the limitations of representation space of earlier methods. Keywords- document clustering, semi-supervised clustering, spectral clustering
C OMPARATIVE S TUDY OF D IMENSIONALITY R EDUCTION T ECHNIQUES U SING PCA AND ...csandit
The aim of this paper is to present a comparative s
tudy of two linear dimension reduction
methods namely PCA (Principal Component Analysis) a
nd LDA (Linear Discriminant Analysis).
The main idea of PCA is to transform the high dimen
sional input space onto the feature space
where the maximal variance is displayed. The featur
e selection in traditional LDA is obtained
by maximizing the difference between classes and mi
nimizing the distance within classes. PCA
finds the axes with maximum variance for the whole
data set where LDA tries to find the axes
for best class seperability. The proposed method is
experimented over a general image database
using Matlab. The performance of these systems has
been evaluated by Precision and Recall
measures. Experimental results show that PCA based
dimension reduction method gives the
better performance in terms of higher precision and
recall values with lesser computational
complexity than the LDA based method.
This paper proposes a system gives for explicit content image detection based on Computer Vision Algorithms, pattern recognition and FTK software Explicit Image Detection. In the first stage, HSV color model is used for the input images for the purpose of discriminating elements that are not human skin images. Then the image is filtered using skin detection. The output image only contains the areas of which it is composed. The results show a comparison between the proposed system and the company software Access Data called Forensic Toolkit 3.1 Explicit Image Detection isperformed.
Texture features from Chaos Game Representation Images of GenomesCSCJournals
The proposed work investigates the effectiveness of coarse measures of the Chaos Game Representation (CGR) images in differentiating genomes of various organisms. Major work in this area is seen to focus on feature extraction using Frequency Chaos Game Representation (FCGR) matrices. Although it is biologically significant, FCGR matrix has an inherent error which is associated with the insufficient computing as well as the screen resolutions. Hence the CGR image is converted to a texture image and corresponding feature vectors extracted. Features such as the texture properties and the subsequent wavelet coefficients of the texture image are used. Our work suggests that texture features characterize genomes well further; their wavelet coefficients yield better distinguishing capabilities.
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%.
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern RecognitionTELKOMNIKA JOURNAL
Androgenic hair pattern stated to be the new biometric trait since 2014. The research to improve
the performance of androgenic hair pattern recognition system has begun to be developed due to the
problems that occurred when other apparent biometric trait such as face is hidden from sight. The
recognition system was built with hierarchical Gaussian scale-space using 4 octaves and 3 levels in each
octave. The system also implemented the equalization process to adjust image’s intensity by using
histogram equalization. We analyzed 400 images of androgenic hair in the database that were analyzed
using 2-fold and 10-fold cross validation and Euclidean distance to classify it. The experimental results
showed that our proposed method gave better performance compared to previous work that used Haar
wavelet transformation and principal component analysis as the main method. The best recognition
precision was 94.23 % obtained from the base octave with the third level using histogram equalization and
10-fold cross validation.
Wavelet-Based Color Histogram on Content-Based Image RetrievalTELKOMNIKA JOURNAL
The growth of image databases in many domains, including fashion, biometric, graphic design,
architecture, etc. has increased rapidly. Content Based Image Retrieval System (CBIR) is a technique used
for finding relevant images from those huge and unannotated image databases based on low-level features
of the query images. In this study, an attempt to employ 2nd level Wavelet Based Color Histogram (WBCH)
on a CBIR system is proposed. Image database used in this study are taken from Wang’s image database
containing 1000 color images. The experiment results show that 2nd level WBCH gives better precision
(0.777) than the other methods, including 1st level WBCH, Color Histogram, Color Co-occurrence Matrix,
and Wavelet texture feature. It can be concluded that the 2nd Level of WBCH can be applied to CBIR system.
