Evaluating the Performances of the Agoraphilic Navigation Algorithm under Dead-Lock Situations
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th IEEE International Symposium on Industrial Electronics, ISIE 2020 Vol. 2020-June, p. 536-542
- Full Text:
- Reviewed:
- Description: This paper presents a summary of the research which was conducted in developing a new free-space based (Agoraphilic) navigation algorithm. This new methodology is capable of maneuvering robots in static as well as dynamically cluttered unknown environments. The new algorithm uses only one force to drive the robot. This force is always an attractive force created by the freespace. This force is focused towards the goal by a force shaping module. Consequently, the robot is motivated to follow free-space directing towards the goal. As this method only based on the attractive forces, the robot always moves towards the goal as long as there is free-space . This method has eradicated many drawbacks of the traditional APF method. Several experimental tests were conducted using Turtlebot3 research platform. These tests were focused on testing the behavior of the new algorithm under dead-lock (local minima) situations for APF method. The test results proved that the proposed algorithm has successfully eliminated the local minima problem of APF method. © 2020 IEEE.
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th IEEE International Symposium on Industrial Electronics, ISIE 2020 Vol. 2020-June, p. 536-542
- Full Text:
- Reviewed:
- Description: This paper presents a summary of the research which was conducted in developing a new free-space based (Agoraphilic) navigation algorithm. This new methodology is capable of maneuvering robots in static as well as dynamically cluttered unknown environments. The new algorithm uses only one force to drive the robot. This force is always an attractive force created by the freespace. This force is focused towards the goal by a force shaping module. Consequently, the robot is motivated to follow free-space directing towards the goal. As this method only based on the attractive forces, the robot always moves towards the goal as long as there is free-space . This method has eradicated many drawbacks of the traditional APF method. Several experimental tests were conducted using Turtlebot3 research platform. These tests were focused on testing the behavior of the new algorithm under dead-lock (local minima) situations for APF method. The test results proved that the proposed algorithm has successfully eliminated the local minima problem of APF method. © 2020 IEEE.
Graduate employment prediction with bias
- Guo, Teng, Xia, Feng, Zhen, Shihao, Bai, Xiaomei, Zhang, Dongyu
- Authors: Guo, Teng , Xia, Feng , Zhen, Shihao , Bai, Xiaomei , Zhang, Dongyu
- Date: 2020
- Type: Text , Conference paper
- Relation: AAAI 2020 - 34th AAAI Conference on Artificial Intelligence p. 670-677
- Full Text:
- Reviewed:
- Description: The failure of landing a job for college students could cause serious social consequences such as drunkenness and suicide. In addition to academic performance, unconscious biases can become one key obstacle for hunting jobs for graduating students. Thus, it is necessary to understand these unconscious biases so that we can help these students at an early stage with more personalized intervention. In this paper, we develop a framework, i.e., MAYA (Multi-mAjor emploYment stAtus) to predict students’ employment status while considering biases. The framework consists of four major components. Firstly, we solve the heterogeneity of student courses by embedding academic performance into a unified space. Then, we apply a generative adversarial network (GAN) to overcome the class imbalance problem. Thirdly, we adopt Long Short-Term Memory (LSTM) with a novel dropout mechanism to comprehensively capture sequential information among semesters. Finally, we design a bias-based regularization to capture the job market biases. We conduct extensive experiments on a large-scale educational dataset and the results demonstrate the effectiveness of our prediction framework. Copyright © 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Feng Xia” is provided in this record**
- Authors: Guo, Teng , Xia, Feng , Zhen, Shihao , Bai, Xiaomei , Zhang, Dongyu
- Date: 2020
- Type: Text , Conference paper
- Relation: AAAI 2020 - 34th AAAI Conference on Artificial Intelligence p. 670-677
- Full Text:
- Reviewed:
- Description: The failure of landing a job for college students could cause serious social consequences such as drunkenness and suicide. In addition to academic performance, unconscious biases can become one key obstacle for hunting jobs for graduating students. Thus, it is necessary to understand these unconscious biases so that we can help these students at an early stage with more personalized intervention. In this paper, we develop a framework, i.e., MAYA (Multi-mAjor emploYment stAtus) to predict students’ employment status while considering biases. The framework consists of four major components. Firstly, we solve the heterogeneity of student courses by embedding academic performance into a unified space. Then, we apply a generative adversarial network (GAN) to overcome the class imbalance problem. Thirdly, we adopt Long Short-Term Memory (LSTM) with a novel dropout mechanism to comprehensively capture sequential information among semesters. Finally, we design a bias-based regularization to capture the job market biases. We conduct extensive experiments on a large-scale educational dataset and the results demonstrate the effectiveness of our prediction framework. Copyright © 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Feng Xia” is provided in this record**
