Search results
1 – 10 of 103Faguo Liu, Qian Zhang, Tao Yan, Bin Wang, Ying Gao, Jiaqi Hou and Feiniu Yuan
Light field images (LFIs) have gained popularity as a technology to increase the field of view (FoV) of plenoptic cameras since they can capture information about light rays with…
Abstract
Purpose
Light field images (LFIs) have gained popularity as a technology to increase the field of view (FoV) of plenoptic cameras since they can capture information about light rays with a large FoV. Wide FoV causes light field (LF) data to increase rapidly, which restricts the use of LF imaging in image processing, visual analysis and user interface. Effective LFI coding methods become of paramount importance. This paper aims to eliminate more redundancy by exploring sparsity and correlation in the angular domain of LFIs, as well as mitigate the loss of perceptual quality of LFIs caused by encoding.
Design/methodology/approach
This work proposes a new efficient LF coding framework. On the coding side, a new sampling scheme and a hierarchical prediction structure are used to eliminate redundancy in the LFI's angular and spatial domains. At the decoding side, high-quality dense LF is reconstructed using a view synthesis method based on the residual channel attention network (RCAN).
Findings
In three different LF datasets, our proposed coding framework not only reduces the transmitted bit rate but also maintains a higher view quality than the current more advanced methods.
Originality/value
(1) A new sampling scheme is designed to synthesize high-quality LFIs while better ensuring LF angular domain sparsity. (2) To further eliminate redundancy in the spatial domain, new ranking schemes and hierarchical prediction structures are designed. (3) A synthetic network based on RCAN and a novel loss function is designed to mitigate the perceptual quality loss due to the coding process.
Details
Keywords
Uzair Khan, Hikmat Ullah Khan, Saqib Iqbal and Hamza Munir
Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in…
Abstract
Purpose
Image Processing is an emerging field that is used to extract information from images. In recent years, this field has received immense attention from researchers, especially in the research domains of object detection, Biomedical Imaging and Semantic segmentation. In this study, a bibliometric analysis of publications related to image processing in the Science Expanded Index Extended (SCI-Expanded) has been performed. Several parameters have been analyzed such as annual scientific production, citations per article, most cited documents, top 20 articles, most relevant authors, authors evaluation using y-index, top and most relevant sources (journals) and hot topics.
Design/methodology/approach
The Bibliographic data has been extracted from the Web of Science which is well known and the world's top database of bibliographic citations of multidisciplinary areas that covers the various journals of computer science, engineering, medical and social sciences.
Findings
The research work in image processing is meager in the past decade, however, from 2014 to 2019, it increases dramatically. Recently, the IEEE Access journal is the most relevant source with an average of 115 publications per year. The USA is most productive and its publications are highly cited while China comes in second place. Image Segmentation, Feature Extraction and Medical Image Processing are hot topics in recent years. The National Natural Science Foundation of China provides 8% of all funds for Image Processing. As Image Processing is now becoming one of the most critical fields, the research productivity has enhanced during the past five years and more work is done while the era of 2005–2013 was the area with the least amount of work in this area.
Originality/value
This research is novel in this regard that no previous research focuses on Bibliometric Analysis in the Image Processing domain, which is one of the hot research areas in computer science and engineering.
Details
Keywords
Ambica Ghai, Pradeep Kumar and Samrat Gupta
Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered…
Abstract
Purpose
Web users rely heavily on online content make decisions without assessing the veracity of the content. The online content comprising text, image, video or audio may be tampered with to influence public opinion. Since the consumers of online information (misinformation) tend to trust the content when the image(s) supplement the text, image manipulation software is increasingly being used to forge the images. To address the crucial problem of image manipulation, this study focusses on developing a deep-learning-based image forgery detection framework.
Design/methodology/approach
The proposed deep-learning-based framework aims to detect images forged using copy-move and splicing techniques. The image transformation technique aids the identification of relevant features for the network to train effectively. After that, the pre-trained customized convolutional neural network is used to train on the public benchmark datasets, and the performance is evaluated on the test dataset using various parameters.
Findings
The comparative analysis of image transformation techniques and experiments conducted on benchmark datasets from a variety of socio-cultural domains establishes the effectiveness and viability of the proposed framework. These findings affirm the potential applicability of proposed framework in real-time image forgery detection.