Human Re-identification with Global and Local Siamese Convolution Neural NetworkTELKOMNIKA JOURNAL
This document proposes a global and local structure of Siamese Convolution Neural Network (SCNN) to perform human re-identification in single-shot approaches. The network extracts features from global and local parts of input images. A decision fusion technique then combines the global and local features. Experimental results on the VIPeR dataset show the proposed method achieves a normalized Area Under Curve score of 95.75% without occlusion, outperforming using local or global features alone. With occlusion, the score is 77.5%, still better than alternatives. The method performs well for re-identification including in occlusion cases by leveraging both global and local information.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ijitjournal
Human pose estimation is one of the key problems in computer visionthat has been studied in the recent
years. The significance of human pose estimation is in the higher level tasks of understanding human
actions applications such as recognition of anomalous actions present in videos and many other related
applications. The human poses can be estimated by extracting silhouettes of humans as silhouettes are
robust to variations and it gives the shape information of the human body. Some common challenges
include illumination changes, variation in environments, and variation in human appearances. Thus there
is a need for a robust method for human pose estimation. This paper presents a study and analysis of
approaches existing for silhouette extraction and proposes a robust technique for extracting human
silhouettes in video sequences. Gaussian Mixture Model (GMM) A statistical approach is combined with
HSV (Hue, Saturation and Value) color space model for a robust background model that is used for
background subtraction to produce foreground blobs, called human silhouettes. Morphological operations
are then performed on foreground blobs from background subtraction. The silhouettes obtained from this
work can be used in further tasks associated with human action interpretation and activity processes like
human action classification, human pose estimation and action recognition or action interpretation.
Filter technique of medical image on multiple morphological gradient methodTELKOMNIKA JOURNAL
Filter technique is supportive for reducing image noise. This paper presents a study on filtering medical images, i.e., CT-Scan, Chest X-ray and Panoramic X-ray collected from two of the most prominent public hospitals in Padang City, Indonesia. The aim of this study preserved to facilitate in diagnosing objects in x-ray medical images. This study used filter technique, i.e. Blur, Emboss, Gaussian, Laplacian, Roberts, Sharpen, or Sobel techniques as pre-processing step. The filter process performed before edge detection and edge clarification. MMG method used in this study to clarify the edge detection. Thus, this research showed the hesitation decline (confidence increase) of the diagnosis of objects contained in medical images.
This document summarizes a study that used neural networks and particle swarm optimization incorporating fuzzy c-means (PSOFCN) segmentation to recognize handwritten characters in the Meetei Mayek script. 34 characters were analyzed. Images were preprocessed, segmented using PSOFCN and recognized using a multilayer feedforward neural network with backpropagation. 1700 samples were used for training and 1700 for testing. Recognition accuracy ranged from 30-100%, with an average of 72%. Characters with simpler shapes had higher accuracy than more complex characters.
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSION acijjournal
This document summarizes a research paper on using the Cholesky decomposition technique to fuse multispectral images and represent them as a color image. It discusses how multispectral image fusion works by combining images from different spectral bands. It then describes the VTVA (Vector valued Total Variation Algorithm) technique in detail, which uses the covariance matrix and Cholesky decomposition to control the correlation between color components in the fused image. This technique is compared to principal component analysis. The document provides background on RGB color space, color perception, and Cholesky decomposition before outlining the specific steps of the VTVA algorithm.
COLOUR IMAGE REPRESENTION OF MULTISPECTRAL IMAGE FUSIONacijjournal
The availability of imaging sensors operating in multiple spectral bands has led to the requirement of
image fusion algorithms that would combine the image from these sensors in an efficient way to give an
image that is more perceptible to human eye. Multispectral Image fusion is the process of combining
images optically acquired in more than one spectral band. In this paper, we present a pixel-level image
fusion that combines four images from four different spectral bands namely near infrared(0.76-0.90um),
mid infrared(1.55-1.75um),thermal- infrared(10.4-12.5um) and mid infrared(2.08-2.35um) to give a
composite colour image. The work coalesces a fusion technique that involves linear transformation based
on Cholesky decomposition of the covariance matrix of source data that converts multispectral source
images which are in grayscale into colour image. This work is composed of different segments that
includes estimation of covariance matrix of images, cholesky decomposition and transformation ones.
Finally, the fused colour image is compared with the fused image obtained by PCA transformation.
A Crop Pests Image Classification Algorithm Based on Deep Convolutional Neura...TELKOMNIKA JOURNAL
Conventional pests image classification methods may not be accurate due to the complex
farmland background, sunlight and pest gestures. To raise the accuracy, the deep convolutional neural
network (DCNN), a concept from Deep Learning, was used in this study to classify crop pests image. On
the ground of our experiments, in which LeNet-5 and AlexNet were used to classify pests image, we have
analyzed the effects of both convolution kernel and the number of layers on the network, and redesigned
the structure of convolutional neural network for crop pests. Further more, 82 common pest types have
been classified, with the accuracy reaching 91%. The comparison to conventional classification methods
proves that our method is not only feasible but preeminent.
