Results (41)
Search Parameters:
Keyword: Feature ExtractionInvestment of Classic Deep CNNs and SVM for Classifying Remote Sensing Images
Feature extraction is an important process in image classification for achieving an efficient accuracy for the classification learning models. One of these methods is using the convolution neural networks. The use of the trained classic deep convolution neural networks as features extraction gives a considerable results in the remote sensing images classification models. So, this…
Read MoreDifferential Evolution based Hyperparameters Tuned Deep Learning Models for Disease Diagnosis and Classification
With recent advancements in medical filed, the quantity of healthcare care data is increasing at a faster rate. Medical data classification is considered as a major research topic and numerous research works have been already existed in the literature. Presently, deep learning (DL) models offers an efficient method for developing a dedicated model to determine…
Read MoreA Support Vector Machine Based Technique for Fault Detection in A Power Distribution Integrated System with Renewable Energy Distributed Generation
The integration of renewable energy distributed generation (REDG) into the energized distribution power grid has become more popular in recent years. This has been escalated by the general global energy shortages. The REDG has proven to be effective for energy sustainability and reliability. However, there are technical challenges which arise from integrating REDG into the…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreNonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection
Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreCombination of Salient Object Detection and Image Matching for Object Instance Recognition
Object Instance Recognition aims to classify objects specifically and usually use a single reference image. It is possible to be used in many applications such as visual search, information retrieval and augmented reality. However, various things affect the appearance of the objects, which makes the recognition process harder, especially if a single reference image is…
Read MoreDesign of Efficient Convolutional Neural Module Based on An Improved Module
In order to further improve the feature extraction performance of the convolutional neural networks, we focus on the selection and reorganization of key features and suspect that simple changes in the pooling layers can cause changes in the performance of neural networks. According to the conjecture, we design a funnel convolution module, which can filter…
Read MoreClassification Model of Contact Center Customers Emails Using Machine Learning
E-mail is one of the media services used at the contact center. The challenge faced by e-mail services is how to handle e-mails that enter large quantities every day efficiently to provide fast and appropriate service to customers. The purpose of this study is to find which method has the best accuracy in classifying emails…
Read MoreA Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection
This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…
Read MoreZebrafish Larvae Classification based on Decision Tree Model: A Comparative Analysis
Screening the abnormal development of the zebrafish embryos before and after being hatched for a large number of samples is always carried out manually. The manual process is presented as a tedious work and low-throughput. The single female fish produce hundreds of eggs in every single mating process, the samples of the zebrafish embryos should…
Read MoreAuto-Encoder based Deep Learning for Surface Electromyography Signal Processing
Feature extraction is taking a very vital and essential part of bio-signal processing. We need to choose one of two paths to identify and select features in any system. The most popular track is engineering handcrafted, which mainly depends on the user experience and the field of application. While the other path is feature learning,…
Read MoreMachine Learning framework for image classification
Hereby in this paper, we are going to refer image classification. The main issue in image classification is features extraction and image vector representation. We expose the Bag of Features method used to find image representation. Class prediction accuracy of varying classifiers algorithms is measured on Caltech 101 images. For feature extraction functions we evaluate…
Read MoreFace Recognition and Tracking in Videos
Advancement in computer vision technology and availability of video capturing devices such as surveillance cameras has evoked new video processing applications. The research in video face recognition is mostly biased towards law enforcement applications. Applications involves human recognition based on face and iris, human computer interaction, behavior analysis, video surveillance etc. This paper presents face…
Read MoreComputational Intelligence Methods for Identifying Voltage Sag in Smart Grid
In recent years pattern recognition of power quality (PQ) disturbances in smart grids has developed into crucial topic for system equipments and end-users. Undoubtedly analyzing the PQ disturbances develop and maintain smart grids effectiveness. Voltage sags are the most common events that affect power quality. These faults are also the most costly. This paper represents…
Read MoreDeep venous thrombus characterization: ultrasonography, elastography and scattering operator
A thrombus or a blood clot is the result of blood coagulation which is a natural process to prevent bleeding. An inappropriate formation of a thrombus in a deep vein is known as Deep Venous Thrombosis (DVT). The main complication of a DVT is a Pulmonary Embolism (PE) which occurs when a thrombus breaks loose…
Read More