Research limitations/implications
This study bears implications for several important aspects of research on image forgery detection. First this research adds to recent discussion on feature extraction and learning for image forgery detection. While prior research on image forgery detection, hand-crafted the features, the proposed solution contributes to stream of literature that automatically learns the features and classify the images. Second, this research contributes to ongoing effort in curtailing the spread of misinformation using images. The extant literature on spread of misinformation has prominently focussed on textual data shared over social media platforms. The study addresses the call for greater emphasis on the development of robust image transformation techniques.
Practical implications
This study carries important practical implications for various domains such as forensic sciences, media and journalism where image data is increasingly being used to make inferences. The integration of image forgery detection tools can be helpful in determining the credibility of the article or post before it is shared over the Internet. The content shared over the Internet by the users has become an important component of news reporting. The framework proposed in this paper can be further extended and trained on more annotated real-world data so as to function as a tool for fact-checkers.
Social implications
In the current scenario wherein most of the image forgery detection studies attempt to assess whether the image is real or forged in an offline mode, it is crucial to identify any trending or potential forged image as early as possible. By learning from historical data, the proposed framework can aid in early prediction of forged images to detect the newly emerging forged images even before they occur. In summary, the proposed framework has a potential to mitigate physical spreading and psychological impact of forged images on social media.
Originality/value
This study focusses on copy-move and splicing techniques while integrating transfer learning concepts to classify forged images with high accuracy. The synergistic use of hitherto little explored image transformation techniques and customized convolutional neural network helps design a robust image forgery detection framework. Experiments and findings establish that the proposed framework accurately classifies forged images, thus mitigating the negative socio-cultural spread of misinformation.
Details
Keywords
Mikias Gugssa, Long Li, Lina Pu, Ali Gurbuz, Yu Luo and Jun Wang
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However…
Abstract
Purpose
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety monitoring methods in near real time or in a time-efficient manner in real construction practices. Therefore, this study developed a novel solution to enhance the time efficiency to achieve near-real-time safety glove detection and meanwhile preserve data privacy.
Design/methodology/approach
The developed method comprises two primary components: (1) transfer learning methods to detect safety gloves and (2) edge computing to improve time efficiency and data privacy. To compare the developed edge computing-based method with the currently widely used cloud computing-based methods, a comprehensive comparative analysis was conducted from both the implementation and theory perspectives, providing insights into the developed approach’s performance.
Findings
Three DL models achieved mean average precision (mAP) scores ranging from 74.92% to 84.31% for safety glove detection. The other two methods by combining object detection and classification achieved mAP as 89.91% for hand detection and 100% for glove classification. From both implementation and theory perspectives, the edge computing-based method detected gloves faster than the cloud computing-based method. The edge computing-based method achieved a detection latency of 36%–68% shorter than the cloud computing-based method in the implementation perspective. The findings highlight edge computing’s potential for near-real-time detection with improved data privacy.
Originality/value
This study implemented and evaluated DL-based safety monitoring methods on different computing infrastructures to investigate their time efficiency. This study contributes to existing knowledge by demonstrating how edge computing can be used with DL models (without sacrificing their performance) to improve PPE-glove monitoring in a time-efficient manner as well as maintain data privacy.
Details
Keywords
Cemalettin Akdoğan, Tolga Özer and Yüksel Oğuz
Nowadays, food problems are likely to arise because of the increasing global population and decreasing arable land. Therefore, it is necessary to increase the yield of…
Abstract
Purpose
Nowadays, food problems are likely to arise because of the increasing global population and decreasing arable land. Therefore, it is necessary to increase the yield of agricultural products. Pesticides can be used to improve agricultural land products. This study aims to make the spraying of cherry trees more effective and efficient with the designed artificial intelligence (AI)-based agricultural unmanned aerial vehicle (UAV).
Design/methodology/approach
Two approaches have been adopted for the AI-based detection of cherry trees: In approach 1, YOLOv5, YOLOv7 and YOLOv8 models are trained with 70, 100 and 150 epochs. In Approach 2, a new method is proposed to improve the performance metrics obtained in Approach 1. Gaussian, wavelet transform (WT) and Histogram Equalization (HE) preprocessing techniques were applied to the generated data set in Approach 2. The best-performing models in Approach 1 and Approach 2 were used in the real-time test application with the developed agricultural UAV.
