38 results on '"Triet Tran"'
Search Results
2. AVSeeker: An Active Video Retrieval Engine at VBS2022
- Author
-
Tu-Khiem Le, Van-Tu Ninh, Mai-Khiem Tran, Graham Healy, Cathal Gurrin, and Minh-Triet Tran
- Published
- 2022
- Full Text
- View/download PDF
3. CDC: Color-Based Diffusion Model with Caption Embedding in VBS 2022
- Author
-
Duc-Tuan Luu, Khanh-An C. Quan, Thinh-Quyen Nguyen, Van-Son Hua, Minh-Chau Nguyen, Minh-Triet Tran, and Vinh-Tiep Nguyen
- Published
- 2022
- Full Text
- View/download PDF
4. A Provably Secure User Authentication Scheme Over Unreliable Networks
- Author
-
Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong, and Anh-Duy Tran
- Published
- 2022
- Full Text
- View/download PDF
5. V-FIRST: A Flexible Interactive Retrieval System for Video at VBS 2022
- Author
-
Minh-Triet Tran, Nhat Hoang-Xuan, Hoang-Phuc Trang-Trung, Thanh-Cong Le, Mai-Khiem Tran, Minh-Quan Le, Tu-Khiem Le, Van-Tu Ninh, and Cathal Gurrin
- Published
- 2022
- Full Text
- View/download PDF
6. An Improved Subject-Independent Stress Detection Model Applied to Consumer-grade Wearable Devices
- Author
-
Van-Tu Ninh, Manh-Duy Nguyen, Sinéad Smyth, Minh-Triet Tran, Graham Healy, Binh T. Nguyen, and Cathal Gurrin
- Published
- 2022
- Full Text
- View/download PDF
7. Potential Threat of Face Swapping to eKYC with Face Registration and Augmented Solution with Deepfake Detection
- Author
-
Trong-Le Do, Minh-Triet Tran, Mai-Khiem Tran, and Huy H. Nguyen
- Subjects
Authentication ,Know your customer ,Biometrics ,Computer science ,Face registration ,Face (geometry) ,Computer security ,computer.software_genre ,computer - Abstract
It is necessary to develop an efficient and secure mechanism to verify customers digitally for various online transactions. Integrating biometric solutions into the online user registration and verification processes is a promising trend for electronic Know Your Customer (eKYC) systems. However, Deepfake or face manipulation techniques may become a threat for eKYC with face authentication. In this paper, we introduce this potential attack of Deepfake on eKYC by swapping and manipulating faces between source and target faces. We then propose to augment the security for current eKYC systems with Deepfake detection. We conduct the experiments on the 10K video clips in the private test of Deepfake Detection Challenge 2020, and our method, following the Capsule-forensics approach, achieves the Logloss score of 0.5189, among the top 6% best results among the 2114 teams worldwide. This result demonstrates that our deepfake detection algorithm can be a promising method to provide extra protection for eKYC solutions with face registration and authentication.
- Published
- 2021
- Full Text
- View/download PDF
8. Face Recognition in the Wild for Secure Authentication with Open Set Approach
- Author
-
Minh-Triet Tran, Dinh-Huan Nguyen, and Hieu Dao
- Subjects
Password ,Authentication ,business.industry ,Computer science ,Deep learning ,Word error rate ,Machine learning ,computer.software_genre ,Facial recognition system ,Test set ,Face (geometry) ,Artificial intelligence ,business ,Set (psychology) ,computer - Abstract
In everyday life, authentication is an indispensable process of human activities. Bio-metric authentication system is one of the effective solutions, because it uses human-based features, instead of other traditional features, such as pin, password, etc. However, to apply a face authentication system in practical applications, we need to ensure that the system must not try to recognize the face of an unknown person into known categories, meaning we need to reject faces of unknown people in our application. In this paper, we present the limitations of recent Deep Learning based methods in Face Recognition tasks. We then propose two methods helping Face Recognition system have the ability to reject faces from unknown people by using Open-Set concepts. We conduct the experiments on a subset of CASIA-WebFace dataset, with a train set that includes 7000 images of 100 known people and a test set that includes both known and unknown people. Without rejecting unknown faces, the regular face recognition, i.e. the baseline method, yields the accuracy of only 45.9%, as the method tries to classify all face photos into known classes. Our proposed methods, which are combined deep network of Facenet system with recent Open Set methods, are called Learning Placeholder on Facenet (P-Facenet) and Facenet with OpenMax (O-Facenet). They achieve the accuracy of 83.6% and 88.5% respectively. This is a potential approach for authentication with face recognition to decrease the error rate of the model when recognizing faces of unknown people in the wild.
- Published
- 2021
- Full Text
- View/download PDF
9. CCBANet: Cascading Context and Balancing Attention for Polyp Segmentation
- Author
-
Tien-Phat Nguyen, Tam V. Nguyen, Gia-Han Diep, Anh-Huy Tran-Dinh, Tan-Cong Nguyen, and Minh-Triet Tran
- Subjects
Feature (computer vision) ,Computer science ,Benchmark (computing) ,Code (cryptography) ,Segmentation ,Context (language use) ,Data mining ,Layer (object-oriented design) ,computer.software_genre ,computer ,Encoder ,Block (data storage) - Abstract
Polyps detection plays an important role in colonoscopy, cancer diagnosis, and early treatment. Many efforts have been made to improve the encoder-decoder framework using the global feature with an attention mechanism to enhance local features, helping to effectively segment diversity polyps. However, using only global information derived from the last encoder block leads to the loss of regional information from intermediate layers. Furthermore, defining the boundaries of some polyps is challenging because there is visual interference between the benign region and the polyps at the border. To address these problems, we propose two novel modules: the Cascading Context module (CCM) and the Attention Balance module (BAM), aiming to build an effective polyp segmentation model. Specifically, CCM combines the extracted regional information of the current layer and the lower layer, then pours it into the upper layer - fusing regional and global information analogous to a waterfall pattern. The BAM uses the prediction output of the adjacent lower layer as a guide map to implement the attention mechanism for the three regions separately: the background, polyp, and boundary curve. BAM enhances local context information when deriving features from the encoder block. Our proposed approach is evaluated on three benchmark datasets with six evaluation metrics for segmentation quality and gives competitive results compared to other advanced methods, for both accuracy and efficiency. Code is available at https://github.com/ntcongvn/CCBANet.
