Fish disease diagnosis is a difficult process and needs high level of expertise. Any attempt of developing the system dealing with the fish disease diagnosis and to overcome various difficulties is in it has still not...
详细信息
ISBN:
(纸本)9781538609699
Fish disease diagnosis is a difficult process and needs high level of expertise. Any attempt of developing the system dealing with the fish disease diagnosis and to overcome various difficulties is in it has still not met any extra ordinary success. Identification of diseased fish at early stage is necessary step to prevent from spreading disease. This paper recognizes and identifies the EUS (Epizootic Ulcerative syndrome) disease which is caused by bn Aphanomyces invadans, a fungal pathogen. It is a red spot disease and looks like ulcer hence it is generally misidentified by the people. The paper is divided into two parts, in the first part segmentation has been applied to enhance the image, various edge detection techniques have applied to get the useful information and Morphological operations have been applied on the EUS diseased fish image. In second part features are extracted from the EUS infected fish image through different feature Descriptors i.e. HOG (Histogram of Gradient), FAST (Features from Accelerated Segment Test) and classify the EUS infected and Non-EUS infected fish image through machinelearning Algorithms and find the classification accuracy through Classifier. If PCA applied after feature extraction then it increases the accuracy as it is a dimensional reduction. The proposed combination of techniques gives better accuracy as compared to the others. The Experimentation has been done on MATLAB environment on real images of EUS infected fish database.
Developing a secure software is time consuming and a complex activity. The main source of insecurity is vulnerabilities in the software. So the prediction of software vulnerability plays important role in software eng...
详细信息
ISBN:
(纸本)9781509044429
Developing a secure software is time consuming and a complex activity. The main source of insecurity is vulnerabilities in the software. So the prediction of software vulnerability plays important role in software engineering, especially in web application development. A software vulnerability prediction model forecasts whether a software component is vulnerable or not. This paper describes various software vulnerability prediction models. Mainly two types of software vulnerability models are used to predict the vulnerability component in software. In software metrics based prediction model, different software metrics are used as an indicator of software vulnerability. In text analysis based method, source code of the software is used as input to the prediction model. Source code is converted into tokens and frequencies. These are used to predict the vulnerability.
This Automated driving is an emerging technology in which a car performs recognition, decision making, and control. Recognizing surrounding vehicles is a key technology in order to generate a trajectory of ego vehicle...
详细信息
ISBN:
(纸本)9781509066643
This Automated driving is an emerging technology in which a car performs recognition, decision making, and control. Recognizing surrounding vehicles is a key technology in order to generate a trajectory of ego vehicle. This paper is focused on detecting a turn signal information as one of the driver's intention for surrounding vehicles. Such information helps to predict their behavior in advance especially about lane change and turn left-or-right on intersection. Using their intension, the automated vehicle is able to generate the safety trajectory before they begin to change their behavior. The proposed method recognizes the turn signal for target vehicle based on mono-camera. It detects lighting state using Convolutional Neural Network, and then calculates a flashing frequency using Fast Fourier Transform.
Currently deep machinelearningtechniques are widely adopted by computer vision andsignalprocessing communities. Deep learning, in particular, the Convolutional Neural Networks (CNN), are the most impressive classif...
详细信息
ISBN:
(纸本)9781509037049
Currently deep machinelearningtechniques are widely adopted by computer vision andsignalprocessing communities. Deep learning, in particular, the Convolutional Neural Networks (CNN), are the most impressive classifiers widely used for image classification in recent years. CNN model allows the machine to learn automatically about the complex image features from its representation, minimizing the need of human experts in feature extraction. Such a hierarchical representation learning of the images makes CNN a more promising model for classification of different kinds of images as compared to the traditional machinelearning models. In this paper, one such successful implementation of CNN is performed for classifying low resolution radio astronomical images containing objects like 'Radio Halos and Relics', and several other ` Point Radio Sources'. For such images, low resolution makes feature extraction a difficult task. Hence, a CNN based classification model proved more efficient in this casegiving a classification accuracy of 88%.
Steganalysis is the process of detecting the hidden information in the carrier. Most used carriers for steganography are images due to the redundant information present in the images and frequency of their use on the ...