Graph Force Learning
- Sun, Ke, Liu, Jiaying, Yu, Shuo, Xu, Bo, Xia, Feng
- Authors: Sun, Ke , Liu, Jiaying , Yu, Shuo , Xu, Bo , Xia, Feng
- Date: 2020
- Type: Text , Conference paper
- Relation: 8th IEEE International Conference on Big Data, Big Data 2020 p. 2987-2994
- Full Text:
- Reviewed:
- Description: Features representation leverages the great power in network analysis tasks. However, most features are discrete which poses tremendous challenges to effective use. Recently, increasing attention has been paid on network feature learning, which could map discrete features to continued space. Unfortunately, current studies fail to fully preserve the structural information in the feature space due to random negative sampling strategy during training. To tackle this problem, we study the problem of feature learning and novelty propose a force-based graph learning model named GForce inspired by the spring-electrical model. GForce assumes that nodes are in attractive forces and repulsive forces, thus leading to the same representation with the original structural information in feature learning. Comprehensive experiments on three benchmark datasets demonstrate the effectiveness of the proposed framework. Furthermore, GForce opens up opportunities to use physics models to model node interaction for graph learning. © 2020 IEEE.
- Authors: Sun, Ke , Liu, Jiaying , Yu, Shuo , Xu, Bo , Xia, Feng
- Date: 2020
- Type: Text , Conference paper
- Relation: 8th IEEE International Conference on Big Data, Big Data 2020 p. 2987-2994
- Full Text:
- Reviewed:
- Description: Features representation leverages the great power in network analysis tasks. However, most features are discrete which poses tremendous challenges to effective use. Recently, increasing attention has been paid on network feature learning, which could map discrete features to continued space. Unfortunately, current studies fail to fully preserve the structural information in the feature space due to random negative sampling strategy during training. To tackle this problem, we study the problem of feature learning and novelty propose a force-based graph learning model named GForce inspired by the spring-electrical model. GForce assumes that nodes are in attractive forces and repulsive forces, thus leading to the same representation with the original structural information in feature learning. Comprehensive experiments on three benchmark datasets demonstrate the effectiveness of the proposed framework. Furthermore, GForce opens up opportunities to use physics models to model node interaction for graph learning. © 2020 IEEE.
Implicit feedback-based group recommender system for internet of things applications
- Guo, Zhiwei, Yu, Keping, Guo, Tan, Bashir, Ali, Imran, Muhammad, Guizani, Mohsen
- Authors: Guo, Zhiwei , Yu, Keping , Guo, Tan , Bashir, Ali , Imran, Muhammad , Guizani, Mohsen
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE Global Communications Conference, GLOBECOM 2020, Virtual Taipei, 7-11 December 2020 Vol. 2020-January
- Full Text:
- Reviewed:
- Description: With the prevalence of Internet of Things (IoT)-based social media applications, the distance among people has been greatly shortened. As a result, recommender systems in IoT-based social media need to be developed oriented to groups of users rather than individual users. However, existing methods were highly dependent on explicit preference feedbacks, ignoring scenarios of implicit feedbacks. To remedy such gap, this paper proposes an implicit feedback-based group recommender system using probabilistic inference and non-cooperative game (GREPING) for IoT-based social media. Particularly, unknown process variables can be estimated from observable implicit feedbacks via Bayesian posterior probability inference. In addition, the globally optimal recommendation results can be calculated with the aid of non-cooperative game. Two groups of experiments are conducted to assess the GREPING from two aspects: efficiency and robustness. Experimental results show obvious promotion and considerable stability of the GREPING compared to baseline methods. © 2020 IEEE.
- Authors: Guo, Zhiwei , Yu, Keping , Guo, Tan , Bashir, Ali , Imran, Muhammad , Guizani, Mohsen
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE Global Communications Conference, GLOBECOM 2020, Virtual Taipei, 7-11 December 2020 Vol. 2020-January
- Full Text:
- Reviewed:
- Description: With the prevalence of Internet of Things (IoT)-based social media applications, the distance among people has been greatly shortened. As a result, recommender systems in IoT-based social media need to be developed oriented to groups of users rather than individual users. However, existing methods were highly dependent on explicit preference feedbacks, ignoring scenarios of implicit feedbacks. To remedy such gap, this paper proposes an implicit feedback-based group recommender system using probabilistic inference and non-cooperative game (GREPING) for IoT-based social media. Particularly, unknown process variables can be estimated from observable implicit feedbacks via Bayesian posterior probability inference. In addition, the globally optimal recommendation results can be calculated with the aid of non-cooperative game. Two groups of experiments are conducted to assess the GREPING from two aspects: efficiency and robustness. Experimental results show obvious promotion and considerable stability of the GREPING compared to baseline methods. © 2020 IEEE.