- Published
- 2021
- Full Text
- View/download PDF
10. Overview of the ImageCLEF 2020: Multimedia Retrieval in Medical, Lifelogging, Nature, and Internet Applications
- Author
-
Yashin Dicente Cid, Asma Ben Abacha, Dimitri Fichou, Vivek V. Datla, Duc-Tien Dang-Nguyen, Pål Halvorsen, Vassili Kovalev, Paul Brie, Obioma Pelka, Adrian F. Clark, Liting Zhou, Mihai Dogariu, Renaud Péteri, Vitali Liauchuk, Antonio Campello, Christoph M. Friedrich, Bogdan Ionescu, Van-Tu Ninh, Luca Piras, Tu-Khiem Le, Raul Berari, Liviu-Daniel Stefan, Michael Riegler, Cathal Gurrin, Dina Demner-Fushman, Sadid A. Hasan, Minh-Triet Tran, Mathias Lux, Henning Müller, Mihai Gabriel Constantin, Jon Chamberlain, Serge Kozlovski, and Alba García Seco de Herrera
- Subjects
business.industry ,Computer science ,Search engine indexing ,Information access ,020207 software engineering ,02 engineering and technology ,Lifelog ,Automatic summarization ,Task (project management) ,World Wide Web ,0202 electrical engineering, electronic engineering, information engineering ,Question answering ,020201 artificial intelligence & image processing ,The Internet ,User interface ,business - Abstract
This paper presents an overview of the ImageCLEF 2020 lab that was organized as part of the Conference and Labs of the Evaluation Forum - CLEF Labs 2020. ImageCLEF is an ongoing evaluation initiative (first run in 2003) that promotes the evaluation of technologies for annotation, indexing and retrieval of visual data with the aim of providing information access to large collections of images in various usage scenarios and domains. In 2020, the 18th edition of ImageCLEF runs four main tasks: (i) a medical task that groups three previous tasks, i.e., caption analysis, tuberculosis prediction, and medical visual question answering and question generation, (ii) a lifelog task (videos, images and other sources) about daily activity understanding, retrieval and summarization, (iii) a coral task about segmenting and labeling collections of coral reef images, and (iv) a new Internet task addressing the problems of identifying hand-drawn user interface components. Despite the current pandemic situation, the benchmark campaign received a strong participation with over 40 groups submitting more than 295 runs.
- Published
- 2020
- Full Text
- View/download PDF
11. Flexible Platform for Integration, Collection, and Analysis of Social Media for Open Data Providers in Smart Cities
- Author
-
Thanh-Cong Le, Minh-Triet Tran, and Quoc-Vuong Nguyen
- Subjects
World Wide Web ,Open data ,Computer science ,Smart city ,Social media ,Applications of artificial intelligence ,Diversification (marketing strategy) ,Software architecture ,Data type ,Facial recognition system - Abstract
Developing infrastructure and intelligent utilities for smart cities is an important trend in the world as well as in Vietnam. Thus, it is important to assist developers in building services for open data and smart city utilities. This motivates our proposal to develop a flexible platform with useful components, which can be integrated to develop these solutions quickly, to listen and analyze data from different social media sources with the diversification of data types, to provide open data providers in smart cities. Our method focuses on the ability to flexibly integrate artificial intelligence applications into the system to be able to both analyze effectively social events and serve smart cities in creating open data providers. We do not develop a particular system, but we create a platform, including different components, which are easy to be extended and integrated to create specific applications. To evaluate our platform, we develop four systems, including a face recognition system for celebrity recognition in news videos, an object detection system for brand logo recognition, a video highlighting system for summarizing football matches, and a text analysis system serving for keyword occurrences and emotional text analysis for admissions of universities. In these systems, we have collected and analyzed nearly 1000 videos from CNN, CBSN, FIFATV channels on YouTube, thousands of posts from admission pages of universities on Facebook. Each system gives a unique meaning to each specific situation for open data providers in smart cities.
