Results (245)
Search Parameters:
Keyword: DetectionInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreVideo Risk Detection and Localization using Bidirectional LSTM Autoencoder and Faster R-CNN
This work proposes a new unsupervised learning approach to detect and locate the risks “abnormal event” in video scenes using Faster R-CNN and Bidirectional LSTM autoencoder. The approach proposed in this work is carried out in two steps: In the first step, we used a bidirectional LSTM autoencoder to detect the frames containing risks. In…
Read MoreEnsemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection
The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…
Read MoreCyberbullying Detection by Including Emotion Model using Stacking Ensemble Method
Cyberbullying is a serious problem and caused an immense impact to the victim. To prevent the cyberbullying, the solution is to develop an automatic detection system. In this research, we propose a combined model for cyberbullying detection and emotion detection by using stacking method. The experiment is to create a better model for cyberbullying detection…
Read MoreMachine Learning Algorithms for Real Time Blind Audio Source Separation with Natural Language Detection
The Conv-TasNet and Demucs algorithms, can differentiate between two mixed signals, such as music and speech, the mixing operation proceed without any support information. The network of convolutional time-domain audio separations is used in Conv-TasNet algorithm, while there is a new waveform-to-waveform model in Demucs algorithm. The Demucs algorithm utilizes a procedure like the audio…
Read MoreSurvey on Novelty Detection using Machine Learning Techniques
Novelty detection affords to identify data patterns that stray strikingly from the normal behavior. it allows a good identification and classification of objects which were not known during the learning phase of the model. In this article, we will introduce an organized and comprehensive review of the study on novelty detection. We have grouped existing…
Read MoreEnhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection
Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…
Read MoreDriver Fatigue Tracking and Detection Method Based on OpenMV
Aiming at the problem of fatigue driving, this paper proposed a driver fatigue tracking and detection method combined with OpenMV. OpenMV is used for image acquisition, and the Dlib feature point model is used to locate the detected driver’s face. The aspect ratio of eyes is calculated to judge the opening and closing of eyes,…
Read MoreObserver-Based Method of Feature Extraction for the Fault Detection of Permanent Magnet Synchronous Motors
This paper presents a new observer-based method which deals with the extraction of amplitude of characteristic frequencies for the fault diagnosis in permanent magnet synchronous motors (PMSM). First, a pilot survey is made to investigate the typical harmonics in the line currents of PMSM. Second, an appropriate structure of observer is formulated with the input…
Read MoreEfficient 2D Detection and Positioning of Complex Objects for Robotic Manipulation Using Fully Convolutional Neural Network
Programming industrial robots in a real-life environment is a significant task necessary to be dealt with in modern facilities. The “pick up and place” task is undeniably one of the regular robot programming problems which needs to be solved. At the beginning of the “pick and place” task, the position determination and exact detection of…
Read MoreDetection and Counting of Fruit Trees from RGB UAV Images by Convolutional Neural Networks Approach
The use of Unmanned Aerial Vehicle (UAV) can contribute to find solutions and add value to several agricultural problems, favoring thus productivity, better quality control processes and flexible farm management. In addition, the strategies that allow the acquisition and analysis of data from agricultural environments can help optimize current practices such as crop counting. The…
Read MoreConvolutional Neural Network Based on HOG Feature for Bird Species Detection and Classification
This work is concerned with the detection and classification of birds that have applications like monitoring extinct and migrated birds. Recent computer vision algorithms can precise this kind of task but still there are some dominant issues like low light, very little differences between subspecies of birds, etc are to be studied. As Convolution Neural…
Read MoreVehicle Number Plate Detection and Recognition Techniques: A Review
Vehicle number plate detection and recognition is an integral part of the Intelligent Transport System (ITS) as every vehicle has a number plate as part of its identity. The quantity of vehicles on road is growing in the modern age, so numerous crimes are also increasing day by day. Almost every day the news of…
Read MoreImproved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach
Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…
Read MoreVisual Saliency Detection using Seam and Color Cues
Human have the god gifted ability to focus on the essential part of a visual scenery irrespective of its background. This important area is called the salient region of an image. Computationally achieving this natural human quality is an attractive goal of today’s scientific world. Saliency detection is the technique of finding the salient region…
Read MoreFusion of Optical and Microfabricated Eddy-Current Sensors for the Non-Destructive Detection of Grinding Burn
A sensor fusion concept integrating the optical and microfabricated eddy-current sensor for the non-destructive testing of the grinding burn is reported. For evaluation, reference grinding burn with varying degrees are fabricated on 42CrMo4 tool steel cylinder. The complementary sensing nature of the proposed sensors for the non-destructive testing of the grinding burn is successfully achieved,…
Read MoreAn algorithm for Peruvian counterfeit Banknote Detection based on Digital Image Processing and SVM
In this work we propose an algorithm for Peruvian counterfeit banknotes detection. Our algorithm operates in banknotes with 50, 100 and 200 soles denominations that were manufactured from 2009 onwards. This algorithm offers an automatic diagnosis based on digital image processing and support vector machines (SVM). Current Peruvian counterfeit detection systems are specially designed to…
Read MoreText Mining Techniques for Cyberbullying Detection: State of the Art
The dramatic growth of social media during the last years has been associated with the emergence of a new bullying types. Platforms such as Facebook, Twitter, YouTube, and others are now privileged ways to disseminate all kinds of information. Indeed, communicating through social media without revealing the real identity has emerged an ideal atmosphere for…
Read MoreAn Enhanced Artificial Intelligence-Based Approach Applied to Vehicular Traffic Signs Detection and Road Safety Enhancement
The paper treats a problem for detection and recognition objects in computer vision sector, where researchers recommended OpenCV software and development tool, it’s several and better-remembered library resource for isolating, detecting, and recognition of particular objects, what we would find an appropriate system for detecting and recognition traffic roads signs. The robustness with optimization is…
Read MoreAn Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware
Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…
Read MoreFeature Gate Computational Top-Down Model for Target Detection
Computer vision is a technique used for processing images and videos which are increasingly becoming ubiquitous day by day. Technologies developed are revolving around human needs and demands high computational power as volume of data increases. The extraction of the necessary information for processing, that is independent of various scene complexity is a challenging task.…
Read MoreAutomatic License Plate Detection and Recognition for Jordanian Vehicles
Nowadays, automatic number plate recognition (ANPR) is very important especially in the era of smart cities and intelligent transport systems. Fully automated number plate detection and recognition system helps in reducing time, error, and cost for tracking of vehicles and for recording traffic violations. The main goal of this paper is to design a low…
Read MoreIntrusion Detection and Classification using Decision Tree Based Key Feature Selection Classifiers
Feature selection method applied on an intrusion dataset is used to classify the intrusion data as normal or intrusive. We have made an attempt to detect and classify the intrusion data using rank-based feature selection classifiers. A set of redundant features having null rank value are eliminated then the performance evaluation using various feature selection…
Read MoreVehicle Rollover Detection in Tripped and Untripped Rollovers using Recurrent Neural Networks
Comparing to other types of vehicle accidents, fatality rate of tipped rollover accidents shows significant number. Thus, tripped rollover prevention systems are important in order to keep driver safe. In other hands, different rollover indices are defined to handle the risk. The variable unknown parameters of each index, for instance, current load of the vehicle…
Read MoreSupervised Learning Techniques for Stress Detection in Car Drivers
In this paper we propose the application of supervised learning techniques to recognize stress situations in drivers by analyzing their Skin Potential Response (SPR) and the Electrocardiogram (ECG). A sensing device is used to acquire the SPR from both hands of the drivers, and the ECG from their chest. We also consider a motion artifact…
Read More