Motivational factors of Australian mobile gamers
- Greenwood, Jordan, Achterbosch, Leigh, Meredith, Grant, Vamplew, Peter
- Authors: Greenwood, Jordan , Achterbosch, Leigh , Meredith, Grant , Vamplew, Peter
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2020); Melbourne, Australia; 4th-6th February 2020 p. 6
- Full Text:
- Reviewed:
- Description: Mobile games are a fast growing industry, overtaking all other video game platforms with year on year increases in revenue. Many studies have been conducted to explore the motivations of why video games players play their selected games. However very little research has focused on mobile gamers. In addition, Australian studies on the topic are sparse. This paper aimed to discover what motivates a mobile gamer from the perspective of the initial motivational factors attracting them to a mobile game, and the motivational factors that provide interest to continue playing and thereby increase game longevity. A survey was conducted online for Australian participants, which attracted 123 respondents. The survey was formulated by focusing on the 12 key subcomponents as motivational factors of the Gamer Motivational Profile v2 model devised by Quantic Foundry. It was discovered that mobile gamers are a completely different breed of gamer in contrast to the general video gamer. Strategy and challenge which are subcomponents of mastery proved popular among all mobile gamers, while destruction and excitement, subcomponents of action, were often the least motivating factors of all. With the newly discovered data, perhaps mobile game developers can pursue the correct avenues of game design when catering to their target audience.
- Authors: Greenwood, Jordan , Achterbosch, Leigh , Meredith, Grant , Vamplew, Peter
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2020); Melbourne, Australia; 4th-6th February 2020 p. 6
- Full Text:
- Reviewed:
- Description: Mobile games are a fast growing industry, overtaking all other video game platforms with year on year increases in revenue. Many studies have been conducted to explore the motivations of why video games players play their selected games. However very little research has focused on mobile gamers. In addition, Australian studies on the topic are sparse. This paper aimed to discover what motivates a mobile gamer from the perspective of the initial motivational factors attracting them to a mobile game, and the motivational factors that provide interest to continue playing and thereby increase game longevity. A survey was conducted online for Australian participants, which attracted 123 respondents. The survey was formulated by focusing on the 12 key subcomponents as motivational factors of the Gamer Motivational Profile v2 model devised by Quantic Foundry. It was discovered that mobile gamers are a completely different breed of gamer in contrast to the general video gamer. Strategy and challenge which are subcomponents of mastery proved popular among all mobile gamers, while destruction and excitement, subcomponents of action, were often the least motivating factors of all. With the newly discovered data, perhaps mobile game developers can pursue the correct avenues of game design when catering to their target audience.
On the correlation between research complexity and academic competitiveness
- Ren, Jing, Lee, Ivan, Wang, Lei, Chen, Xiangtai, Xia, Feng
- Authors: Ren, Jing , Lee, Ivan , Wang, Lei , Chen, Xiangtai , Xia, Feng
- Date: 2020
- Type: Text , Conference paper
- Relation: 22nd International Conference on Asia-Pacific Digital Libraries, ICADL 2020, Kyoto, Japan, 30 November to 1 December 2020, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12504 LNCS, p. 416-422
- Full Text:
- Reviewed:
- Description: Academic capacity is a common way to reflect the educational level of a country or district. The aim of this study is to explore the difference between the scientific research level of institutions and countries. By proposing an indicator named Citation-weighted Research Complexity Index (CRCI), we profile the academic capacity of universities and countries with respect to research complexity. The relationships between CRCI of universities and other relevant academic evaluation indicators are examined. To explore the correlation between academic capacity and economic level, the relationship between research complexity and GDP per capita is analysed. With experiments on the Microsoft Academic Graph data set, we investigate publications across 183 countries and universities from the Academic Ranking of World Universities in 19 research fields. Experimental results reveal that universities with higher research complexity have higher fitness. In addition, for developed countries, the development of economics has a positive correlation with scientific research. Furthermore, we visualize the current level of scientific research across all disciplines from a global perspective. © 2020, Springer Nature Switzerland AG.
