Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 1–19
Abstract
Medical Ultrasound is a diagnostic imaging technique based on the application of ultrasound in various branches of medical sciences. It can facilitate the observation of structures of internal body, such as tendons, muscles, vessels and internal organs such as male and female reproductive system. However, these images usually degrade by a special kind of multiplicative noise called speckle. The main effects of speckle noise in the ultrasound images appear in the edges and fine details which lead to reduce their resolution and consequently make difficulties in medical diagnosing. Therefore, reducing of speckle noise seriously plays an important role in image diagnosing. Among the various methods that have been proposed to reduce the speckle noise, there exists a class of approaches that firstly convert multiplicative speckle noise into additive noise via log-transform and secondly perform the despeckling process via a directional filter. Usually, the additive noises are mutually uncorrelated and obey a Gaussian distribution. On the other hand, non-subsampled shearlet transform (NSST), as a multi scale method, is one of the effective methods in image processing, specially, denoising. Since NSST is shift invariant, it diminishes the effect of pseudo-Gibbs phenomena in the denoising. In this paper, we describe a simple image despeckling algorithm which combines the log-transform as a pre-processing step with the non-subsampled shearlet transform for strong numerical and visual performance on a broad class of images. To illustrate the efficiency of the proposed approach, it is applied on a sample image and two real ultrasound images. Numerical results illustrate that the proposed approach can obtain better performance in term of peak signal to noise ratio (PSNR) and structural similarity (SSIM) index rather than existing state-of-the-art methods.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 21–32
Abstract
In Computer Vision and Pattern Recognition, surveillance-video crowded scenes have been analysed according to their structure, where the detection of distinguishable people groups is an essential step. In this paper, we are interested in detecting F-Formations (i.e. free standing conversational groups) on video, which are formed by people social relations. We proposed a new method based on fuzzy relations, where a new social representation for computing relation between individuals, fusion for search consensus in multiple frame and clustering are introduced. Finally, our proposal was tested in a real-world dataset, improving the already reported scores from literature.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 33–52
Abstract
The raw trajectories contain large amounts of redundant data that bring challenges to storage, transmission and processing. Trajectory compression algorithms can reduce the number of positioning points while minimizing the loss of information. This paper proposes a heading maintaining oriented trajectory compression algorithm, which takes into account both position information and direction information. By setting an angle threshold, the algorithm can achieve a more accurate approximation of trajectories than traditional position-preserving trajectory compression algorithms. The experimental results show that the algorithm can ensure certain effect on the direction information and is more flexible.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 53–72
Abstract
Saliency detection has been deeply studied in the last few years and the number of the designed computational models is increasing. Starting from the assumption that spatial and temporal information of an input video frame can provide better saliency results than using each information alone, we propose a spatio-temporal saliency model for detecting salient objects in videos. First, spatial saliency is measured at patch-level by fusing local contrasts with spatial priors to label each patch as a foreground or a background one. Then, the newly proposed motion distinctiveness feature and gradient flow field measure are used to obtain the temporal saliency maps. Finally, spatial and temporal saliency maps are fused together into one final saliency map.
On the challenging SegTrack v2 and Fukuchi benchmark datasets we significantly outperform the state-of-the-art methods.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 73–90
Abstract
Integration of algorithms of investment theory and artificial intelligence allows one to create a support system for investors in exchange markets based on the ensemble of long-short-term-memory (LSTM) based recurrent neural networks (RNN). The proposed support system contains five stages: preparation of historical data, prediction by an ensemble of LSTM RNNs, assessment of prediction distributions, investment portfolio formation and verification. The prediction process outputs a multi-modal distribution, which provides useful information for investors. The research compares four different strategies based on a combination of distribution forecasting models. The high-low strategy helps decision-makers in exchange markets to recognize signals of transactions and fix limits for expectations. A combination of high-low-daily-weekly predictions helps investors to make daily transactions with knowing distribution of exchange rates during the week. The shift in time of five hours between London and New York inspired us to create a UK-NY strategy, which allows investors to recognize the signals of the market in a very short time. The joined high-low-UK-NY strategy increases the possibility of recognizing the signals of transactions in a very short time and of fixing the limits for day trading. So, this support system for investors is verified as a profitable tool for speculators in the relatively risky currency market.
Pub. online:5 Aug 2022Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 91–116
Abstract
The evolution of Wireless Sensor Networks has led to the development of protocols that must comply with their new restrictions while being efficient in terms of energy consumption and time. We focus on a collision resolution protocol, the so-called Two Cell Sorted (2CS-WSN). We propose three different ways to improve its performance by minimizing the collision resolution time or the energy consumption. After evaluating these proposals and carrying out the comparison with the original protocol, we recommend an improvement to the protocol which reduces the elapsed time by early $8\% $ and the number of retries and conflicts more than $40\% $.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 117–134
Abstract
This paper introduces two novel algorithms for the 2-bit adaptive delta modulation, namely 2-bit hybrid adaptive delta modulation and 2-bit optimal adaptive delta modulation. In 2-bit hybrid adaptive delta modulation, the adaptation is performed both at the frame level and the sample level, where the estimated variance is used to determine the initial quantization step size. In the latter algorithm, the estimated variance is used to scale the quantizer codebook optimally designed assuming Laplace distribution of the input signal. The algorithms are tested using speech signal and compared to constant factor delta modulation, continuously variable slope delta modulation and instantaneously adaptive 2-bit delta modulation, showing that the proposed algorithms offer higher performance and significantly wider dynamic range.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 135–152
Abstract
The aim of this paper is to make a proposal for a new extension of the MULTIMOORA method extended to deal with bipolar fuzzy sets. Bipolar fuzzy sets are proposed as an extension of classical fuzzy sets in order to enable solving a particular class of decision-making problems. Unlike other extensions of the fuzzy set of theory, bipolar fuzzy sets introduce a positive membership function, which denotes the satisfaction degree of the element x to the property corresponding to the bipolar-valued fuzzy set, and the negative membership function, which denotes the degree of the satisfaction of the element x to some implicit counter-property corresponding to the bipolar-valued fuzzy set. By using single-valued bipolar fuzzy numbers, the MULTIMOORA method can be more efficient for solving some specific problems whose solving requires assessment and prediction. The suitability of the proposed approach is presented through an example.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 153–186
Abstract
In this paper, we extend MM operator and dual MM (DMM) operator to process the interval-valued Pythagorean fuzzy numbers (IVPFNs) and then to solve the MADM problems. Firstly, we develop some interval-valued Pythagorean fuzzy Muirhead mean operators by extending MM and DMM operators to IVPFNs. Then, we prove some properties and discuss some special cases with respect to the parameter vector. Moreover, we present some new methods to deal with MADM problems with the IVPFNs based on the proposed MM and DMM operators. Finally, we verify the validity and reliability of our methods by using an application example for green supplier selections, and analyse the advantages of our methods by comparing it with other existing methods.
Pub. online:1 Jan 2019Type:Research ArticleOpen Access
Journal:Informatica
Volume 30, Issue 1 (2019), pp. 187–211
Abstract
The risk analysis has always been one of the essential procedures for any areas. The majority of security incidents occur because of ignoring risks or their inaccurate assessment. It is especially dangerous for critical infrastructures. Thus, the article is devoted to the description of the developed model of risk assessment for the essential infrastructures. The goal of the model is to provide a reliable method for multifaceted risk assessment of information infrastructure. The purpose of the article is to present a developed model based on integrated MCDM approaches that allow to correctly assess the risks of the critical information infrastructures.