Special Issue "Recent Advances on Signal Processing and Deep Learning for Public Security and Engineering Applications"

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 15 April 2019

Special Issue Editors

Guest Editor
Prof. Dr. Wen-Hsiang Hsieh

Department of Automation Engineering, National Formosa University, Huwei, Yunlin 632, Taiwan
E-Mail
Interests: engineering applications of materials; mechatronics; automatic machinery
Guest Editor
Prof. Dr. Jia-Shing Sheu

Department of Information Science, National Taiwan University of Education, Taiwan
E-Mail
Interests: signal processing; pattern recognition and image processing; real time face recognition; embedded system
Guest Editor
Dr. Ling Zhong Guo

Department of Automatic Control and Systems Engineering, University of Sheffield, UK
Website | E-Mail
Interests: signal processing; spatio-temporal/infinite dimensional system identification and analysis; Barrel cortex local field potential (LFP) modelling; modelling and analysis of differentially expressed genes in biology
Guest Editor
Prof. Dr. Carlo Meno

School of Mechatronic Systems Engineering, Simon Fraser University, Canada
Website | E-Mail
Interests: signal processing; spatio-temporal/infinite dimensional system identification and analysis; Barrel cortex local field potential (LFP) modelling; modelling and analysis of differentially expressed genes in biology

Special Issue Information

Dear Colleagues,

In recent years, with the rapid growth of signal processing and deep learning technologies, a lot of new algorithms like Local tangent space alignment, Spectral Clustering, Compressive Sensing, Restricted Boltzmann Machine and Long Short-Term Memory, have all been applied into the public security fields, both in model system evolution, design novel applications, and optimize system performance. For instance:

  1. Social security monitoring, warning and control: Personnel identification features accurate identification, integrated feature perception and risk control for people, vehicles and objects, super high-rise building fire prevention and control.
  2. Production security and the prevention and control of major accident: Production process failure judgment and special equipment failure early diagnosis and accurate life prediction.
  3. Withstand natural disasters, emergencies and crisis management capabilities for towns: Urban high-rise building operation and maintenance security protection and city underground integrated pipe security and security.
  4. Scientific and technological strength that supports Impartial justice and justice for the people: Knowledge-Centric wisdom judicial operation support system and Cross-sectoral, multi-service judicial synergy.
  5. Various engineering or biomedical systems that demand advanced signal processing and intelligent approaches for enhance its performance and security.

However, it introduces many technological challenges, such as how to intelligently analyze, mine and understand the fusion information inside from such big data, and how to utilize the mined insights to design novel applications and optimize the legacy systems. This Special Issue aims at providing a forum to discuss the recent advances on signal processing, deep learning, and intelligent algorithm for public security and other engineering applications. Papers dealing with integration of techniques and/or with newly developed techniques are welcome.   

Prof. Wen-Hsiang Hsieh
Prof. Jia-Shing Sheu
Dr. Ling-Zhong Guo
Prof. Carlo Meno
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1500 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Public security
  • Big data computing
  • Data driven
  • Deep learning
  • 3D reconstruction
  • Signal processing
  • Multi-disaster
  • Deep learning image reconstruction
  • Multimedia Security
  • Fault diagnosis and failure identification
  • Intelligent algorithm
  • Intelligent and Learning Control
  • Biomedical and Biological Signal Processing
  • Fuzzy Systems, Neural Networks, Expert Systems, Genetic Algorithms and Data Fusion for Signal Processing
  • Embedded Systems for Signal Processing
  • System Modeling and Simulation, Dynamics and Control
  • Signal, Audio, Speech Analysis and Processing

Published Papers (12 papers)

View options order results:
result details:
Displaying articles 1-12
Export citation of selected articles as:

Research

Jump to: Review

Open AccessArticle Grapheme-to-Phoneme Conversion with Convolutional Neural Networks
Appl. Sci. 2019, 9(6), 1143; https://doi.org/10.3390/app9061143
Received: 14 January 2019 / Revised: 11 March 2019 / Accepted: 12 March 2019 / Published: 18 March 2019
PDF Full-text (19053 KB) | HTML Full-text | XML Full-text
Abstract
Grapheme-to-phoneme (G2P) conversion is the process of generating pronunciation for words based on their written form. It has a highly essential role for natural language processing, text-to-speech synthesis and automatic speech recognition systems. In this paper, we investigate convolutional neural networks (CNN) for [...] Read more.
Grapheme-to-phoneme (G2P) conversion is the process of generating pronunciation for words based on their written form. It has a highly essential role for natural language processing, text-to-speech synthesis and automatic speech recognition systems. In this paper, we investigate convolutional neural networks (CNN) for G2P conversion. We propose a novel CNN-based sequence-to-sequence (seq2seq) architecture for G2P conversion. Our approach includes an end-to-end CNN G2P conversion with residual connections and, furthermore, a model that utilizes a convolutional neural network (with and without residual connections) as encoder and Bi-LSTM as a decoder. We compare our approach with state-of-the-art methods, including Encoder-Decoder LSTM and Encoder-Decoder Bi-LSTM. Training and inference times, phoneme and word error rates were evaluated on the public CMUDict dataset for US English, and the best performing convolutional neural network-based architecture was also evaluated on the NetTalk dataset. Our method approaches the accuracy of previous state-of-the-art results in terms of phoneme error rate. Full article
Figures