Statistical Feature-based Neural Network Approach for the Detection of Lung C...CSCJournals
Lung cancer, if successfully detected at early stages, enables many treatment options, reduced risk of invasive surgery and increased survival rate. This paper presents a novel approach to detect lung cancer from raw chest X-ray images. At the first stage, we use a pipeline of image processing routines to remove noise and segment the lung from other anatomical structures in the chest X-ray and extract regions that exhibit shape characteristics of lung nodules. Subsequently, first and second order statistical texture features are considered as the inputs to train a neural network to verify whether a region extracted in the first stage is a nodule or not . The proposed approach detected nodules in the diseased area of the lung with an accuracy of 96% using the pixel-based technique while the feature-based technique produced an accuracy of 88%.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Face Detection for identification of people in Images of Internetijceronline
One method for searching the internet faces in images is proposed by using digital processing topological with descriptors. Location in real time with the development of a database that stores addresses of internet downloaded images, in which the search is done by text, but by finding facial image, is achieved. Face recognition in images of Internet has proved to be a difficult task, because the images vary considerably depending on viewpoint, illumination, expression, pose, accessories, etc. The descriptors for general information: containing low-level descriptors. Developments on face recognition systems have improved significantly since the first system; image analysis is a topic on which much emphasis is being given in order to identify parameters, visual features in the image that provide environment data that it is represented in the image, but without the intervention of a person. In this project raises its realization using the method of viola and jones as face descriptor. We can distinguish even different parts of the face such as eyes, eyebrows, nose and mouth.One method for searching faces in image taken from internet intends to use digital processing using topological descriptors. It is located the face in real time.
A Novel Efficient Medical Image Segmentation Methodologyaciijournal
Image segmentation plays a crucial role in many medical applications. The threshold based medical image
segmentation approach is the most common and effective method for medical image segmentation, but it
has some shortcomings such as high complexity, poor real time capability and premature convergence, etc.
To address above issues, an improved evolution strategies is proposed to use for medical image
segmentation, there are 2 populations concurrently during evolution, one focuses on local search in order
to search solutions near optimal solution, and the other population that implemented based on chaotic
theory focuses on global search so as to keep the variety of individuals and jump out from the local
maximum to overcome the problem of premature convergence. The encoding scheme, fitness function, and
evolution operators are also designed. The experimental results validated the effectiveness and efficiency of
the proposed approach.
This paper proposes a new fuzzy similarity measure called Fuzzy Monotonic Inclusion (FMI) to measure similarity between images for image retrieval systems. The FMI approach segments images into regions, extracts features for each region, and maps the features into a fuzzy similarity model based on fuzzy inclusion. Experimental results on the Label Me image dataset show the FMI approach achieves higher precision than other methods like Unified Feature Matching and Fuzzy Histogram in identifying images by semantic class.
Skin Color Detection Using Region-Based ApproachCSCJournals
Skin color provides a powerful cue for complex computer vision applications. Although skin color detection has been an active research area for decades, the mainstream technology is based on the individual pixels. This paper, which extended our previous work [1], presented a new region- based technique for skin color detection which outperformed the current state-of-the-art pixel- based skin color detection technique on the popular Compaq dataset [2]. Color and spatial distance based clustering technique is used to extract the regions from the images, also known as superpixels followed by a state-of-the-art non-parametric pixel-based skin color classifier called the basic skin color classifier. The pixel-based skin color evidence is then aggregated to classify the superpixels. Finally, the Conditional Random Field (CRF) is applied to further improve the results. As CRF operates over superpixels, the computational overhead is minimal. Our technique achieved 91.17% true positive rate with 13.12% false negative rate on the Compaq dataset tested over approximately 14,000 web images.