详细信息
ISBN:
(纸本)9781509044429
Steganalysis is the process of detecting the hidden information in the carrier. Most used carriers for steganography are images due to the redundant information present in the images and frequency of their use on the Internet. Steganalysis methods are classified into two categories, Targeted steganalysis and universal steganalysis. Targeted steganalysis is based on analysis of individual and known steganographic scheme. Blind steganalysis methods detect steganographic schemes created by unknown random stego-systems. The objective of steganalysis algorithms is to distinguish stego images from pure images. A classifier is built based on stego and pure images. When the knowledge of steganographic scheme is not available, a general steganalyzer is built, which is trained with a set of pure images and a set of stego images generated by various steganographic algorithms. The performance of steganalysis algorithm depends on three important aspects, preprocessing technique, feature selection & extraction and classification. This paper presents the contemporary steganalysis schemes discussing the details and comparing various aspects of these methods.
This study applies machinelearning to a popular inpatient data set to identify whether black patients are treated differently than other patients in the invasive heart treatment decision. We use reverse machine learn...
详细信息
ISBN:
(纸本)9781509047222
This study applies machinelearning to a popular inpatient data set to identify whether black patients are treated differently than other patients in the invasive heart treatment decision. We use reverse machinelearning to predict patient race using treatment and comorbidities in a matched patient sample. Our finding is suggestive that treatment choice only moderately depends on patient race.
The proceedings contain 97 papers. The topics discussed include: improved k-d tree-segmented block truncation coding for color image compression;an error detection and recovery technique for images compressed with the...
ISBN:
(纸本)9781538609682
The proceedings contain 97 papers. The topics discussed include: improved k-d tree-segmented block truncation coding for color image compression;an error detection and recovery technique for images compressed with the CCSDS compression algorithm;adaptive compressive-sensing of 3D point clouds;compressed sensing MRI with total variation and frame balanced regularization;medical image fusion based on GPU accelerated nonsubsampled shearlet transform and2D principal component analysis;a novel approach on classification of infant activity post surgery based on motion vector;automatic localization of optic disc based on deep learning in fundus images;a novel compensation algorithm of aerial image registration;three-dimensional positioning using ALOS/prism triple linear-array satellite images;digital anthropometry for human body measurement on android platform;stacked hidden Markov model for motion intention recognition;image processing algorithm for extracting the phase map from structured lights;supervised 3D graph-based automated epidermal thickness estimation;optimizing cognitive analysis sensitivity of photospheres using cube maps;detecting AMD caused vision scotoma through eye tracking;andlearning visual odometry for unmanned aerial vehicles.
Physical Unclonable Functions (PUFs) are emerging as an important building block in hardware security. It has been widely used in key generation and authentication. However, Strong PUFs are vulnerable to the machine L...
详细信息
To serve large user populations, autonomous intervention systems (i.e. intelligent agents) are being developed to play more active roles such as fitness coaches and clinical disease prevention aids. Although generic u...
详细信息
ISBN:
(纸本)9781509047222
To serve large user populations, autonomous intervention systems (i.e. intelligent agents) are being developed to play more active roles such as fitness coaches and clinical disease prevention aids. Although generic user models have been developed, users may require extensive individualization to meet their personal needs. machinelearning techniques may be applied to learn tailored intervention policies for users. However, traditional machinelearning requires significant amounts of data to learn an optimal policy. For wearable technology, this may mean probing the user to perform some activity and gauging user response. This paper presents a feasible intervention system model and discusses learners for tailoring user intervention policies. We examine how similar the general user model has to be with respect to the tailored model in order for our learner to perform well.
Pregnancy and childbirth are important transitional life events for women. Like many other transitional life events, the effects of pregnancy and childbirth can have significant impact on a mother's physical and m...
详细信息
ISBN:
(纸本)9781509047222
Pregnancy and childbirth are important transitional life events for women. Like many other transitional life events, the effects of pregnancy and childbirth can have significant impact on a mother's physical and mental well-being. Sometimes they can even lead to Postpartum Depression (PPD). If left untreated, PPD can be debilitating for the mother and can adversely affect her ability to take care of herself and her infant. Since PPD is not clinically diagnosable, we consider the problem of predicting PPD from survey data about demographics, depression, and pregnancy etc. We adapt the successful functional-gradient boosting algorithm that can handle class imbalance in a principled manner. Our results demonstrate that the proposed machinelearning approach can outperform the baseline classifiers and, consequently, demonstrate the potential of machinelearning in predicting PPD.
暂无评论