The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a classification model for learning state based on individual biometric data. In particular, we use the pupil size as a biometric data and the data has been collected from 72 participants. We also deploy the support vector machine (SVM) in conjunction with k-fold validation as an analysis tool. In order to improve the performance of the SVM, the we remove outliers from the...
The classification and identification of the bird species from the visual image is complex compared by using audio song. The knowledge of the features species type is very important as to ensure it is classified to the correct species. Color-based feature extraction is one of the procedure in extracting the color properties from the bird which to represent the species of the bird. However, it is a...
Facial recognition is a challenging problem in image processing and machine learning areas. Since widespread applications of facial recognition make it a valuable research topic, this work tries to develop some new facial recognition systems that have both high recognition accuracy and fast running speed. Efforts are made to design facial recognition systems by combining different algorithms. Comparisons...
In recent years use of image processing techniques for texture analysis of machined surface is gaining importance in the field of manufacturing. This manuscript addresses texture identification methodology using Wavelet transform and artificial intelligence techniques. Captured images of machined surface using Electric discharge machining, milling, sand blasting and shaping is decomposed in to sub...
Tuberculosis is one of the top ten causes of death worldwide. Although this disease is curable and preventable, yet many new tuberculosis cases still occur especially in developing countries. Many low-income families cannot afford the medical diagnosis for tuberculosis. Therefore, this paper proposes an initial screening for tuberculosis infection using a data mining approach. In this paper, the initial...
Protein ubiquitination, involving the conjugation of ubiquitin on lysine residue, serves as an important modulator of many cellular functions in eukaryotes. Recent advancements in proteomic technology have stimulated increasing interest in identifying ubiquitination sites. However, most computational tools for predicting ubiquitination sites are focused on small-scale data. With an increasing number...
Optical Character Recognition can be defined as the process of detecting and identifying text from a scanned image. There are a number of techniques by which recognition is carried out in several languages. The main steps of optical character recognition are Line segmentation, Word segmentation, Character segmentation and Character recognition. Character recognition has two phases: Feature extraction...
Multi-Label classification aims to classify an example that can belong to many classes. Although One-versus-All (OVA) is the most common approach, our prior work has shown that the proposed One-versus-One (OVO) always gives higher prediction accuracy than OVA. However, OVO requires an extremely high computational cost when there are a large number of labels. In this paper, we apply our OVO SVMs on...
In operating conditions, real time non-destructive testing (NDT) is needed for the identification of tensile damage process of high-speed train gearbox shell. This paper focuses on the application of an acoustic emission (AE) method to study tensile damage. First, tensile tests with AE monitoring were employed to collect AE signals and tensile damage data. Second, feature extraction was performed...
Object detection is a challenging task in the field of pattern recognition. The objective of object detection is to locate the target objects in the testing images. In this paper, we use SVM trained active basis model as a sparse coding model for representing objects. The sparse coding model represents each image as the linear superposition of a small number of Gabor wavelets selected from an over-complete...
This paper presents a user authentication system based on mouse movement data. An available logging tool named Recording User Input (RUI) is used to collect three types of mouse actions — Mouse Move, Point-and-Click on Left or Right mouse button and Drag-and-Drop. Collected data are divided into N-number of blocks consisting of specific number of actions. From each block seventy four features are...
It is very difficult to implement an efficient analysis by using the customary techniques currently available; this is due to the fact that the data size has had a huge increase. Many complications were faced because of the numerous characteristics of big data; some of them include complexity, value, variability, variety, velocity, and volume. The objective of this paper is to implement classification...
Feature extraction is playing a major role in bio signal processing. Feature identification and selection has two approaches. The common approach is engineering handcraft which is based on user experience and application area. While the other approach is feature learning that based on making the system identify and select the best features suit the application. The idea behind feature learning is...
In this paper, we develop a projection neural network to solve the convex quadratic programming problem in support vector machine (SVM) learning. Then, we obtain a unique global solution for the proposed neural network. Furthermore, we prove that this network is completely stable and finite-time convergence. To present the feasibility and efficiency of the proposed neural network for solving the SVM...
Massive proliferation of social media has opened possibilities for perpetrator to conduct the crime of online child grooming. Because the pervasiveness of the problem scale, it may only be tamed effectively and efficiently by using an automatic grooming conversation detection system. Previously, Pranoto, Gunawan, and Soewito [1] had developed a logistic model for the purpose and the model was able...
Blind steganalysis is a method used to detect whether there is a hidden message in a media without having to know the steganography algorithm behind it. Digital image is converted into features using feature extraction algorithm subtractive pixel adjacency matrix. A model is built based on the resulting features using machine learning method support vector machine. The support vector machine method...
Network intrusion detection is critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; based on this detection, appropriate actions can be applied to manage these attacks. Several network intrusion detection systems are proposed and evaluated and many of them are currently in use...
This paper presents novel architectures for machine learning based classifiers using stochastic logic. Two types of classifier architectures are presented. These include: linear support vector machine (SVM) and artificial neural network (ANN). Stochastic computing systems require fewer logic gates and are inherently fault-tolerant. Thus, these structures are well suited for nanoscale CMOS technologies...
Water is classified into four status of water quality, which good condition, lightly polluted, medium polluted and heavyly polluted. The classification status of water quality is very important to know the proper use and handling. Accuracy in classification of the quality status is very important, so that both of the classification algorithm K-Nearest Neighbor (KNN) and Support Vector Machine (SVM)...
Human iris can be used for detecting organ disorders based on iridology science. Nowadays, iridology diagnosis can be done automatically by computer using artificial intelligence approach. This research focused on cardiac diagnosis based on left iris map on clockwise direction around 2:00 to 3:00. The Principal Component Analysis (PCA) is used for feature extraction while the Support Vector Machine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.