Content based image retrieval based on shape with texture featuresAlexander Decker
This document describes a content-based image retrieval system that extracts shape and texture features from images. It uses the HSV color space and wavelet transform for feature extraction. Color features are extracted by quantizing the H, S, and V components of HSV into unequal intervals based on human color perception. Texture features are extracted using wavelet transforms. The color and texture features are then combined to form a feature vector for each image. During retrieval, the similarity between a query image and images in the database is measured using the Euclidean distance between their feature vectors. The results show that retrieving images using HSV color features provides more accurate results and faster retrieval times compared to using RGB color features.
Multi Resolution features of Content Based Image RetrievalIDES Editor
Many content based retrieval systems have been
proposed to manage and retrieve images on the basis of their
content. In this paper we proposed Color Histogram, Discrete
Wavelet Transform and Complex Wavelet Transform
techniques for efficient image retrieval from huge database.
Color Histogram technique is based on exact matching of
histogram of query image and database. Discrete Wavelet
transform technique retrieves images based on computation
of wavelet coefficients of subbands. Complex Wavelet
Transform technique includes computation of real and
imaginary part to extract the details from texture. The
proposed method is tested on COREL1000 database and
retrieval results have demonstrated a significant improvement
in precision and recall.
This document presents research on content-based image retrieval using color and texture features. It proposes using both quadratic distance based on color histograms to measure color similarity, and pyramid structure wavelet transforms and gray level co-occurrence matrix (GLCM) to measure texture. For color features, quadratic distance is calculated between color histograms to retrieve similar images based on color. For texture, pyramid structure wavelet transforms are used to decompose images into sub-bands and calculate energy levels, while GLCM extracts texture statistics. The methods are evaluated on a dataset of 10000 images and results show the integrated approach of color and texture features provides more accurate and faster retrieval compared to individual features.
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
There are many researchers who have studied the relevance feedback in the literature of content based image
retrieval (CBIR) community, but none of CBIR search engines support it because of scalability, effectiveness
and efficiency issues. In this, we had implemented an integrated relevance feedback for retrieving of web
images. Here, we had concentrated on integration of both textual features (TF) and visual features (VF) based
relevance feedback (RF), simultaneously we also tested them individually. The TFRF employs and effective
search result clustering (SRC) algorithm to get salient phrases. Then a new user interface (UI) is proposed to
support RF. Experimental results show that the proposed algorithm is scalable, effective and accurated
Similar to Biometric identification using augmented database (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
2. ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
104
augmented images by using Gaussian function. Moreover, we also studied the effect of HSV
and YCbCr color spaces to the augmented data to extract human skin color area in the images.
The rest of this paper is defined as follow: section 2 describes the research method conducted
in this paper. In section 3, the results are discussed and analyzed. Finally, conclusion is
summed up in section 4.
2. Research Method
The research method implemented in this research was built based upon three parts
processes. The first part was to build the augmented data base from limited data in the system.
The second part was to build the scaling hierarchical structure using Gaussian filter and the
third part was to find the closest matching of the training and the testing data. Figure 1 below
explains the three part processes of research method executed in this research.
Figure 1. Research method for biometric identification
2.1. Augmented Database
In real life condition, sometimes there are limited data that can be acquired. The limited
data explains as only a few images acquired for the same person from the acquiring device
such as digital camera. In this research there were only two images from the same person in the
system. The two images varied in pose, lighting condition, angle, background information and
noise. There were 25 male respondents with two images each, there were total 50 images in the
early limited data base. In this research, the data augmentation technique was applied to the
limited data base, producing more images derived from the original one. The technique to
augment the data was based on geometric transformation such as rotation (1), reflection (2),
color adjustment and intensity adjustment [12]. The color adjustment limits and enhances the
contrast of the images while the intensity adjustment is proposed to make the images darker
than earlier.
[
𝑚2
𝑛2
] = [
𝑐𝑜𝑠𝜃 −𝑠𝑖𝑛𝜃
𝑠𝑖𝑛𝜃 𝑐𝑜𝑠𝜃
] [
𝑚1
𝑛1
] (1)
[
𝑚2
𝑛2
] = [
−1 0
0 1
] [
𝑚1
𝑛1
] (2)
The two original images in the early database were divided into training and testing
images. The augmented data were derived from both division but the augmented images from
testing images were notincluded to the training phase. There were 39 augmented images from 1
original image. Figure 2 describes the augmented process that took place in this research.