- Published
- 2020
- Full Text
- View/download PDF
12. ImageCLEF 2020: Multimedia Retrieval in Lifelogging, Medical, Nature, and Internet Applications
- Author
-
Bogdan Ionescu, Henning Müller, Renaud Péteri, Duc-Tien Dang-Nguyen, Liting Zhou, Luca Piras, Michael Riegler, Pål Halvorsen, Minh-Triet Tran, Mathias Lux, Cathal Gurrin, Jon Chamberlain, Adrian Clark, Antonio Campello, Alba G. Seco de Herrera, Asma Ben Abacha, Vivek Datla, Sadid A. Hasan, Joey Liu, Dina Demner-Fushman, Obioma Pelka, Christoph M. Friedrich, Yashin Dicente Cid, Serge Kozlovski, Vitali Liauchuk, Vassili Kovalev, Raul Berari, Paul Brie, Dimitri Fichou, Mihai Dogariu, Liviu Daniel Stefan, and Mihai Gabriel Constantin
- Subjects
Recognition of hand drawn website UIs ,Image processing ,lifelogging retrieval and summarization ,medical image classification ,coral image segmentation and classification ,recognition of hand drawn website UIs ,ImageCLEF benchmarking ,annotated data ,Digital video ,Medical image classification ,Information retrieval ,Lifelogging retrieval and summarization ,Lifelog ,Annotated data ,Article ,Coral image segmentation and classification - Abstract
This paper presents an overview of the 2020 ImageCLEF lab that will be organized as part of the Conference and Labs of the Evaluation Forum---CLEF Labs 2020 in Thessaloniki, Greece. ImageCLEF is an ongoing evaluation initiative (run since 2003) that promotes the evaluation of technologies for annotation, indexing and retrieval of visual data with the aim of providing information access to large collections of images in various usage scenarios and domains. In 2020, the 18th edition of ImageCLEF will organize four main tasks: (i) a Lifelog task (videos, images and other sources) about daily activity understanding, retrieval and summarization, (ii) a Medical task that groups three previous tasks (caption analysis, tuberculosis prediction, and medical visual question answering) with new data and adapted tasks, (iii) a Coral task about segmenting and labeling collections of coral images for 3D modeling, and a new (iv) Web user interface task addressing the problems of detecting and recognizing hand drawn website UIs (User Interfaces) for generating automatic code. The strong participation, with over 235 research groups registering and 63 submitting over 359 runs for the tasks in 2019 shows an important interest in this benchmarking campaign. We expect the new tasks to attract at least as many researchers for 2020.
- Published
- 2020
- Full Text
- View/download PDF
13. An Interactive Video Search Platform for Multi-modal Retrieval with Advanced Concepts
- Author
-
Minh-Triet Tran, Nguyen-Khang Le, and Dieu-Hien Nguyen
- Subjects
Focus (computing) ,Information retrieval ,Exploit ,Interactive video ,Computer science ,020207 software engineering ,02 engineering and technology ,Lifelog ,Modal ,0202 electrical engineering, electronic engineering, information engineering ,Data analysis ,020201 artificial intelligence & image processing ,Spatial relationship ,Cluster analysis - Abstract
The previous version of our retrieval system has shown some significant results in some retrieval tasks such as Lifelog’s moment retrieval tasks. In this paper, we adapt our platform to the Video Browser Showdown’s KIS and AVS tasks and present how our system performs in video search tasks. In addition to the smart features in our retrieval system that take advantage of the provided analysis data, we enhance the data with object color detection by employing Mask R-CNN and clustering. In this version of our search system, we try to extract the location information of the entities appearing in the videos and aim to exploit the spatial relationship between these entities. We also focus on designing efficient user interaction and a high-performance way to transfer data in the system to minimize the retrieval time.
- Published
- 2019
- Full Text
- View/download PDF
14. Am I Moving Along a Curve? A Study on Bicycle Traveling-In-Place Techniques in Virtual Environments
- Author
-
Minh-Triet Tran, Tanh Quang Tran, Holger Regenbrecht, Vietnam National University - Ho Chi Minh City (VNU-HCM), University of Otago [Dunedin, Nouvelle-Zélande], David Lamas, Fernando Loizides, Lennart Nacke, Helen Petrie, Marco Winckler, Panayiotis Zaphiris, and TC 13
- Subjects
Redirected walking ,Computer science ,05 social sciences ,Mathematical analysis ,020207 software engineering ,02 engineering and technology ,Bending ,Virtual reality ,Curvature ,050105 experimental psychology ,Human perception ,Curve perception ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,0501 psychology and cognitive sciences ,Point (geometry) ,Locomotion ,Traveling-in-place - Abstract
Part 5: Virtual and Augmented Reality II; International audience; There are many techniques for locomotion and navigation that can support the exploration of large virtual environments in a limited physical area. Previous studies focused on measuring curvature gains and bending gains applied to the walking direction in the real world. However, the effects of different moving techniques and their relationship with shapes and patterns of virtually moving paths have not been studied extensively before. In this study, we present our experimental results on how users perceive two different traveling-in-place techniques with different bending gains of moving paths using a hybrid electric bike simulator. Moreover, the impact of different factors including road textures, road widths, and road curve directions and their relationships with the techniques are investigated. Generally, users could travel along a curve without noticing with a point of subjective equality (PSE) at bending angle $$\beta $$ = 1.42$$^\circ $$, and a just-noticeable difference (JND) of 0.75$$^\circ $$ for a movement at around 20 km/h during 5 s. In addition, movement technique, curve direction, and future travel path significantly affected how they perceived the curvature of their travel path.
- Published
- 2019
- Full Text
- View/download PDF
15. Keyword-Search Interval-Query Dynamic Symmetric Searchable Encryption
- Author
-
Huy-Hoang Chung-Nguyen, Dinh-Hieu Hoang, Minh-Triet Tran, and V.-K. Pham
- Subjects
Scheme (programming language) ,Information retrieval ,Range query (data structures) ,Computer science ,business.industry ,Construct (python library) ,Extension (predicate logic) ,Encryption ,Range (mathematics) ,Symmetric-key algorithm ,Interval (graph theory) ,business ,computer ,computer.programming_language - Abstract
Searchable Symmetric Encryption (SSE) enables clients to securely store data on untrusted server while keeping the ability to search and update over the encrypted data efficiently. For practical purposes, we also need several additional properties to make our search function more versatile. In this paper, we introduce an extension type of SSE which we called Keyword-search Interval Dynamic SSE (KIDSSE). In KIDSSE we can search for encrypted files containing a keyword that occurs in a queried range. We also construct a solution for KIDSSE and show that our scheme maintains all important security properties such as forward privacy, backward privacy.