Findings
In Approach 1, the best F1 score was 98% in 100 epochs with the YOLOv5s model. In Approach 2, the best F1 score and mAP values were obtained as 98.6% and 98.9% in 150 epochs, with the YOLOv5m model with an improvement of 0.6% in the F1 score. In real-time tests, the AI-based spraying drone system detected and sprayed cherry trees with an accuracy of 66% in Approach 1 and 77% in Approach 2. It was revealed that the use of pesticides could be reduced by 53% and the energy consumption of the spraying system by 47%.
Originality/value
An original data set was created by designing an agricultural drone to detect and spray cherry trees using AI. YOLOv5, YOLOv7 and YOLOv8 models were used to detect and classify cherry trees. The results of the performance metrics of the models are compared. In Approach 2, a method including HE, Gaussian and WT is proposed, and the performance metrics are improved. The effect of the proposed method in a real-time experimental application is thoroughly analyzed.
Details
Keywords
Cesar Omar Balderrama-Armendariz, Sergio Esteban Arbelaez-Rios, Santos-Adriana Martel-Estrada, Aide Aracely Maldonado-Macias, Eric MacDonald and Julian I. Aguilar-Duque
This study aims to propose the reuse of PA12 (powder) in another AM process, binder jettiinng, which is less sensitive to the chemical and mechanical degradation of the powder…
Abstract
Purpose
This study aims to propose the reuse of PA12 (powder) in another AM process, binder jettiinng, which is less sensitive to the chemical and mechanical degradation of the powder after multiple cycles in the laser system.
Design/methodology/approach
The experimental process for evaluating the reuse of SLS powders in a subsequent binder jetting process consists of four phases: powder characterization, bonding analysis, mixture testing and mixture characteristics. Analyses were carried out using techniques such as Fourier Transform Infrared Spectroscopy, scanning electron microscopy, thermogravimetric analysis and stress–strain tests for tension and compression. The surface roughness, color, hardness and density of the new mixture were also determined to find physical characteristics. A Taguchi design L8 was used to search for a mixture with the best mechanical strength.
Findings
The results indicated that the integration of waste powder PA12 with calcium sulfate hemihydrate (CSH) generates appropriate particle distribution with rounded particles of PA12 that improve powder flowability. The micropores observed with less than 60 µm, facilitated binder and infiltrant penetration on 3D parts. The 60/40 (CSH-PA12) mixture with epoxy resin postprocessing was found to be the best-bonded mixture in mechanical testing, rugosity and hardness results. The new CSH-PA12 mixture resulted lighter and stronger than the CSH powder commonly used in binder jetting technology.
Originality/value
This study adds value to the polymer powder bed fusion process by using its waste in a circular process. The novel reuse of PA12 waste in an established process was achieved in an accessible and economical manner.
Details
Keywords
Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono
The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.
Abstract
Purpose
The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.
Design/methodology/approach
The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.
Findings
The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.
Originality/value
The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.
Details
Keywords
Vijaya Prasad Burle, Tattukolla Kiran, N. Anand, Diana Andrushia and Khalifa Al-Jabri
The construction industries at present are focusing on designing sustainable concrete with less carbon footprint. Considering this aspect, a Fibre-Reinforced Geopolymer Concrete…
Abstract
Purpose
The construction industries at present are focusing on designing sustainable concrete with less carbon footprint. Considering this aspect, a Fibre-Reinforced Geopolymer Concrete (FGC) was developed with 8 and 10 molarities (M). At elevated temperatures, concrete experiences deterioration of its mechanical properties which is in some cases associated with spalling, leading to the building collapse.
Design/methodology/approach
In this study, six geopolymer-based mix proportions are prepared with crimped steel fibre (SF), polypropylene fibre (PF), basalt fibre (BF), a hybrid mixture consisting of (SF + PF), a hybrid mixture with (SF + BF), and a reference specimen (without fibres). After temperature exposure, ultrasonic pulse velocity, physical characteristics of damaged concrete, loss of compressive strength (CS), split tensile strength (TS), and flexural strength (FS) of concrete are assessed. A polynomial relationship is developed between residual strength properties of concrete, and it showed a good agreement.