Figure 2. Data augmentation process
Scale-Space Matching
Identification System
Precision of
System
Limited
Data
Augmented
Database
3. TELKOMNIKA ISSN: 1693-6930
Biometric identification using augmented database (Regina Lionnie)
105
All original images and augmented images were 203x352 in pixels. The skin color
extraction in this research ran on two color spaces, HSV and YCbCr that was studied before
in [9]. These color spaces worked best for extracting human skin color component. Both HSV
and YCbCr are the color spaces that separate luminance and chrominance components. It is
shown that pixels with the range of human skin color have similarity in chrominance component
and it is best to discriminate color of skin and not skin area [13]. The rules of HSV skin color
area extraction is shown in (3) while the YCbCr in (4) [9]. The extraction process removed the
background (area that was not detected as human skin color) and replaced it with black and
white color.
S > 0.35 (3)
101 < Cb < 125
130 < Cr < 155 (4)
2.2. Scale-space with Hierarchical Gaussian Filter
By building scale-space of an image, it permits us to analyse an image at multi
resolutions [14]. The different resolution improves the system of identification by representing
original images in different scale. The idea behind Gaussian scale-space [15] is to filter the
original image with Gaussian function of desired width and decimates the last output from the
filter process to start again as the next scale from the same image.
The process began with convolving the input image with Gaussian function with the
width 𝜎 as it can be seen in (5) until (8). These equations can be seen in more detail
explanation in previous work in [8]. The width of the Gaussian was𝜎0 = 1.6 and 𝜎𝑠 = 0.5 as it
was used before in [8], [16]. The total level for this research was V=3 while vvaried in each
level. There were also 4 octaves (U) that was constructed. In one octave, the image was
convolved by the Gaussian with the width in (7) and (8). If it reached the last level, the octave
went higher and the base level for the next level was to decimate the image by the factor of 2.
The process continued until it reached the 4th octave with the 3rd level. The process of building
Gaussian scale space can be seen in Figure 3 below. For the base octave (u=0) and level
(v=0), the input image was convolved by Gaussian with the width in (7). To create the next level
(v=1,2,3) within the same octave (u=0), the base level was convolved with the Gaussian with
the width in (8). For the base level in the next octave, the process just decimated (by the factor
of two) the last level from the previous octave and did not convolve the image with the
Gaussian. To build the next level (v=1,2,3) for the next octave (u≠ 0), the image on the base
level in each octave was convolved with the Gaussian with the width in (8).
Figure 3. Building the scale-space [8]
G(m,n,σ) = H(m,n,σ) ∗ I(m,n) (5)
4. ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
106
H(m,n,σ) =
1
2πσ
e
−
(m2+n2)
2σ2
(6)
σ0̂ = √σ0
2
− σs
2 (7)
σv̂ = σ0. √22v/V − 1 (8)
In [8], the authors adopted the method Hierarchical Gaussian Scale-Space for
androgenic hair pattern recognition. There were 400 original varied images were studied without
any augmented images. In this research the same method was applied to study the
performance of the augmented images in the data base for a limited data recognition system.
2.3. Matching Algorithm
The matching algorithm in this research employed the nearest distance calculation
using Euclidean distance. It matched the closest data of testing set to the training set. The
configuration of the testing set and the training set are illustrated in Figure 4. Both testing and
training images were augmented for 39 augmented images for each original image. When the
testing image was being processed, the augmented images derived from the testing set were
not included into the system while the 39 augmented images each from remaining 49 images of
training images and the original 49 images themselves were included into the matching process.
The total testing set for one matching process was 1 image while the training set was 49x39
augmented images+49 original images=1.960 images. There were 50 matching processes in
total.
Figure 4. The configuration of training and testing set
3. Results and Analysis
The results are shown in Table 1 and Figure 5 and Figure 6. Table 1 presents the
recognition system precision in percentage of how much accurate the system identifies the
testing images to the right class of training images. The alphabet on each row represents the
type of the dataset meanwhile the number on each column represents the type of augmented
data base that were created. All type of databases were 2000 images in total with 50 original
images and 1950 augmented images. The A and B types means the database with the variety
of original images with different pose, lighting condition, background different noise. The number
1 until 5 for type A and B means the original augmented database for A1 and B1, the skin
extracted using HSV rule from (3) with black background for A2 and B2 and white background
for A3 and B3, the skin extracted using YCbCr rule from (4) with black background for A4 and
B4 and white background for A5 and B5. Meanwhile type C until L is the database of
scale-space from A1 to B5 with 4 octaves and 3 levels of hierarchical Gaussian scale-space.
