The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vehicle detection is the core function in any Driver Assistant System. Besides the challenge in various environmental conditions, the limitation in execution time and computing power is also critical. This paper proposes a shadow detection step that aims at recognizing the shadow part of the train in various environments (including very tough cases) to accelerate the detection process. We propose...
Twitter is one of world most famous social media. There are many statement expresed in Twitter like happiness, sadness, public information, etc. Unfortunately, people may got angry to each other and write it down as a tweet on Twitter. Some tweet may contain Indonesian swear words. It's serious problem because many Indonesians may not tolerated swear words. Some Indonesian swear words may have multiple...
Fully automated defect detection and classification of automobile components are crucial for solving quality and efficiency problems for automotive manufacturers, due to the rising wage, production costs and warranty claims. However, metrological deviations in form still represent unsolved problems using state-of-the-art techniques, especially for forged or casted components with complex geometry...
In recent years due to increased competition between companies in the services sector, predict churn customer in order to retain customers is so important. The impact of brand loyalty and customer churn in an organization as well as the difficulty of attracting a new customer per lost customer is very painful for organizations. Obtaining a predictive model customer behaviour to plan for and deal with...
Intrusion Detection Systems (IDSs) are powerful systems which monitor and analyze events in order to detect signs of security problems and take action to stop intrusions. In this paper, the Two Layers Multi-class Detection (TLMD) method used together with the C5.0 method and the Naive Bayes algorithm is proposed for adaptive network intrusion detection, which improves the detection rate as well as...
In the big data era, machine learning has become an increasingly popular approach for data processing. Data could be in various forms, such as text, images, audios, videos and signals. The essence of machine learning is to learn any patterns from features of data. In the above types of data, the number of features is massively high, which could result in the presence of a large number of irrelevant...
Action recognition in videos is a hot research topic in computer vision because of the popularization of application such as human-machine interaction, intelligent monitoring. Recently, with the aging phenomenon of population becoming more and more serious, the analysis of senior actions is becoming more and more important. Random forest has been wildly used in action recognition because of its efficiency...
A human action can be seen as transitions between ones body poses over time, where the transition depicts a temporal relation between two poses. Recognizing actions thus involves learning a classifier sensitive to these pose transitions as well as to static poses. In this paper, we introduce a novel method called transitions forests, an ensemble of decision trees that both learn to discriminate static...
With the rapid development of mobile Internet, android system becomes the absolute overlord of the operating system, which has an unparalleled influence to the smart phone industry, but also closely related with people's lives. However, the feature of open source and lacking of regulatory of Android system led to a lot of security risks. Because of the widespread use of Android Intent Mechanism, the...
Climate prediction is the essential one for the unforeseen world and reduces the uncertainty. Many research articles are available in bountiful in research arena. In this work the climate prediction will be obtained through concurrent classifiers, usually pronounced as ensemble classifier. Using ‘N’ number of weather forecasting, web sites the training set well called semantic has formulated with...
This paper aims to identify lead users from an online user innovation community. Based on three dimensions of user characteristics — user activeness, community influence, and user relations, a Random Forest classification model for lead user identification is proposed. Using the data from the MIUI forum of Xiaomi community, this model is tested. The result shows that Random Forest classification based...
In the hyperspectral remote sensing community, decision forests combine the predictions of multiple decision trees (DTs) to achieve better prediction performance. Two well-known and powerful decision forests are Random Forest (RF) and Rotation Forest (RoF). In this work, a novel decision forest, called Partial Least Square Forest (PLSF), is proposed. In the PLSF, we adapt PLS to obtain the components...
This paper proposes a method for construction of classifiers for discharge summaries. First, morphological analysis is applied to a set of summaries and a term matrix is generated. Second, correspond analysis is applied to the classification labels and the term matrix and generates two dimensional coordinates. By measuring the distance between categories and the assigned points, ranking of key words...
This paper presents an analysis on intersection conditions that allow a flight vehicle to achieve the interception of a high-speed and maneuvering target. The intersection conditions contain four parameters, including the intersection angle and initial distance and velocities of a fight vehicle and the target. Firstly, the relative motion model between a flight vehicle and the target with intersection...
A decision tree is an important classification technique in data mining classification. Decision trees have proved to be valuable tools for the classification, description, and generalization of data. J48 is a decision tree algorithm which is used to create classification model. J48 is an open source Java implementation of the C4.5 algorithm in the Weka data mining tool. In this paper, we present...
The accurate identification of the helicopter flight action is the basis for guiding the training of the pilot. According to the accuracy of the helicopter flight action recognition, the paper proposed a new decision-tree-based support vector machine method to realize the helicopter multi-flight action identification. Use the tree structure of the decision tree to solve the multi-class problem of...
Gesture recognition derived from skeletal data plays an important role in our TaiChi rehabilitation training and evaluation system. This paper investigates an extended-Kalman-filter-based preprocessing method to fix those incomplete and inconsistent kinematic sensory data. To evaluate the performance of preprocessing, several representative classifiers such as support-vector-machine (SVM), decision...
Bagging is a popular method used to increase the accuracy of classification, by training a set of classifiers on slightly different datasets and aggregating their output by voting. Usually, the majority voting is used for this purpose, or the plurality voting, when the problem has multiple class values. In this study, we analyze the influence of several voting methods on the performance of two classification...
In the last decade, numerous fake websites have been developed on the World Wide Web to mimic trusted websites, with the aim of stealing financial assets from users and organizations. This form of online attack is called phishing, and it has cost the online community and the various stakeholders hundreds of million Dollars. Therefore, effective counter measures that can accurately detect phishing...
Implementing higher voltages in vehicles like 48V mild hybrid or full-hybrid enables CO2 reduction and weight savings. However, the increase in the voltage demands an accurate and robust protection system again potential fault conditions. Series arc is one of the fault conditions which needs to be detected and addressed before the benefits of using higher voltages in vehicle can be fully realized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.