- Published
- 2019
- Full Text
- View/download PDF
16. A Baseline Interactive Retrieval Engine for Visual Lifelogs at the NTCIR-14 Lifelog-3 Task
- Author
-
Kaushik Venkataraman, Graham Healy, Minh-Triet Tran, Van-Tu Ninh, Tu-Khiem Le, Cathal Gurrin, Sinead Smyth, Liting Zhou, and Duc-Tien Dang-Nguyen
- Subjects
Information storage and retrieval systems ,Metadata ,Interactive computer systems ,Information retrieval ,Computer science ,Interactive lifelog search engine ,Lifelog ,Baseline (configuration management) ,Comparative evaluation ,Task (project management) - Abstract
This paper describes the work of DCU research team in collaboration with University of Science, Vietnam, and University of Bergen, Norway at the Lifelog task of NTCIR-14. In this paper, a new interactive retrieval engine is described that supports faceted retrieval and we present the results of an initial experiment with four users. Following this initial experiment, we implement a list of changes for a revised interactive retrieval engine for the LSC2019 comparative evaluation competition. The interactive retrieval system we describe utilises the wide range of lifelog metadata provided by the task organisers to develop an extensive faceted retrieval system.
- Published
- 2019
- Full Text
- View/download PDF
17. Vietnamese Paraphrase Identification Using Matching Duplicate Phrases and Similar Words
- Author
-
Isao Echizen, Nam-Phong Tran, Hoang-Quoc Nguyen-Son, Minh-Triet Tran, and Ngoc-Vien Pham
- Subjects
Matching (statistics) ,business.industry ,Computer science ,Vietnamese ,WordNet ,Headline ,computer.software_genre ,Automatic summarization ,Paraphrase ,language.human_language ,Similarity (network science) ,language ,Artificial intelligence ,business ,computer ,Natural language processing ,Sentence - Abstract
Paraphrase identification is a core component for many significant tasks in natural language processing (e.g., text summarization, headline generation). A method suggested by Bach et al. for detecting Vietnamese paraphrase text using nine similarity metrics. The authors state that it is the first method for Vietnamese text. They evaluated the method on vnPara corpus with 3000 sentence pairs. However, this corpus is limited by collecting from few Vietnamese websites. Most other methods have focused on the English text. For instance, our previous method detected paraphrasing sentences by matching identical phrases and close words using Wordnet similarity. This method is unsuitable for Vietnamese due to the restriction of Wordnet corpora and morphological words in Vietnamese. Therefore, we extend the method to identify the paraphrase by proposing a SimVN metric which measures the similarity of two Vietnamese words. We evaluated the proposed method on the vnPara corpus. The result shows that the method achieves better accuracy (97.78%) comparing with the state-of-the-art method (accuracy = 89.10%). The proposed method then creates a high diversity paraphrase corpus with 3134 sentence pairs in eight main topics from the top fifteen popular Vietnamese news websites.
- Published
- 2018
- Full Text
- View/download PDF
18. Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable Sensors
- Author
-
Minh-Triet Tran, Khac-Tuan Nguyen, Thanh-Luong Vo-Tran, and Dat-Thanh Dinh
- Subjects
Authentication ,Modality (human–computer interaction) ,business.industry ,Computer science ,Wearable computer ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,030229 sport sciences ,010501 environmental sciences ,Accelerometer ,01 natural sciences ,Convolutional neural network ,03 medical and health sciences ,0302 clinical medicine ,Inertial measurement unit ,Computer vision ,Smart environment ,Artificial intelligence ,business ,Wearable technology ,0105 earth and related environmental sciences - Abstract
As inertial sensors are low-cost, easy-to-use, and can be integrated in wearable devices, they can be used to establish as a new modality for user authentication in the smart environment in which computing systems can recognize persons implicitly by their walking patterns. This motivates our proposal to use multi-region size Convolutional Neural Network to recognize users from their gait patterns recorded from accelerometers and gyroscopes in mobile and wearable devices.
- Published
- 2017
- Full Text
- View/download PDF
19. Activity Recognition from Inertial Sensors with Convolutional Neural Networks
- Author
-
Quang-Do Ha and Minh-Triet Tran
- Subjects
Computer science ,business.industry ,Context (language use) ,02 engineering and technology ,Machine learning ,computer.software_genre ,Convolutional neural network ,Computing systems ,Activity recognition ,Inertial measurement unit ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Raw data ,computer ,Wearable technology - Abstract
Human Activity Recognition is one of the attractive topics to develop smart interactive environment in which computing systems can understand human activities in natural context. Besides traditional approaches with visual data, inertial sensors in wearable devices provide a promising approach for human activity recognition. In this paper, we propose novel methods to recognize human activities from raw data captured from inertial sensors using convolutional neural networks with either 2D or 3D filters. We also take advantage of hand-crafted features to combine with learned features from Convolution-Pooling blocks to further improve accuracy for activity recognition. Experiments on UCI Human Activity Recognition dataset with six different activities demonstrate that our method can achieve 96.95%, higher than existing methods.