- Authors: Ren, Jing , Lee, Ivan , Wang, Lei , Chen, Xiangtai , Xia, Feng
- Date: 2020
- Type: Text , Conference paper
- Relation: 22nd International Conference on Asia-Pacific Digital Libraries, ICADL 2020, Kyoto, Japan, 30 November to 1 December 2020, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12504 LNCS, p. 416-422
- Full Text:
- Reviewed:
- Description: Academic capacity is a common way to reflect the educational level of a country or district. The aim of this study is to explore the difference between the scientific research level of institutions and countries. By proposing an indicator named Citation-weighted Research Complexity Index (CRCI), we profile the academic capacity of universities and countries with respect to research complexity. The relationships between CRCI of universities and other relevant academic evaluation indicators are examined. To explore the correlation between academic capacity and economic level, the relationship between research complexity and GDP per capita is analysed. With experiments on the Microsoft Academic Graph data set, we investigate publications across 183 countries and universities from the Academic Ranking of World Universities in 19 research fields. Experimental results reveal that universities with higher research complexity have higher fitness. In addition, for developed countries, the development of economics has a positive correlation with scientific research. Furthermore, we visualize the current level of scientific research across all disciplines from a global perspective. © 2020, Springer Nature Switzerland AG.
Partial undersampling of imbalanced data for cyber threats detection
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal
- Authors: Moniruzzaman, Md , Bagirov, Adil , Gondal, Iqbal
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 Australasian Computer Science Week Multiconference, ACSW 2020
- Full Text:
- Reviewed:
- Description: Real-time detection of cyber threats is a challenging task in cyber security. With the advancement of technology and ease of access to the internet, more and more individuals and organizations are becoming the target for various cyber attacks such as malware, ransomware, spyware. The target of these attacks is to steal money or valuable information from the victims. Signature-based detection methods fail to keep up with the constantly evolving new threats. Machine learning based detection has drawn more attention of researchers due to its capability of detecting new and modified attacks based on previous attack's behaviour. The number of malicious activities in a certain domain is significantly low compared to the number of normal activities. Therefore, cyber threats detection data sets are imbalanced. In this paper, we proposed a partial undersampling method to deal with imbalanced data for detecting cyber threats. © 2020 ACM.
- Description: E1
- Authors: Moniruzzaman, Md , Bagirov, Adil , Gondal, Iqbal
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 Australasian Computer Science Week Multiconference, ACSW 2020
- Full Text:
- Reviewed:
- Description: Real-time detection of cyber threats is a challenging task in cyber security. With the advancement of technology and ease of access to the internet, more and more individuals and organizations are becoming the target for various cyber attacks such as malware, ransomware, spyware. The target of these attacks is to steal money or valuable information from the victims. Signature-based detection methods fail to keep up with the constantly evolving new threats. Machine learning based detection has drawn more attention of researchers due to its capability of detecting new and modified attacks based on previous attack's behaviour. The number of malicious activities in a certain domain is significantly low compared to the number of normal activities. Therefore, cyber threats detection data sets are imbalanced. In this paper, we proposed a partial undersampling method to deal with imbalanced data for detecting cyber threats. © 2020 ACM.
- Description: E1
Web of scholars : a scholar knowledge graph
- Liu, Jiaying, Ren, Jing, Zheng, Wenqing, Chi, Lianhua, Lee, Ivan, Xia, Feng
- Authors: Liu, Jiaying , Ren, Jing , Zheng, Wenqing , Chi, Lianhua , Lee, Ivan , Xia, Feng
- Date: 2020
- Type: Text , Conference paper
- Relation: 43rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2020 p. 2153-2156
- Full Text:
- Reviewed:
- Description: In this work, we demonstrate a novel system, namely Web of Scholars, which integrates state-of-the-art mining techniques to search, mine, and visualize complex networks behind scholars in the field of Computer Science. Relying on the knowledge graph, it provides services for fast, accurate, and intelligent semantic querying as well as powerful recommendations. In addition, in order to realize information sharing, it provides open API to be served as the underlying architecture for advanced functions. Web of Scholars takes advantage of knowledge graph, which means that it will be able to access more knowledge if more search exist. It can be served as a useful and interoperable tool for scholars to conduct in-depth analysis within Science of Science. © 2020 ACM.
