Recommender systems utilize algorithms and data to predict user preferences based on their past choices. While these systems can be highly accurate, this increased accuracy can sometimes lead to predictability and mon...
详细信息
Snow accumulation on solar panels reduces their performance in energy generation regions. Hence certain image processing methods were developed for segmenting snow from the normal areas of solar panels. Graph Cut and ...
详细信息
The price of passengers is closely related to the travel cost of passengers and the revenue of driverless shared bus. Therefore, the design of pricing mechanism is important to improve the market efficiency of driverl...
详细信息
The art of hiding secret text within an innocuous cover medium is steganography. Steganalysis is the counterpart of steganography which focuses on the detection and extraction of the secret text from the medium. Featu...
详细信息
ISBN:
(数字)9783031612985
ISBN:
(纸本)9783031612978
The art of hiding secret text within an innocuous cover medium is steganography. Steganalysis is the counterpart of steganography which focuses on the detection and extraction of the secret text from the medium. Feature engineering is the crucial field in Stegware Analysis which intends to identify more specific features, focusing on the accuracy and efficiency. Feature engineering is a process in Machine learning where the features of any dataset are selected and extracted for further use. Feature engineering is the process of extracting, transforming and selecting the most relevant features form the data that aids in discriminating between the stego and cover image. This is because, most of the time, the data will be in a raw format. Any ML model needs the data to be pre-processed and kept ready to train the model. Thus, from the pool of raw data, the required data needs to be selected and can be used in training the model. Further, the data at point needs to be extracted to get the precise data. The scope of the work is to identify the various feature engineering techniques available in practice and efficiently use them to achieve high accuracy and precision in the system. The survey focuses on the several feature selection and extraction techniques like filter method, wrapper method and embedded methods. Correlation being one of the feature selection methods is focused;while statistical moments computes the mean, variance and skewness of the feature. The extraction method holds the Computation of Invariants and other such. Comparative study is made on both the methods to understand the concepts with ease. The work starts by taking a sample from the dataset and few feature extraction techniques are applied on the same. Then the original image is compared with the extracted images with the view of histogram. The paper gives valuable insights into the effectiveness of different feature engineering techniques using the dataset and underscores the importance of featu
Advances in immunological research are essential for elucidating immune responses and developing targeted therapeutic approaches. This study proposes an automated method for immune cell classification leveraging machi...
详细信息
The transition from traditional pedagogy to self-learning represents a significant shift in educational practice, propelled by technological advancements and the evolving needs of learners. This study explores the evo...
详细信息
This research work explores the effects of dry, liquid N2-based cryogenic cooling and cryogenic plus MQL hybrid strategy on surface roughness, rake surface temperature, principal cutting-edge temperature, auxiliary cu...
详细信息
Word Priming is an event in which prior subjection to a particular word impacts the reply of the individual to the upcoming correlated word. The response time is inferred to be less in identifying the target word prec...
详细信息
Diabetic retinopathy is considered the leading cause of blindness in the population. High blood sugar levels can damage the tiny blood vessels in the retina at any time, leading to retinal detachment and sometimes gla...
详细信息
In recent years, cyber-attacks have become more frequent and advanced, targeting critical infrastructure, businesses, homes, and government agencies. Detecting and preventing these attacks at the earliest stage possib...
详细信息
暂无评论