- Published
- 2017
- Full Text
- View/download PDF
20. VFSC: A Very Fast Sparse Clustering to Cluster Faces from Videos
- Author
-
Dinh-Luan Nguyen and Minh-Triet Tran
- Subjects
Computer science ,business.industry ,Rank (computer programming) ,Frame (networking) ,Pattern recognition ,010103 numerical & computational mathematics ,02 engineering and technology ,Disjoint sets ,01 natural sciences ,Set (abstract data type) ,Face (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,0101 mathematics ,business ,Cluster analysis ,Representation (mathematics) ,Spatial analysis - Abstract
Face clustering is a task to partition facial images into disjoint clusters. In this paper, we investigate a specific problem of face clustering in videos. Unlike traditional face clustering problem with a given collection of images from multiple sources, our task deals with set of face tracks with information about frame ID. Thus, we can exploit two kinds of prior knowledge about the temporal and spatial information from face tracks: sequence of faces in the same track and contemporary faces in the same frame. We utilize this forehand lore and characteristic of low rank representation to introduce a new light weight but effective method entitled Very Fast Sparse Clustering (VFSC). Since the superior speed of VFSC, the method can be adapted into large scale real-time applications. Experimental results with two public datasets (BF0502 and Notting-Hill), on which our proposed method significantly breaks the limits of not only speed but also accuracy clustering of state-of-the-art algorithms (up to 250 times faster and 10% higher in accuracy), reveal the imminent power of our approach.
- Published
- 2017
- Full Text
- View/download PDF
21. Semantic Extraction and Object Proposal for Video Search
- Author
-
Duc Anh Duong, Vinh-Tiep Nguyen, Thanh Duc Ngo, Shin'ichi Satoh, Duy-Dinh Le, and Minh-Triet Tran
- Subjects
Information retrieval ,business.industry ,Computer science ,Data domain ,Semantic search ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Relationship extraction ,Sketch ,Spatial relation ,Semantic computing ,0202 electrical engineering, electronic engineering, information engineering ,Leverage (statistics) ,020201 artificial intelligence & image processing ,business ,0105 earth and related environmental sciences - Abstract
In this paper, we propose two approaches to deal with the problems of video searching: ad-hoc video search and known item search. First, we propose to combine multiple semantic concepts extracted from multiple networks trained on many data domains. Second, to help user find exactly video shot that has been shown before, we propose a sketch based search system which detects and indexes many objects proposed by an object proposal algorithm. By this way, we not only leverage the concepts but also the spatial relations between them.
- Published
- 2016
- Full Text
- View/download PDF
22. How to Teach Young Kids New Concepts with Interactive Videos and Visual Recognition
- Author
-
Minh-Triet Tran, Ba-Huu Tran, and Quan H. To
- Subjects
Multimedia ,business.industry ,Computer science ,Educational technology ,02 engineering and technology ,Object (computer science) ,computer.software_genre ,Variety (cybernetics) ,Support vector machine ,Visual recognition ,0202 electrical engineering, electronic engineering, information engineering ,Selection (linguistics) ,Virtual learning environment ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Mobile device ,computer - Abstract
Advances in modern computing technology have enabled a wide variety of applications in many areas. Realizing that mobile devices such as smartphones and tablets are great learning platforms for educating young children, the authors create an interactive system that helps young kids learn new concepts via videos. By allowing kids to choose objects in the video that they are watching, the system provides relevant information about those objects. It has the effect of enhancing young kids’ understanding about new concepts in the video. The system employs Cross-based Local Multipoint Filtering (CLMF) for object selection and Support Vector Machine (SVM) for recognition. Experimental results show that our system has achieved 95 % recognition accuracy.
- Published
- 2016
- Full Text
- View/download PDF
23. Smart Tourist Guide with Image Understanding Using Visual Instance Search
- Author
-
Minh-Duc Nguyen, Minh-Triet Tran, Thanh-An Than, and Vinh-Tiep Nguyen
- Subjects
World Wide Web ,Human–computer interaction ,Computer science ,ComputerApplications_GENERAL ,Natural (music) ,Mobile device ,Tourism ,Image (mathematics) - Abstract
To get useful information on a landmark and to activate appropriate interaction related to that landmark can be a useful utility on mobile devices for travelers, especially in new visiting places. This motivates our proposal to use visual instance search to develop an interactive smart tourist guide system. Our aim is to provide not only a more accurate way to recommend a landmark and its information but also interesting and useful interactions around the landmark in order to seamlessly integrate real life interaction with the retrieved information. First, we develop our visual instance search framework that is optimized for speed and can achieve the accuracy approximating novel methods. Then, we apply our framework to the landmark recognition problem to replace the traditional approach of classification. Lastly, we apply our framework to our smart tourist guide system to identify a landmark, to provide its information as well as related interactions when given a landmark image. By incorporating visual instance search and interactive information, we can provide more accurate and seamlessly natural way of searching and interacting with landmarks for passengers and visitors in tourism.
- Published
- 2016
- Full Text
- View/download PDF
24. Applying Virtual Reality in City Planning
- Author
-
Minh-Triet Tran, Xuan-Gieng Nguyen, Hai-Khanh Nguyen, Khanh-Duy Vo-Lam, and Minh-Tu Nguyen
- Subjects
Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Software walkthrough ,Virtual reality ,computer.software_genre ,Variety (cybernetics) ,Urban planning ,Human–computer interaction ,Virtual machine ,Gesture recognition ,0202 electrical engineering, electronic engineering, information engineering ,Object model ,020201 artificial intelligence & image processing ,Communications protocol ,computer - Abstract
The rapid growth of virtual reality in recent years has brought this technology to a wide variety of common users. Realizing the potential of this technology in building and planning cities; the authors introduce a system in which architectures are brought together into a 3-dimensional virtual environment in order to collaborate in building cities. This system uses the Oculus Rift as the VR device, combining with Leap Motion to detect user’s hand-gestures. The authors walkthrough all the details in building such systems including object modeling, communication protocols and gesture recognition technique.