Figure 1

Open AccessArticle Concrete Object Anomaly Detection Using a Nondestructive Automatic Oscillating Impact-Echo Device
Appl. Sci. 2019, 9(5), 904; https://doi.org/10.3390/app9050904
Received: 11 January 2019 / Revised: 23 February 2019 / Accepted: 26 February 2019 / Published: 4 March 2019
PDF Full-text (5018 KB) | HTML Full-text | XML Full-text
Abstract
The goal of this study was to develop an impact-echo device that can conduct automatic oscillation tests, process signals rapidly, and apply it to concrete object anomaly analysis. The system presented in this study comprises three parts, namely the impact device, the oscillator [...] Read more.
The goal of this study was to develop an impact-echo device that can conduct automatic oscillation tests, process signals rapidly, and apply it to concrete object anomaly analysis. The system presented in this study comprises three parts, namely the impact device, the oscillator circuit, and signal processing software. The design concept of the impact-echo device was inspired by a pendulum clock, and its implementation used a nondestructive wooden hammer instead of a conventional manual steel hammer. In this study, we used a pulse generator in the adjustable oscillator circuit to produce delayed changes. The delayed changes would activate the wooden hammer that struck the surface of the object. To process the signal, our lab used a built-in sound card in the computer to transfer the reflection soundwave from striking the wall to MATLAB software to analyze the energy of the frequency spectrum. This was conducted to evaluate whether the object contained anomalies and, if so, to determine the location of the anomalies to serve as a reference for real-life implementation. Full article
Figures

Figure 1

Open AccessArticle Multimedia Vision for the Visually Impaired through 2D Multiarray Braille Display
Appl. Sci. 2019, 9(5), 878; https://doi.org/10.3390/app9050878
Received: 19 December 2018 / Revised: 18 February 2019 / Accepted: 22 February 2019 / Published: 1 March 2019
PDF Full-text (11899 KB) | HTML Full-text | XML Full-text
Abstract
Visual impairments cause very limited and low vision, leading to difficulties in processing information such as obstacles, objects, multimedia contents (e.g., video, photographs, and paintings), and reading in outdoor and indoor environments. Therefore, there are assistive devices and aids for visually impaired (VI) [...] Read more.
Visual impairments cause very limited and low vision, leading to difficulties in processing information such as obstacles, objects, multimedia contents (e.g., video, photographs, and paintings), and reading in outdoor and indoor environments. Therefore, there are assistive devices and aids for visually impaired (VI) people. In general, such devices provide guidance or some supportive information that can be used along with guide dogs, walking canes, and braille devices. However, these devices have functional limitations; for example, they cannot help in the processing of multimedia contents such as images and videos. Additionally, most of the available braille displays for the VI represent the text as a single line with several braille cells. Although these devices are sufficient to read and understand text, they have difficulty in converting multimedia contents or massive text contents to braille. This paper describes a methodology to effectively convert multimedia contents to braille using 2D braille display. Furthermore, this research also proposes the transformation of Digital Accessible Information SYstem (DAISY) and electronic publication (EPUB) formats into 2D braille display. In addition, it introduces interesting research considering efficient communication for the VI. Thus, this study proposes an eBook reader application for DAISY and EPUB formats, which can correctly render and display text, images, audios, and videos on a 2D multiarray braille display. This approach is expected to provide better braille service for the VI when implemented and verified in real-time. Full article
Figures