- Authors: Liu, Jiaying , Ren, Jing , Zheng, Wenqing , Chi, Lianhua , Lee, Ivan , Xia, Feng
- Date: 2020
- Type: Text , Conference paper
- Relation: 43rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2020 p. 2153-2156
- Full Text:
- Reviewed:
- Description: In this work, we demonstrate a novel system, namely Web of Scholars, which integrates state-of-the-art mining techniques to search, mine, and visualize complex networks behind scholars in the field of Computer Science. Relying on the knowledge graph, it provides services for fast, accurate, and intelligent semantic querying as well as powerful recommendations. In addition, in order to realize information sharing, it provides open API to be served as the underlying architecture for advanced functions. Web of Scholars takes advantage of knowledge graph, which means that it will be able to access more knowledge if more search exist. It can be served as a useful and interoperable tool for scholars to conduct in-depth analysis within Science of Science. © 2020 ACM.
Agoraphilic navigation algorithm in dynamic environment with and without prediction of moving objects location
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Are ERP simulation games assisting students to be job-ready? An Australian universities’ perspective
- Faisal, Nadia, Chadhar, Mehmood, Goriss-Hunter, Anitra, Stranieri, Andrew
- Authors: Faisal, Nadia , Chadhar, Mehmood , Goriss-Hunter, Anitra , Stranieri, Andrew
- Date: 2019
- Type: Text , Conference paper
- Relation: 30th Australiasian Conference on Information Systems (ACIS), 9-11 December 2019, Perth, Australia
- Full Text:
- Reviewed:
- Description: Deep and rapid changes in digital enterprise technology exceed the ability of traditional teaching methods to prepare students for challenges encountered in modern enterprises. Researchers proposed different pedagogical approaches to teach ERP (Enterprise Resource Planning) concepts such as ERPsim games to enhance students’ learning and job-readiness. Although the ERPsim studies verified the role of these games in enhancing students’ learning, whether these games contribute to student’s job readiness still needs to be explored. Using the mixed-method approach, this research-in-progress is designed to fill this gap by investigating the role of ERPsim game in increasing skills, learning levels, and job-readiness among university students in Australia. The findings from this study can contribute to the improvement of ERP pedagogical techniques. In addition, this research-in-progress will provide a concrete mapping to align learning outcomes/skills with ICT industry competencies standards as defined in SFIA (Skills framework for Information Age) and AQF (Australian Qualifications Framework).
Are ERP simulation games assisting students to be job-ready? An Australian universities’ perspective
- Authors: Faisal, Nadia , Chadhar, Mehmood , Goriss-Hunter, Anitra , Stranieri, Andrew
- Date: 2019
- Type: Text , Conference paper
- Relation: 30th Australiasian Conference on Information Systems (ACIS), 9-11 December 2019, Perth, Australia
- Full Text:
- Reviewed:
- Description: Deep and rapid changes in digital enterprise technology exceed the ability of traditional teaching methods to prepare students for challenges encountered in modern enterprises. Researchers proposed different pedagogical approaches to teach ERP (Enterprise Resource Planning) concepts such as ERPsim games to enhance students’ learning and job-readiness. Although the ERPsim studies verified the role of these games in enhancing students’ learning, whether these games contribute to student’s job readiness still needs to be explored. Using the mixed-method approach, this research-in-progress is designed to fill this gap by investigating the role of ERPsim game in increasing skills, learning levels, and job-readiness among university students in Australia. The findings from this study can contribute to the improvement of ERP pedagogical techniques. In addition, this research-in-progress will provide a concrete mapping to align learning outcomes/skills with ICT industry competencies standards as defined in SFIA (Skills framework for Information Age) and AQF (Australian Qualifications Framework).