- Published
- 2016
- Full Text
- View/download PDF
25. Personalized Annotation for Photos with Visual Instance Search
- Author
-
Vinh-Tiep Nguyen, Bao Truong, Thuyen V. Phan, and Minh-Triet Tran
- Subjects
World Wide Web ,Upload ,Annotation ,Information retrieval ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Visual Word ,tf–idf ,Image retrieval ,Text retrieval - Abstract
Emotional and memorable moments are usually kept and shared on different online services such as Facebook, Flickr, Instagram, and Google Photos. As a result, one of users’ practical needs is to have their photos annotated automatically, especially with personalized tags. This motivates the authors to propose a system that can suggest personalized annotations for a photo uploaded to online services. Our system provides 2 major features. First, the system automatically recommends personalized annotations for newly uploaded photos based on visually similar photos uploaded in the past. Second, our system propagates manual annotations of users to other similar photos existed in their albums. To evaluate the performance of our system, we use the Oxford 5K Building Dataset and our own dataset consisting of personal photos collected from Facebook. Our systems achieves the mean Average Precision of 0.844 and 0.749 respectively on these two datasets. This demonstrates that our proposed solution can be potentially integrated as a useful utility or extension for online photo sharing services.
- Published
- 2016
- Full Text
- View/download PDF
26. Deep Convolutional Neural Network in Deformable Part Models for Face Detection
- Author
-
Vinh-Tiep Nguyen, Atsuo Yoshitaka, Minh-Triet Tran, and Dinh-Luan Nguyen
- Subjects
business.industry ,Computer science ,DeepFace ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Convolutional neural network ,Object detection ,Data set ,Face (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Face detection ,Representation (mathematics) - Abstract
Deformable Part Models and Convolutional Neural Network are state-of-the-art approaches in object detection. While Deformable Part Models makes use of the general structure between parts and root models, Convolutional Neural Network uses all information of input to create meaningful features. These two types of characteristics are necessary for face detection. Inspired by this observation, first, we propose an extension of DPM by adaptively integrating CNN for face detection called DeepFace DPM and propose a new combined model for face representation. Second, a new way of calculating non-maximum suppression is also introduced to boost up detection accuracy. We use Face Detection Data Set and Benchmark to evaluate the merit of our method. Experimental results show that our method surpasses the highest result of existing methods for face detection on the standard dataset with 87.06i??% in true positive rate at 1000 number false positive images. Our method sheds a light in face detection which is commonly regarded as a saturated area.
- Published
- 2016
- Full Text
- View/download PDF
27. Virtual Music Teacher for New Music Learners with Optical Music Recognition
- Author
-
Minh-Triet Tran, V.-K. Pham, and Hai-Dang Nguyen
- Subjects
Support vector machine ,Optical music recognition ,Multimedia ,Computer science ,Piano ,Pop music automation ,Musical instrument ,Musical ,computer.software_genre ,Music education ,Mobile device ,computer - Abstract
Learn to read and understand a music sheet, then play it on a musical instrument are difficult tasks to most beginner music learners. This motivates the authors to propose Virtual Music Teacher, a system to assist beginner music learners in their learning process. By applying our proposed lightweight Optical Music Recognition algorithm to scan and recognize a music sheet, then combine with sound classifying technique, the proposed system can learn what note to be played next, then help a music learner to play it correctly. The experimental results on the dataset consisting of 15 musical scores for beginners show that the proposed system can classify with precision up to 99.9 % using multiple SVM classifiers approach, whereas the sound classifying technique using Fast Fourier Transform can classify note’s pitch recorded from a piano with precision up to 95.71 %. The system is implemented as an application on mobile devices and can be used to assist a music learner to play not only piano but other musical instruments as well.
- Published
- 2015
- Full Text
- View/download PDF
28. Smart Playground: A Tangible Interactive Platform with Regular Toys for Young Kids
- Author
-
Minh-Triet Tran, Thinh Nguyen-Vo, and Duc-Minh Pham
- Subjects
business.industry ,Computer science ,Feature vector ,Deep learning ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,RGB color model ,Computer vision ,Artificial intelligence ,business ,Convolutional neural network - Abstract
In modern world, children need to get familiar with interactive toys to quickly improve their learning and imagination. Our approach is to add augmented information and interaction to common toys on the surface containing them, which is called Smart Playground. Popular methods use three color channels and local features to recognize objects. However, toys of children usually have various pictures with different colors drawn on many small components. Therefore depth data is useful in this case. Each toy usually have unique shape that is distinguishable from others. In this paper, we use an RGB-D sensor to collect information about both color and shape of objects. To learn the training set of toys, an approach of convolutional neural network is used to represent data (both color and depth) by high-level feature vectors. Using the combined results, the accuracy of 3D recognition is more than 90 %.
- Published
- 2015
- Full Text
- View/download PDF
29. Realtime Face Verification with Lightweight Convolutional Neural Networks
- Author
-
Minh N. Do, Nhan Nguyen-Trong Dam, Minh-Triet Tran, Vinh-Tiep Nguyen, and Anh Duc Duong
- Subjects
Scheme (programming language) ,User authentication ,SIMPLE (military communications protocol) ,business.industry ,Computer science ,Machine learning ,computer.software_genre ,Convolutional neural network ,Computing systems ,Original data ,Computer engineering ,Software deployment ,Face verification ,Artificial intelligence ,business ,computer ,computer.programming_language - Abstract
Face verification is a promising method for user authentication. Besides existing methods with deep convolutional neural networks to handle millions of people using powerful computing systems, the authors aim to propose an alternative approach of a lightweight scheme of convolutional neural networks (CNN) for face verification in realtime. Our goal is to propose a simple yet efficient method for face verification that can be deployed on regular commodity computers for individuals or small-to-medium organizations without super-computing strength. The proposed scheme targets unconstrained face verification, a typical scenario in reality. Experimental results on original data of Labeled Faces in the Wild dataset show that our best CNN found through experiments with 10 hidden layers achieves the accuracy of \((82.58 \pm 1.30)\,\%\) while many other instances in the same scheme can also approximate this result. The current implementation of our method can run at 60 fps and 235 fps on a regular computer with CPU-only and GPU configurations respectively. This is suitable for deployment in various applications without special requirements of hardware devices.