Figure 1

Open AccessArticle Efficient Transcoding and Encryption for Live 360 CCTV System
Appl. Sci. 2019, 9(4), 760; https://doi.org/10.3390/app9040760
Received: 2 January 2019 / Revised: 13 February 2019 / Accepted: 18 February 2019 / Published: 21 February 2019
PDF Full-text (9129 KB) | HTML Full-text | XML Full-text
Abstract
In recent years, the rapid development of surveillance information in closed-circuit television (CCTV) has become an indispensable element in security systems. Several CCTV systems designed for video compression and encryption need to improve for the best performance and different security levels. Specially, the [...] Read more.
In recent years, the rapid development of surveillance information in closed-circuit television (CCTV) has become an indispensable element in security systems. Several CCTV systems designed for video compression and encryption need to improve for the best performance and different security levels. Specially, the advent of 360 video makes the CCTV promising for surveillance without any blind areas. Compared to current systems, 360 CCTV requires the large bandwidth with low latency to run smoothly. Therefore, to improve the system performance, it needs to be more robust to run smoothly. Video transmission and transcoding is an essential process in converting codecs, changing bitrates or resizing the resolution for 360 videos. High-performance transcoding is one of the key factors of real time CCTV stream. Additionally, the security of video streams from cameras to endpoints is also an important priority in CCTV research. In this paper, a real-time transcoding system designed with the ARIA block cipher encryption algorithm is presented. Experimental results show that the proposed method achieved approximately 200% speedup compared to libx265 FFmpeg in transcoding task, and it could handle multiple transcoding sessions simultaneously at high performance for both live 360 CCTV system and existing 2D/3D CCTV system. Full article
Figures

Figure 1

Open AccessArticle An Embedded Gateway with Communication Extension and Backup Capabilities for ZigBee-Based Monitoring and Control Systems
Appl. Sci. 2019, 9(3), 456; https://doi.org/10.3390/app9030456
Received: 22 December 2018 / Revised: 23 January 2019 / Accepted: 26 January 2019 / Published: 29 January 2019
PDF Full-text (5519 KB) | HTML Full-text | XML Full-text
Abstract
ZigBee wireless sensor devices possess characteristics of small size, light weight, low power consumption, having up to 65535 nodes in a sensor network, in theory. Therefore, the ZigBee wireless sensor network (WSN) is very suitable for use in developing monitoring and control (MC) [...] Read more.
ZigBee wireless sensor devices possess characteristics of small size, light weight, low power consumption, having up to 65535 nodes in a sensor network, in theory. Therefore, the ZigBee wireless sensor network (WSN) is very suitable for use in developing monitoring and control (MC) applications, such as remote healthcare, industrial control, fire detection, environmental monitoring, and so on. This dissertation is directed towards the research on the issues of communication extension and backup, encountered in creating ZigBee-based MC systems for military storerooms, together with providing associated solutions. We design an embedded gateway that possesses wired network (Ethernet) and wireless communication (GSM) backup capability. The gateway can not only easily extend the monitoring distance of the ZigBee-based MCS, but can also solve the problem that some military zones do not have wire networks or possess communication blind spots. The results of this dissertation have been practically applied in constructing a paradigm monitoring system of a military storeroom. It is believed that the research results could be a useful reference for developing ZigBee-based MCSs in the future. Full article
Figures

Figure 1

Open AccessArticle Efficient Detection Approach for DTMF Signal Detection
Appl. Sci. 2019, 9(3), 422; https://doi.org/10.3390/app9030422
Received: 22 December 2018 / Revised: 22 January 2019 / Accepted: 22 January 2019 / Published: 27 January 2019
PDF Full-text (1726 KB) | HTML Full-text | XML Full-text
Abstract
A novel tone detection approach, designated as the multi-frequency detecting (MFD) algorithm, is presented in this work as an alternative to conventional single point detection approaches but it is an efficient way to achieve the aim of further computational load reduction for a [...] Read more.
A novel tone detection approach, designated as the multi-frequency detecting (MFD) algorithm, is presented in this work as an alternative to conventional single point detection approaches but it is an efficient way to achieve the aim of further computational load reduction for a dual-tone multi-frequency (DTMF) signal detection. The idea is that an optimal phase search is performed over the frequency band of interest in each tone detection, and then the optimal frequency response of a detector is built accordingly. In this manner, a DTMF detection task is done following one-time detection computation. This proposal demonstrates an overall computational load reduction of 80.49% and 74.06% in comparison with a discrete Fourier transform (DFT) approach and the Goertzel algorithm, respectively. This detection complexity reduction is an advantage and an important issue for applying DTMF detection technique to embedded devices. Full article
Figures