Findings
The test results concluded that concrete with BF showed a lower loss in CS after 925 °C (i.e. 60 min of heating) temperature exposure. In the case of TS, and FS, the concrete with SF had lesser loss in strength. After 986 °C and 1029 °C exposure, concrete with the hybrid combination (SF + BF) showed lower strength deterioration in CS, TS, and FS as compared to concrete with PF and SF + PF. The rate of reduction in strength is similar to that of GC-BF in CS, GC-SF in TS and FS.
Originality/value
Performance evaluation under fire exposure is necessary for FGC. In this study, we provided the mechanical behaviour and physical properties of SF, PF, and BF-based geopolymer concrete exposed to high temperatures, which were evaluated according to ISO standards. In addition, micro-structural behaviour and linear polynomials are observed.
Details
Keywords
Alenka Kavčič Čolić and Andreja Hari
The current predominant delivery format resulting from digitization is PDF, which is not appropriate for the blind, partially sighted and people who read on mobile devices. To…
Abstract
Purpose
The current predominant delivery format resulting from digitization is PDF, which is not appropriate for the blind, partially sighted and people who read on mobile devices. To meet the needs of both communities, as well as broader ones, alternative file formats are required. With the findings of the eBooks-On-Demand-Network Opening Publications for European Netizens project research, this study aims to improve access to digitized content for these communities.
Design/methodology/approach
In 2022, the authors conducted research on the digitization experiences of 13 EODOPEN partners at their organizations. The authors distributed the same sample of scans in English with different characteristics, and in accordance with Web content accessibility guidelines, the authors created 24 criteria to analyze their digitization workflows, output formats and optical character recognition (OCR) quality.
Findings
In this contribution, the authors present the results of a trial implementation among EODOPEN partners regarding their digitization workflows, used delivery file formats and the resulting quality of OCR results, depending on the type of digitization output file format. It was shown that partners using the OCR tool ABBYY FineReader Professional and producing scanning outputs in tagged PDF and PDF/UA formats achieved better results according to set criteria.
Research limitations/implications
The trial implementations were limited to 13 project partners’ organizations only.
Originality/value
This research paper can be a valuable contribution to the field of massive digitization practices, particularly in terms of improving the accessibility of the output delivery file formats.
Details
Keywords
Shefali Arora, Ruchi Mittal, Avinash K. Shrivastava and Shivani Bali
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in…
Abstract
Purpose
Deep learning (DL) is on the rise because it can make predictions and judgments based on data that is unseen. Blockchain technologies are being combined with DL frameworks in various industries to provide a safe and effective infrastructure. The review comprises literature that lists the most recent techniques used in the aforementioned application sectors. We examine the current research trends across several fields and evaluate the literature in terms of its advantages and disadvantages.
Design/methodology/approach
The integration of blockchain and DL has been explored in several application domains for the past five years (2018–2023). Our research is guided by five research questions, and based on these questions, we concentrate on key application domains such as the usage of Internet of Things (IoT) in several applications, healthcare and cryptocurrency price prediction. We have analyzed the main challenges and possibilities concerning blockchain technologies. We have discussed the methodologies used in the pertinent publications in these areas and contrasted the research trends during the previous five years. Additionally, we provide a comparison of the widely used blockchain frameworks that are used to create blockchain-based DL frameworks.
Findings
By responding to five research objectives, the study highlights and assesses the effectiveness of already published works using blockchain and DL. Our findings indicate that IoT applications, such as their use in smart cities and cars, healthcare and cryptocurrency, are the key areas of research. The primary focus of current research is the enhancement of existing systems, with data analysis, storage and sharing via decentralized systems being the main motivation for this integration. Amongst the various frameworks employed, Ethereum and Hyperledger are popular among researchers in the domain of IoT and healthcare, whereas Bitcoin is popular for research on cryptocurrency.
Originality/value
There is a lack of literature that summarizes the state-of-the-art methods incorporating blockchain and DL in popular domains such as healthcare, IoT and cryptocurrency price prediction. We analyze the existing research done in the past five years (2018–2023) to review the issues and emerging trends.
Details