Mushroom Recognition Using PCA Algorithm
|
|
- Alisha Pearson
- 7 years ago
- Views:
Transcription
1 , pp Mushroom Recognition Using PCA Algorithm Ashwin Subramaniam 1 and Byung-Joo Oh * Department of Electronics Engineering, Hannam University, Daejeon, Korea 1 ashwinksk@yahoo.com, * bjoh@hnu.kr Abstract This paper proposes a method of distinguishing edible mushrooms from non-edible mushrooms using Principal Component Analysis (PCA) algorithm. This system functions by projecting a mushroom image onto a feature space that spans the significant variations among known set of mushroom images. Mushrooms possess certain significant features such as its stalk size, cap shape etc, and PCA extracts these dominant features and these are the eigenvectors of the set of mushrooms. The projection operation characterizes individual mushroom images by a weighted sum of the eigenvector features and hence to recognize a particular mushroom, so it is necessary only to compare these weights to those individual ones. The performance of the proposed method showed around 85% ~96% success rate that increases with the number of training images, and hence proves to be a reliable algorithm for the recognition of mushrooms. Keywords: Principal component analysis, Mushroom recognition, Mushroom features 1. Introduction Assume that you are walking in the woods and you see a mushroom on the ground, you would like to taste it but you have no idea what type of mushroom it is or whether it is good or harmful. Some mushrooms are poisonous in nature and few are psychoactive. There are a lot of mushrooms that are edible, some creates illness, some are fatal to life. But these fatal mushrooms are easy to come across and are deceptive in nature. While trekking or hiking in mountains it is quite certain that one could encounter these fatal mushrooms and misinterpret them to be safe to consume which may subsequently result in devastating effects. A large number of mushroom species are favored for eating by mushroom hunters. Many field guides on mushrooms are available, but the ability to identify and prepare edible mushrooms is often passed down through generations [1]. There are a few dominant features of a mushroom that distinguishes one from another, which include, Cap(Pileus), Fibrils or Scales or Warts on the cap, Ring(Annulus), Gills(Lamellae) under the cap, Stem(stripe) or Stalk, Cup(volva), Mycelial threads and so on strip. The central motive of this paper is to produce a precautionary methodology that can differentiate between edible, inedible and poisonous mushrooms, so as to provide a helping hand during mushroom hunting or consuming random mushrooms for smart phone applications and to protect the consumer from the fatality causing fleshy fungi. Among various recognition methods, principal component analysis (PCA) specially has been used popularly for face recognition [2-4], but unfortunately it is not easy to find applications related to wild mushroom recognition. PCA is a method used to emphasize * Corresponding Author ISSN: IJSEIA Copyright c 2016 SERSC
2 variation and bring out strong patterns in a dataset. It is a common statistical technique for finding the patterns in high dimensional data. Eigen-vectors have advantages over the other techniques available, such as speed and efficiency. In this paper we try to recognize wild mushrooms by applying PCA algorithm. It is the first step for a feasible study that can be adopted in the smart mobile phone. The organization of this paper is as follows. In Section 2 we introduce principal component analysis algorithm briefly and the flow of mushroom recognition. Mushroom databases for training and test are presented in Section 3. Our experimental results and analysis are presented in Section 4. Finally we conclude in Section Principal Component Analysis 2.1. Principal Component Analysis Work Flow Principal component analysis (PCA) identifies and extracts the major features of a mushroom which is obtained by determining the mean image of the mushroom and comparing it with the mushrooms present in the database. Mushroom Database Figure 1. Work Flow Model Principal component analysis (PCA)[2] involves a mathematical procedure that transforms a number of possibly correlated variables into a smaller number of uncorrelated variables called principal components. Using PCA any particular image can be (i) Economically represented along the eigen pictures coordinate space, and (ii) Approximately reconstructed using a small collection of eigen pictures. 44 Copyright c 2016 SERSC