Figure 1

Open AccessArticle Optimal Unit Commitment by Considering High Penetration of Renewable Energy and Ramp Rate of Thermal Units-A case study in Taiwan
Appl. Sci. 2019, 9(3), 421; https://doi.org/10.3390/app9030421
Received: 9 January 2019 / Revised: 18 January 2019 / Accepted: 19 January 2019 / Published: 27 January 2019
PDF Full-text (961 KB) | HTML Full-text | XML Full-text
Abstract
When large amounts of wind power and solar photovoltaic (PV) power are integrated into an independent power grid, the intermittent renewable energy destabilizes power output. Therefore, this study explored the unit commitment (UC) optimization problem; the ramp rate was applied to solve problems [...] Read more.
When large amounts of wind power and solar photovoltaic (PV) power are integrated into an independent power grid, the intermittent renewable energy destabilizes power output. Therefore, this study explored the unit commitment (UC) optimization problem; the ramp rate was applied to solve problems with 30 and 10 min of power shortage. The data of actual unit parameters were provided by the Taiwan Power Company. The advanced priority list method was used together with a combination of a generalized Lagrangian relaxation algorithm and a random feasible directions algorithm to solve a large-scale nonlinear mixed-integer programming UC problem to avoid local and infeasible solutions. The results showed that the proposed algorithm was superior to improved particle swarm optimization (IPSO) and simulated annealing (SA) in terms of the minimization of computation time and power generation cost. The proposed method and UC results can be effective information for unit dispatch by power companies to reduce the investment costs of power grids and the possibility of renewable energy being disconnected from the power system. Thus, the proposed method can increase the flexibility of unit dispatch and the proportion of renewable energy in power generation. Full article
Figures

Figure 1

Open AccessArticle A MAP Overhead Aware Two-Dimensional OFDMA Burst Construction Algorithm
Appl. Sci. 2019, 9(2), 354; https://doi.org/10.3390/app9020354
Received: 22 December 2018 / Revised: 17 January 2019 / Accepted: 18 January 2019 / Published: 21 January 2019
PDF Full-text (2259 KB) | HTML Full-text | XML Full-text
Abstract
Conventional orthogonal frequency division multiple access (OFDMA) burst construction methods can only support limited numbers of connections due to the map overhead and corresponding limitations in the numbers of orthogonal resources blocks, which limits the capacity of current 4G and the following 5th [...] Read more.
Conventional orthogonal frequency division multiple access (OFDMA) burst construction methods can only support limited numbers of connections due to the map overhead and corresponding limitations in the numbers of orthogonal resources blocks, which limits the capacity of current 4G and the following 5th generation (5G) networks. This study therefore provides a novel OFDMA burst construction algorithm and enhanced burst indexing aware algorithm (EHA), which try to maximize the throughput while considering the subchannel diversity and optimizing burst indexing issues. The EHA not only allocates the subchannels with the best channel quality for each burst, but also groups the bursts to alleviate the MAP overhead. Simulation results showed that the EHA yields two times the throughput that has been achieved using previous algorithms under a heavy load. Two contributions of the EHA are: (1) the overhead of burst indexing decreases because massive numbers of connections can be accommodated by one burst; and (2) the overall throughput increases due to that one connection with large data transferring requirements can be split and distributed into several bursts and placed on the subchannels with good channel quality to adopt better modulation coding scheme (MCS), if the saved bandwidth in this burst construction is more than the increased overhead of burst indexing. Full article
Figures

Figure 1

Open AccessArticle Channel-Quality Aware RFID Tag Identification Algorithm to Accommodate the Varying Channel Quality of IoT Environment
Appl. Sci. 2019, 9(2), 321; https://doi.org/10.3390/app9020321
Received: 22 December 2018 / Revised: 11 January 2019 / Accepted: 11 January 2019 / Published: 17 January 2019
PDF Full-text (3201 KB) | HTML Full-text | XML Full-text
Abstract
Radio Frequency Identification (RFID) technique is broadly adopted as the automated identification system for the Internet of Things (IoT). Many RFID anti-collision algorithms were proposed to accelerate the tag identification process. However, they misjudged some unreadable slots which were due to collision instead [...] Read more.
Radio Frequency Identification (RFID) technique is broadly adopted as the automated identification system for the Internet of Things (IoT). Many RFID anti-collision algorithms were proposed to accelerate the tag identification process. However, they misjudged some unreadable slots which were due to collision instead of the bad channel condition, causing low bandwidth usage. This study proposes the Channel-quality Aware Query Tree algorithm (CAQT) to improve the identification performance in an error-prone channel environment. CAQT has three novel features: (1) it estimates the channel quality continuously and statistically in the rapidly changing channel quality environment; (2) it asks the tag for retransmission or to split the collide tags based on the channel quality; (3) the number of the groups which it splits tags is based on the estimated number of tags collide in current slot. The simulation results show that CAQT uses less than 31% slots compared with the conventional algorithms. The simulation results also demonstrate that CAQT provides enhanced performance when the channel quality is varying especially in outdoor environment, for example, ticket checking for railway or subway system. Full article
Figures