The C1-C13 is the scale-space images from A1 with C1 is the base octave and base level and
C13 is the 4th octave and the 3rd level. The L1-L13 is the scale-spaces images from B5 with L1
is the base octave and base level and L13 is the 4th octave and the 3rd level.
5. TELKOMNIKA ISSN: 1693-6930
Biometric identification using augmented database (Regina Lionnie)
107
Figure 5. The precision recognition system with augmented database and scale-space
Figure 6. The performance comparison for augmented database
Figure 5 describes the performance result focuses on the scale-space by Gaussian
function on each octave and level. The horizontal axis gives the information about the type of
level and octaves. Axis one means base octave and level while axis 13 means last octave and
last level. Meanwhile different type of line gives the information about the database type.
Figure 6 shows the performance comparison for the best recognition result from each type of
data base.
From Figure 5 and Figure 6, we can see the performance of scale-space images to the
recognition system. The performance of recognition using the scale-space database (C-L) was
better than using the database only with augmented images (A-B). The best performance result
came from using the base octave and the level 4th database images with the type augmentation
D4, F4 and K4 which was 70%. The D4, F4 and K4 types of database were respectively the
scale-space version of the A2, A4 and B4 from the base octave and the last level. The
recognition precision from A2, A4 and B4 were 42%, 24% and 24% respectively. The A2
database was the database of augmented images with skin extraction from the background
using the rule (3) of HSV color space. The background of non-human skin color was converted
into black color. The A4 database was the database of augmented images with also skin
extraction background process but with the rule (4) from YCbCr color space. The background of
non-human skin color was also converted into black color. Meanwhile, the B4 database was
also augmented database but with different type of noise compare to A database with human
skin color extraction process using YCbCr in rule (4) and converted into black color.
6. ISSN: 1693-6930
TELKOMNIKA Vol.17, No. 1, February 2019: 103-109
108
Table 1. Recognition Precision for Augmented Database
Recognition Precision (%)
1 2 3 4 5 6 7 8 9 10 11 12 13
A 12 42 10 24 12 - - - - - - - -
B 14 46 8 24 14 - - - - - - - -
C 50 52 56 60 48 48 46 46 46 46 46 46 46
D 68 68 68 70 56 56 56 56 54 54 52 50 50
E 26 26 26 28 46 46 46 46 44 44 42 42 40
F 66 68 70 70 56 56 56 56 54 54 52 52 52
G 26 26 26 28 46 46 46 46 44 44 42 40 40
H 48 52 56 60 48 48 46 46 44 44 44 46 46
I 66 68 68 68 58 58 56 56 54 54 54 50 50
J 28 28 28 30 48 48 46 46 44 44 46 42 40
K 66 68 70 70 58 58 56 56 54 54 54 52 52
L 28 28 28 30 48 48 46 46 44 44 44 42 40
From here, we examined that the best recognition rate came from the images from the
same octave in the scale-space which meant that the decimation process to create the next
octave lowered the recognition rate. The process to decimate the image or to lower the
resolution of the image took adverse effect to the recognition system. Especially from Figure 5,
we can see this as the abrupt changes from 4 to 5 on the database type C, D, F, H, I and K.
While for the database type E, G, J and L, the decimation process of going from the base
octave to the next octave by changing the image resolution took advantage for the recognition
system. This was studied as the effect of the removal of background of non-human skin color
and changed it to white color. The white color needed the decimation process and reduced the
images in resolution to give the beneficial effect to the recognition system. The case for
database type E, G J and L although did not produce recognition rate as high as the type C, D,
F, H, I and K.
Figure 7 shows the example of augmented images for each database. As it was
explained earlier, there were 39 augmented images in each type of database. After further
investigation, we found that the type of the augmented images that gave the closest match to
the testing processes were mostly the type of the images with the augmented process of
intensity adjustment and with rotation transformation.