Assessing transformer oil quality using deep convolutional networks
- Alam, Mohammad, Karmakar, Gour, Islam, Syed, Kamruzzaman, Joarder, Chetty, Madhu, Lim, Suryani, Appuhamillage, Gayan, Chattopadhyay, Gopi, Wilcox, Steve, Verheyen, Vincent
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
Blockchain leveraged task migration in body area sensor networks
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
Challenges and opportunities for blockchain technology adoption : a systematic review
- Chhina, Shipra, Chadhar, Mehmood, Vatanasakdakul, Savanid, Chetty, Madhu
- Authors: Chhina, Shipra , Chadhar, Mehmood , Vatanasakdakul, Savanid , Chetty, Madhu
- Date: 2019
- Type: Text , Conference paper
- Relation: 30th Australasian Conference on Information Systems (ACIS), 9-11 December, Perth (Australia)
- Full Text:
- Reviewed:
- Description: Blockchain technology promises to significantly impact current business processes in industries from various sectors and reduce transactional cost. Firms, suppliers, government, financial institutions etc. are anticipating a business model transformation through blockchain by accomplishing a decentralized architecture of interorganizational dealings without intermediaries. In spite of its immense potential, however, there are key challenges of blockchain implementation which need to be studied for identifying the opportunities arising and for its successful implementations in future. In this paper, we aim to identify these challenges for blockchain adoption and classify them for clearer understanding. To pursue this effectively, this paper follows a hybrid model of systematic literature review. This paper also explicitly enumerates future research opportunities to lead industry and researchers in correct directions
- Authors: Chhina, Shipra , Chadhar, Mehmood , Vatanasakdakul, Savanid , Chetty, Madhu
- Date: 2019
- Type: Text , Conference paper
- Relation: 30th Australasian Conference on Information Systems (ACIS), 9-11 December, Perth (Australia)
- Full Text:
- Reviewed:
- Description: Blockchain technology promises to significantly impact current business processes in industries from various sectors and reduce transactional cost. Firms, suppliers, government, financial institutions etc. are anticipating a business model transformation through blockchain by accomplishing a decentralized architecture of interorganizational dealings without intermediaries. In spite of its immense potential, however, there are key challenges of blockchain implementation which need to be studied for identifying the opportunities arising and for its successful implementations in future. In this paper, we aim to identify these challenges for blockchain adoption and classify them for clearer understanding. To pursue this effectively, this paper follows a hybrid model of systematic literature review. This paper also explicitly enumerates future research opportunities to lead industry and researchers in correct directions
Connecting probability
- Ernst, Heather, Morton, Anna
- Authors: Ernst, Heather , Morton, Anna
- Date: 2019
- Type: Text , Conference paper
- Relation: MAV19: Making+Connections, 56th Annual Conference, Bundoora, Vic, 5th-6th December, 2019
- Full Text:
- Reviewed:
- Description: Where does the topic of probability fit with maths curriculum? It is often the topic squeezed into the end of a busy year but it can effectively be connected into many if not all mathematics topics across the secondary year levels.
- Authors: Ernst, Heather , Morton, Anna
- Date: 2019
- Type: Text , Conference paper
- Relation: MAV19: Making+Connections, 56th Annual Conference, Bundoora, Vic, 5th-6th December, 2019
- Full Text:
- Reviewed:
- Description: Where does the topic of probability fit with maths curriculum? It is often the topic squeezed into the end of a busy year but it can effectively be connected into many if not all mathematics topics across the secondary year levels.
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
DINE : a framework for deep incomplete network embedding
- Hou, Ke, Liu, Jiaying, Peng, Yin, Xu, Bo, Lee, Ivan, Xia, Feng
- Authors: Hou, Ke , Liu, Jiaying , Peng, Yin , Xu, Bo , Lee, Ivan , Xia, Feng
- Date: 2019
- Type: Text , Conference paper
- Relation: 32nd Australasian Joint Conference on Artificial Intelligence, AI 2019 Vol. 11919 LNAI, p. 165-176
- Full Text:
- Reviewed:
- Description: Network representation learning (NRL) plays a vital role in a variety of tasks such as node classification and link prediction. It aims to learn low-dimensional vector representations for nodes based on network structures or node attributes. While embedding techniques on complete networks have been intensively studied, in real-world applications, it is still a challenging task to collect complete networks. To bridge the gap, in this paper, we propose a Deep Incomplete Network Embedding method, namely DINE. Specifically, we first complete the missing part including both nodes and edges in a partially observable network by using the expectation-maximization framework. To improve the embedding performance, we consider both network structures and node attributes to learn node representations. Empirically, we evaluate DINE over three networks on multi-label classification and link prediction tasks. The results demonstrate the superiority of our proposed approach compared against state-of-the-art baselines. © 2019, Springer Nature Switzerland AG.
- Description: E1
- Authors: Hou, Ke , Liu, Jiaying , Peng, Yin , Xu, Bo , Lee, Ivan , Xia, Feng
- Date: 2019
- Type: Text , Conference paper
- Relation: 32nd Australasian Joint Conference on Artificial Intelligence, AI 2019 Vol. 11919 LNAI, p. 165-176
- Full Text:
- Reviewed:
- Description: Network representation learning (NRL) plays a vital role in a variety of tasks such as node classification and link prediction. It aims to learn low-dimensional vector representations for nodes based on network structures or node attributes. While embedding techniques on complete networks have been intensively studied, in real-world applications, it is still a challenging task to collect complete networks. To bridge the gap, in this paper, we propose a Deep Incomplete Network Embedding method, namely DINE. Specifically, we first complete the missing part including both nodes and edges in a partially observable network by using the expectation-maximization framework. To improve the embedding performance, we consider both network structures and node attributes to learn node representations. Empirically, we evaluate DINE over three networks on multi-label classification and link prediction tasks. The results demonstrate the superiority of our proposed approach compared against state-of-the-art baselines. © 2019, Springer Nature Switzerland AG.