- Published
- 2015
- Full Text
- View/download PDF
30. A Rule-Based Approach for Detecting Location Leaks of Short Text Messages
- Author
-
Minh-Triet Tran, Isao Echizen, Hoang-Quoc Nguyen-Son, Hiroshi Yoshiura, and Noboru Sonehara
- Subjects
Information sensitivity ,Social network ,Computer science ,business.industry ,Heuristic ,Data set (IBM mainframe) ,Rule-based system ,Adversary ,Computer security ,computer.software_genre ,Baseline (configuration management) ,business ,computer - Abstract
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them for privacy leaks, such as the users’ location. Unlike other approaches that try to detect these leaks using complete message streams, we put forward a rule-based approach that works on single and very short messages to detect location leaks. We evaluated our approach based on 2817 tweets from the Tweets2011 data set. It scores significantly better (accuracy = 84.95 %) on detecting whenever a message reveals the user’s location than a baseline using machine learning and three extensions using heuristic. Advantages of our approach are not only to apply for online social network messages but also to extend for other areas (such as email, military, health) and for other languages.
- Published
- 2015
- Full Text
- View/download PDF
31. Smart Kiosk with Gait-Based Continuous Authentication
- Author
-
Minh-Triet Tran, Duong-Tien Phan, Minh-Phuc Nguyen, Nhan Nguyen-Trong Dam, and Toan-Thinh Truong
- Subjects
Authentication ,business.product_category ,Computer science ,business.industry ,Process (computing) ,Wearable computer ,Interactive kiosk ,Support vector machine ,Gait (human) ,Human–computer interaction ,Embedded system ,Identity (object-oriented programming) ,business ,Mobile device - Abstract
The authors propose to develop a smart kiosk that plays the role of an identity selector activated implicitly when a user is approaching that kiosk. The identity of a user is recognized implicitly in background by a mobile/wearable device based on his or her gait features. Upon arriving at a smart kiosk, the authentication process is performed automatically with the current available user identity in his or her portable device. To realize our system, we propose a new secure authentication scheme compatible with gait-based continuous authentication that can resist against known attacks, including three-factor attacks. Furthermore, we also propose a method to recognize users from their moving patterns using multiple SVM classifiers. Experiments with a dataset with 38 people show that this method can achieve the accuracy up to 92.028i¾?%.
- Published
- 2015
- Full Text
- View/download PDF
32. Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment
- Author
-
Isao Echizen, Anh Duc Duong, Minh-Triet Tran, and Toan-Thinh Truong
- Subjects
Authentication ,Correctness ,Computer science ,Forward secrecy ,Distributed computing ,Authentication protocol ,Lightweight Extensible Authentication Protocol ,Session key ,Strong authentication ,Mutual authentication - Abstract
Perfect forward secrecy is considered as the most important standard to evaluate a strong authentication scheme. There are many results researched to achieve this property without using hard problems. Recently, the result of Chang et al has some advances such as, the correctness of schemes mutual authentication and session key agreement demonstrated in BAN-logic or the overheads reduction of system implementation. However, in this paper, we prove that their scheme is still vulnerable to impersonation attacks and session key leakage. To overcome those limitations and be practical, we use different notion to propose time efficient scheme conducted in experiment. Our proposed method can be applied for remote user authentication in various scenarios, including systems with user authentication using mobile or wearable devices.
- Published
- 2015
- Full Text
- View/download PDF
33. Comics Instance Search with Bag of Visual Words
- Author
-
Vinh-Tiep Nguyen, Minh-Triet Tran, and Duc-Hoang Nguyen
- Subjects
Information retrieval ,Computer science ,business.industry ,ComputingMilieux_PERSONALCOMPUTING ,Process (computing) ,RANSAC ,Comics ,Inverted index ,GeneralLiterature_MISCELLANEOUS ,Textual information ,World Wide Web ,Bag-of-words model in computer vision ,Visual Word ,business - Abstract
Comics is rapidly developing and attracting a lot of people around the world. The problem is how a reader can find a translated version of a comics in his or her favorite language when he or she sees a certain comics page in another language. Therefore, in this paper, we propose a comics instance search based on Bag of Visual Words so that readers can find in a collection of translated versions of various comics with a single instance as a comics page in an arbitrary language. Our method is based on visual information and does not rely on textual information of comics. Our proposed system uses Apache Lucene to handle inverted index process to find comics pages with visual words and spatial verification using RANSAC to eliminate bad results. Experimental results on our dataset with 20 comics containing more than 270,000 images achieve the accuracy up to 77.5i¾?%. This system can be improved for building a commercial system that allows a reader easily search a multi-language collection of comics with a comics page as an input query.