Figure 7. The Examples of 39 Augmented Images from Type A and B Database
In [11], the authors studied the performance of several methods for limited data
recognition system. It was shown that the SIFT algorithm was the best method and gave higher
performance of recognition precision which was 38% compared to Haar wavelet transformation,
principal component analysis and hierarchical Gaussian scale-space which each of them
produced around 30-32%. The total images that were studied in the research were 50 images
with one testing image and one training image only from the same class / person. By developing
the augmented database for the recognition system, we experimented on the images and
multiplied the numbers into 39 times bigger. The recognition precision with the augmented
database went more than two times higher than the recognition system with limited training
7. TELKOMNIKA ISSN: 1693-6930
Biometric identification using augmented database (Regina Lionnie)
109
data. The obstacle for getting higher precision was coming from choosing the type of
augmented process that used in the recognition system.
4. Conclusion
In this research, the augmented databases were created with different type of human
skin color extraction by employing HSV, YCbCr color spaces and scale-space using Gaussian
function. The best recognition performance which was 70%, obtained from D4, F4 and K4, the
database that scaled-spaces the images with base octave and 4th level of Gaussian function
and was extracted the human skin color component using HSV and YCbCr and changed it into
the black background images. The decimation process of reducing the resolution of images in
the scale-space structures gave adverse effect on the black background extracted human skin
color. On the contrary, it gave beneficial effect on white background extracted human skin color.
The type of augmented process that produced the best recognition mostly from intensity
adjustment process and rotation transformation. The augmented database compared to limited
data recognition system resulted in advantageous outcome on the recognition performance. It
improves the precision rate until more than 2 times higher.
Acknowledgement
This work was supported by Indonesia Ministry of Research, Technology and Higher
Education, RISTEKDIKTI 2018 Research Fund.
References
[1] Tariq A, Akram M U. Personal identification using ear recognition. TELKOMNIKA Telecommunication
Computing Electronics and Control. 2012; 10(2): 321-326.
[2] Jain AK. Editor. Handbook of Biometrics. Springer. 2008.
[3] Su H, Kong A W K. A Study on Low Resolution Androgenic Hair Patterns for Criminal and Victim
Identification. IEEE Transactions on Information Forensics and Security. 2014; 9(4): 666-680.
[4] Palastanga N, Soames R. Anatomy and Human Movement: Structure and Function. Sixth Edition.
Elsevier Churchill Livingstone. 2012: 541.
[5] Chan F K S, Kong AWK. Using Hair Follicles with Leg Geometry to Align Androgenic Hair Patterns.
Intelligence and Security Informatics Conference. Manchester. 2015: 137-140.
[6] Lionnie R, Alaydrus M. An Analysis of Haar Wavelet Transform for Androgenic Hair Pattern
Recognition. Proceedings of The First International Conference on Informatics and Computing.
Lombok. 2016.
[7] Lionnie R, Alaydrus M. Biometric Identification System based on Principal Component Analysis.
Proceedings of The 12th
IMT-GT International Conference on Mathematics, Statistics and Their
Applications. Banda Aceh. 2016.
[8] Lionnie R, Alaydrus M. Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition.
TELKOMNIKA Telecommunication Computing Electronics and Control. 2017; 15(1): 522-530.
[9] Lionnie R, Alaydrus M. A comparison of human skin color detection for biometrie identification.
Broadband Communication, Wireless Sensors and Powering (BCWSP), 2017 International
Conference. 2017: 1-5.
[10] Chan F K S, Kong AWK. A further study of low resolution androgenic hair patterns as a soft biometric
trait. Image and Vision Computing. 2017.
[11] Lionnie, R. Androgenic Hair Recognition For Biometric Identification. Master Thesis. Jakarta:
Postgraduate UMB; 2017.
[12] Solomon B. Linear Algebra Geometry and Transformation. CRC Press. 2015.
[13] Anwar N, Kit CW, John S. RGB-H-CbCr Skin Colour Model for Human Face Detection. Proceedings of
the MMU International Symposium on Information & Communications Technologies. Petaling Jaya.
2006.
[14] Sporring J, Nielsen M, Florack L and Johansen P. Editors. Gaussian Scale Space Theory. Springer.
1997.
[15] Lindeberg T. Scale-Space Theory in Computer Vision. Kluwer Academic Publishers. 1994: 48.
[16] Lowe DG. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of
Computer Vision. 2004; 60(2): 91-110.