- Description: E1
Environmental sustainability practices : how adults learn
- Authors: Smith, Erica
- Date: 2019
- Type: Text , Conference paper
- Relation: SCUTREA (Standing Conference on University Teaching and Research in the Education of Adults) Adult Education 100: Reflections & Reconstructions, University of Nottingham, U.K., 2-4 July 2019 p. 97-106
- Full Text:
- Reviewed:
- Description: This paper reports on a small research project which investigated how adults in Australia learn about, and adapt to, developments in environmental sustainability practices. The project was based on two major changes in Australia in 2018: the cessation of free ‘singleuse’ plastic bags in many shops, particularly the major supermarket changes; and a gathering momentum towards more rigorous recycling practices. These changes, particularly the first, have affected the daily lives of most Australians. The research,consisting of a focus group, an expert interview and an on-line survey was undertaken with staff working for a regional university based at several campuses across the State of Victoria. This paper reports on preliminary results from the project, including analysis of the initial set of results from the survey. The results so far show that people learn from a range of sources, but some are much more common than others. Among media sources, two-thirds of the survey respondents learned from television, and around 40% from social media and the internet more generally; and among other sources, friends and family were information sources for two-thirds of people, while community information and public notices in shops or on litter bins were used by around half of the respondents. Some respondents were passionately engaged with the topic. The paper presents the responses to a number of key questions in the survey and analyses by age, and gender; and makes some suggestions about the effectiveness of learning sources on sustainability practices. The paper addresses the conference themes of formal and informal learning; adult political education; and community learning and engagement.
- Authors: Smith, Erica
- Date: 2019
- Type: Text , Conference paper
- Relation: SCUTREA (Standing Conference on University Teaching and Research in the Education of Adults) Adult Education 100: Reflections & Reconstructions, University of Nottingham, U.K., 2-4 July 2019 p. 97-106
- Full Text:
- Reviewed:
- Description: This paper reports on a small research project which investigated how adults in Australia learn about, and adapt to, developments in environmental sustainability practices. The project was based on two major changes in Australia in 2018: the cessation of free ‘singleuse’ plastic bags in many shops, particularly the major supermarket changes; and a gathering momentum towards more rigorous recycling practices. These changes, particularly the first, have affected the daily lives of most Australians. The research,consisting of a focus group, an expert interview and an on-line survey was undertaken with staff working for a regional university based at several campuses across the State of Victoria. This paper reports on preliminary results from the project, including analysis of the initial set of results from the survey. The results so far show that people learn from a range of sources, but some are much more common than others. Among media sources, two-thirds of the survey respondents learned from television, and around 40% from social media and the internet more generally; and among other sources, friends and family were information sources for two-thirds of people, while community information and public notices in shops or on litter bins were used by around half of the respondents. Some respondents were passionately engaged with the topic. The paper presents the responses to a number of key questions in the survey and analyses by age, and gender; and makes some suggestions about the effectiveness of learning sources on sustainability practices. The paper addresses the conference themes of formal and informal learning; adult political education; and community learning and engagement.
Generating linked data repositories using UML artifacts
- Authors: Khan, Aqsa , Malik, Saleem
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 1st Intelligent Technologies and Applications, Intap 2018; Bahawalpur, Pakistan; 23rd-25th October 2018; published in Communications in Computer and Information Science book Series Vol. 932, p. 142-152
- Full Text:
- Reviewed:
- Description: The usability of diagrams and models is increasing day by day, because of this we experience problem in searching and accessing from large size repositories of diagrams and models of software systems. This research might be helpful to search and access the diagrams and models in bigger repositories. For this purpose, this research developed linked data repositories which contain UML (Unified Modeling Language) artifacts, these artifacts are being organized with using UML class model. In particular, UML is being broadly applied to data modeling in many application domains, and generating linked data repositories from the UML class model is becoming a challenging task in the context of semantic web. This paper proposes an approach, in which we will build a construction tool by joining the characteristics of RDF (Resource Description Framework) and UML. Firstly we will formally define design artifacts and linked data repositories. After that we will propose a construction tool in which we will extract UML artifacts, these UML class model further transforms into the corresponding RDFs. The generated RDF linked data then will be verified by using W3C RDF, this is a validating service used to generate and verify the RDF triples and graphs. Finally, the proposed construction tool will be implemented with few experiments and research is validated using W3C RDF validating service. The proposed approach aims to give such a design that may facilitate the users to customize linked data repositories so that diagrams and models could be examined from large size data.