- Published
- 2015
- Full Text
- View/download PDF
34. Picture-Driven User Interface Development for Applications on Multi-platforms
- Author
-
Minh-Triet Tran, Anh-Duc Duong, and Vinh-Tiep Nguyen
- Subjects
Event-driven programming ,Computer science ,business.industry ,Natural user interface ,Sketch recognition ,Graphical user interface testing ,Post-WIMP ,User interface design ,Software development process ,Software ,Model–view–controller ,Magic pushbutton ,Human–computer interaction ,Look and feel ,Software design ,Android (operating system) ,Model-driven architecture ,User interface ,business ,Computer-aided software engineering ,computer ,Mobile device ,Graphical user interface ,computer.programming_language - Abstract
Graphical user interfaces are usually first sketched out manually as hand drawing pictures and then must be realized by software developers to become prototypes or usable user interfaces. This motivates our proposal of a smart CASE tool that can understand hand drawing sketches of graphical user interfaces, including forms and their navigations, then automatically transform such draft designs into real user interfaces of a prototype or an application. By using the ideas of modeling and model-transformation in model driven engineering, the authors also propose a mechanism to generate graphical user interfaces as forms targeting different platforms. Experimental results show that our sketch recognition to understand hand drawing graphical user interfaces can achieve the accuracy of 97.86% and 95% in recognizing 7 common UI controls and arrows for navigation respectively. Our model transformation engine can generate user interfaces as forms for applications on 3 different platforms of mobile devices, including Windows Phone, Android, and iOS. This approach follows the trend to develop a new generation of smart CASE tools that can understand and interpret conceptual software design models into concrete software elements and components to assist the software development process in a natural way.
- Published
- 2014
- Full Text
- View/download PDF
35. Local Descriptors without Orientation Normalization to Enhance Landmark Regconition
- Author
-
Chau-Sang Nguyen Ngoc, Vinh-Tiep Nguyen, Minh-Triet Tran, Dai-Duong Truong, and Anh Duc Duong
- Subjects
Landmark ,Computer science ,business.industry ,Feature extraction ,Visual descriptors ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Normalization (image processing) ,Scale-invariant feature transform ,Pattern recognition ,Computer vision ,Visual Word ,Artificial intelligence ,business ,Mobile device - Abstract
Derive from practical needs, especially in tourism industry; landmark recognition is an interesting and challenging problem on mobile devices. To obtain the robustness, landmarks are described by local features with many levels of invariance among which rotation invariance is commonly considered an important property. We propose to eliminate orientation normalization for local visual descriptors to enhance the accuracy in landmark recognition problem. Our experiments show that with three different widely used descriptors, including SIFT, SURF, and BRISK, our idea can improve the recognition accuracy from 2.3 to 12.6% while reduce the feature extraction time from 2.5 to 11.1%. This suggests a simple yet efficient method to boost the accuracy with different local descriptors with orientation normalization in landmark recognition applications.
- Published
- 2014
- Full Text
- View/download PDF
36. How Do We Teach Young Children New Concepts via Sketching?
- Author
-
Chau Thai Truong, Minh-Triet Tran, and Duy-Hung Nguyen-Huynh
- Subjects
3D interaction ,Human–computer interaction ,Interface (Java) ,Sketch recognition ,Computer science ,Natural (music) ,Sketch ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
The authors propose a system that supports children to learn new concepts of familiar topics via their sketches on an interaction surface. The proposed system has two main subcomponents: a system of interaction surface with touch detection from depth images captured by a Kinect and a sketch recognition module based on the idea of bag-of-word model. The system provides a natural and intuitive interface for children because they can learn new concepts via sketching. With the dataset of 70 common concepts, the accuracy of the sketch recognition is 78.21% and the average response time to recognize a sketch is 0.86s. The sketch database can also be easily customized to teach new concepts to children.
- Published
- 2014
- Full Text
- View/download PDF
37. Two-Way Biometrics-Based Authentication Scheme on Mobile Devices
- Author
-
Duong-Tien Phan, Minh-Triet Tran, Toan-Thinh Truong, and Anh Duc Duong
- Subjects
Authentication ,Computer science ,Authentication protocol ,User identifier ,Data_MISCELLANEOUS ,Lightweight Extensible Authentication Protocol ,Mobile computing ,Password cracking ,Denial-of-service attack ,Computer security ,computer.software_genre ,Replay attack ,computer - Abstract
Online transactions with mobile devices through internet environment have become popular worldwide. Therefore, many authentication schemes have been proposed to protect users from various potential attacks in e-transactions with online service providers from mobile devices. In 2013, Khan et. al. propose a key-hash based scheme on mobile devices to resist known kinds of attacks that previous schemes cannot resist. However, we prove that Khan et. al.’s scheme still cannot withstand impersonation, denial of service, and three-factor attacks. This motivates our proposal of an improved scheme to further overcome the found limitations in Khan’s scheme. The main idea of our proposed method is that the user ID and the secret key of the server are hashed together to prevent user impersonation. We also prove that our method can also resist against known attacks, such as server and user impersonation attack, replay attack, password guessing attack, malicious user attack, mobile device loss attack, attacks due to ID theft, attacks using login request.
- Published
- 2014
- Full Text
- View/download PDF
38. Smart Card Based User Authentication Scheme with Anonymity
- Author
-
Minh-Triet Tran, Toan-Thinh Truong, and Anh Duc Duong
- Subjects
Engineering ,Authentication ,business.industry ,Internet privacy ,Computer security ,computer.software_genre ,Mobile phone ,Session key ,The Internet ,Smart card ,business ,Mobile device ,Replay attack ,computer ,Anonymity - Abstract
Mobile devices (e.g., PDA, mobile phone, tablet, and notebook PC) become necessary for a convenient and modern life. So, we can use them to access services, for examples online shopping, internet banking. In such insecure environment, we see that communications are more and more essential because they defend users and providers against illegitimate adversaries. Recently, Shin et al have proposed scientific paper entitled ’A Remote User Authentication Scheme with Anonymity for Mobile Devices’ to enhance security for remote user authentication. They claimed that their scheme is truly more secure than previous ones and it can resist various attacks. However, it is not true because their scheme’s vulnerable to insider, impersonation and replay attacks. In this paper, we present an improvement to their scheme to isolate such problems.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.