Figure 1

Open AccessArticle Hiding Stealth Optical CDMA Signals in Public BPSK Channels for Optical Wireless Communication
Appl. Sci. 2018, 8(10), 1731; https://doi.org/10.3390/app8101731
Received: 20 August 2018 / Revised: 19 September 2018 / Accepted: 20 September 2018 / Published: 25 September 2018
PDF Full-text (5227 KB) | HTML Full-text | XML Full-text
Abstract
A new optical steganography scheme is proposed that transmits a stealth optical code-division multiple-access (OCDMA) signal through a public binary phase-shift keying (BPSK) channel. Polarization beam splitters and arrayed waveguide gratings are used to implement a spectral-polarization coding (SPC) system with an incoherent [...] Read more.
A new optical steganography scheme is proposed that transmits a stealth optical code-division multiple-access (OCDMA) signal through a public binary phase-shift keying (BPSK) channel. Polarization beam splitters and arrayed waveguide gratings are used to implement a spectral-polarization coding (SPC) system with an incoherent optical source. We employ a Walsh–Hadamard code as the signature code of the user who wants to transmit stealth information using the system. A free space optical link applied to this system maintains the polarization states of light during propagation. The secret data are extracted using correlation detection and balanced subtraction in the OCDMA decoder of the intended receiver, and the other signal from the public channel is reduced by the OCDMA decoder. At the demodulator of the public channel, BPSK demodulation eliminates the stealth signal so that the public channel is not affected by the stealth signal. The two signals cannot interfere with each other. The results of this study show that our proposed optical steganography system is highly secure. The stealth signal can be favorably hidden in the public channel when the average source power of the stealth signal, public noise, and public signal are −5, −3, and 0 dBm, respectively. Full article
Figures

Figure 1

Open AccessArticle Research on a Surface Defect Detection Algorithm Based on MobileNet-SSD
Appl. Sci. 2018, 8(9), 1678; https://doi.org/10.3390/app8091678
Received: 26 August 2018 / Revised: 11 September 2018 / Accepted: 13 September 2018 / Published: 17 September 2018
Cited by 5 | PDF Full-text (5328 KB) | HTML Full-text | XML Full-text
Abstract
This paper aims to achieve real-time and accurate detection of surface defects by using a deep learning method. For this purpose, the Single Shot MultiBox Detector (SSD) network was adopted as the meta structure and combined with the base convolution neural network (CNN) [...] Read more.
This paper aims to achieve real-time and accurate detection of surface defects by using a deep learning method. For this purpose, the Single Shot MultiBox Detector (SSD) network was adopted as the meta structure and combined with the base convolution neural network (CNN) MobileNet into the MobileNet-SSD. Then, a detection method for surface defects was proposed based on the MobileNet-SSD. Specifically, the structure of the SSD was optimized without sacrificing its accuracy, and the network structure and parameters were adjusted to streamline the detection model. The proposed method was applied to the detection of typical defects like breaches, dents, burrs and abrasions on the sealing surface of a container in the filling line. The results show that our method can automatically detect surface defects more accurately and rapidly than lightweight network methods and traditional machine learning methods. The research results shed new light on defect detection in actual industrial scenarios. Full article
Figures

Figure 1

Review

Jump to: Research

Open AccessReview A Survey on Robust Video Watermarking Algorithms for Copyright Protection
Appl. Sci. 2018, 8(10), 1891; https://doi.org/10.3390/app8101891
Received: 16 September 2018 / Revised: 2 October 2018 / Accepted: 4 October 2018 / Published: 11 October 2018
PDF Full-text (1425 KB) | HTML Full-text | XML Full-text
Abstract
With the development and popularization of the Internet and the rise of various live broadcast platforms, digital videos have penetrated into all aspects of people’s life. At the same time, all kinds of pirated videos are also flooding the Internet, which seriously infringe [...] Read more.
With the development and popularization of the Internet and the rise of various live broadcast platforms, digital videos have penetrated into all aspects of people’s life. At the same time, all kinds of pirated videos are also flooding the Internet, which seriously infringe the rights and interests of video copyright owners and hinder the healthy development of the video industry. Therefore, robust video watermarking algorithms for copyright protection have emerged as these times require. In this paper, we review robust video watermarking algorithms for copyright protection based on original videos and compressed videos. Basic models and properties of video watermarking algorithms are described, and the evaluation indexes corresponding to each property are also introduced. To help researchers understand various existing robust watermarking algorithms quickly, some basic information and the quantitative estimation of several performances are analyzed and compared. Finally, we discuss the challenges in the research of robust video watermarking algorithms, and give possible development directions for the future. Full article
Figures

Graphical abstract

Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top