- Authors: Khan, Aqsa , Malik, Saleem
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 1st Intelligent Technologies and Applications, Intap 2018; Bahawalpur, Pakistan; 23rd-25th October 2018; published in Communications in Computer and Information Science book Series Vol. 932, p. 142-152
- Full Text:
- Reviewed:
- Description: The usability of diagrams and models is increasing day by day, because of this we experience problem in searching and accessing from large size repositories of diagrams and models of software systems. This research might be helpful to search and access the diagrams and models in bigger repositories. For this purpose, this research developed linked data repositories which contain UML (Unified Modeling Language) artifacts, these artifacts are being organized with using UML class model. In particular, UML is being broadly applied to data modeling in many application domains, and generating linked data repositories from the UML class model is becoming a challenging task in the context of semantic web. This paper proposes an approach, in which we will build a construction tool by joining the characteristics of RDF (Resource Description Framework) and UML. Firstly we will formally define design artifacts and linked data repositories. After that we will propose a construction tool in which we will extract UML artifacts, these UML class model further transforms into the corresponding RDFs. The generated RDF linked data then will be verified by using W3C RDF, this is a validating service used to generate and verify the RDF triples and graphs. Finally, the proposed construction tool will be implemented with few experiments and research is validated using W3C RDF validating service. The proposed approach aims to give such a design that may facilitate the users to customize linked data repositories so that diagrams and models could be examined from large size data.
Hierarchical colour image segmentation by leveraging RGB channels independently
- Tania, Sheikh, Murshed, Manzur, Teng, Shyh, Karmakar, Gour
- Authors: Tania, Sheikh , Murshed, Manzur , Teng, Shyh , Karmakar, Gour
- Date: 2019
- Type: Text , Conference paper
- Relation: 9th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2019 Vol. 11854 LNCS, p. 197-210
- Full Text:
- Reviewed:
- Description: In this paper, we introduce a hierarchical colour image segmentation based on cuboid partitioning using simple statistical features of the pixel intensities in the RGB channels. Estimating the difference between any two colours is a challenging task. As most of the colour models are not perceptually uniform, investigation of an alternative strategy is highly demanding. To address this issue, for our proposed technique, we present a new concept for colour distance measure based on the inconsistency of pixel intensities of an image which is more compliant to human perception. Constructing a reliable set of superpixels from an image is fundamental for further merging. As cuboid partitioning is a superior candidate to produce superpixels, we use the agglomerative merging to yield the final segmentation results exploiting the outcome of our proposed cuboid partitioning. The proposed cuboid segmentation based algorithm significantly outperforms not only the quadtree-based segmentation but also existing state-of-the-art segmentation algorithms in terms of quality of segmentation for the benchmark datasets used in image segmentation. © 2019, Springer Nature Switzerland AG.
- Authors: Tania, Sheikh , Murshed, Manzur , Teng, Shyh , Karmakar, Gour
- Date: 2019
- Type: Text , Conference paper
- Relation: 9th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2019 Vol. 11854 LNCS, p. 197-210
- Full Text:
- Reviewed:
- Description: In this paper, we introduce a hierarchical colour image segmentation based on cuboid partitioning using simple statistical features of the pixel intensities in the RGB channels. Estimating the difference between any two colours is a challenging task. As most of the colour models are not perceptually uniform, investigation of an alternative strategy is highly demanding. To address this issue, for our proposed technique, we present a new concept for colour distance measure based on the inconsistency of pixel intensities of an image which is more compliant to human perception. Constructing a reliable set of superpixels from an image is fundamental for further merging. As cuboid partitioning is a superior candidate to produce superpixels, we use the agglomerative merging to yield the final segmentation results exploiting the outcome of our proposed cuboid partitioning. The proposed cuboid segmentation based algorithm significantly outperforms not only the quadtree-based segmentation but also existing state-of-the-art segmentation algorithms in terms of quality of segmentation for the benchmark datasets used in image segmentation. © 2019, Springer Nature Switzerland AG.