3 To do this, a mushroom image is projected to several other mushroom templates called eigen-vectors which can be considered as a set of features that characterize the variation between the images. Once a set of eigen-vectors is computed, a mushroom image can be approximately reconstructed using a weighted combination of the eigen-vectors. The projection weights form a feature vector for mushroom representation and recognition. When a new test image is given, the weights are computed by projecting the image onto the eigenvectors. The classification is then carried out by comparing the distances between the weight vectors of the test image and the images from the database (Euclidian distance). Figure 1 shows work flow model of the mushroom recognition PCA Algorithm The algorithm used for PCA is as follows [2-6]. (i) Acquire an initial set of M mushroom images (the training set) and calculate the eigenvectors from the training set, keeping only M' eigen-vectors that correspond to the highest eigenvalue. (ii) Calculate the corresponding distribution in the M'-dimensional weight space for each known individual, and calculate a set of weights based on the input image. (iii) Classify the weight pattern as either a known person or as unknown, according to its distance to the closest weight vector of a known person. Let the training set of images be,,...,. The average image of the mushroom of the set is defined by, Each image differs from the average by vector i i (2) The co- variance matrix is formed by (1) Where the matrix A = [ This set of large vectors is then subject to principal component analysis, which seeks a set of M orthonormal vectors u 1, u 2,,u M. To obtain a weight vector of contributions of individual eigen-vectors to a mushroom image, the mushroom image is transformed into its eigen-vector components projected onto the mushroom image space by a simple operation k = u k T ( (4) for k=1,.., M', where M' M is the number of eigen-vectors used for the recognition. The weights form vector = [ ] that describes the contribution of each eigen-vectors in representing the mushroom image, treating the eigen-vectors as a basis set for (3) Copyright c 2016 SERSC 45
4 mushroom images. The simplest method for determining which mushroom provides the best description of an unknown input image of a mushroom is to find the image k that minimizes the Euclidean distance k. k = ( k ) 2 (5) where is a weight vector describing the k th mushroom from the training set. A mushroom is classified as belonging to k th type when the k is below some chosen threshold. The algorithm functions by projecting mushroom images onto a feature space that spans the significant variations among known mushroom images. The projection operation characterizes an individual mushroom by a weighted sum of eigen-vectors features, so to recognize a particular mushroom, it is necessary only to compare these weights to those of known individuals. The input image is matched to the subject from the training set whose feature vector is the closest within acceptable thresholds 3. Mushroom Databases There are two databases of mushrooms, one is the Train Database as in Figure 2 and the other is the Test Database. The test database has 30 mushrooms and each mushroom has 10 different images in the train database. Different mushrooms such as Ganoderma Luciduum, Amanita Muscaria, Enokii mushroom, Morel mushroom etc., were used in this study. Mushroom images in the train database were composed of different kind of positions and background conditions. This set of 300 different mushroom images, is a self-created database with the help of available images on the internet [7-9]. Considerable variations can be observed in the images as shown in Figure Test and Results Analysis The proposed mushroom recognition method was implemented in Matlab. The average image generated plays an essential role in comparison with the image to be identified via PCA algorithm. Since certain mushrooms like the bleeding tooth mushroom does not follow characteristics similar to the average image, the overall deviation from the mean image amplifies and makes the detection process tedious and erroneous. The images were converted from RGB to grayscale before performing the process of PCA, so that even if the resolution of the image is poor, the detection can still be successful. The 30 images of the test database were tested and 25 mushrooms were identified correctly and 5 were detected incorrectly Reasons for Successful Detection Correct detection as in Figure 4 could be descried for most of the mushrooms and the reason for this successful identification is due to consistent background conditions, lighting and sufficient amount of training image. Since more number of mushrooms is present in a single image it makes the process of comparison all the more efficient. 46 Copyright c 2016 SERSC
5 Figure 2. Mushroom Database (10 Images for each of the 30 Subjects) Copyright c 2016 SERSC 47
6 Figure 3. The Set of 10 Images for One Subject Moreover, mushroom such as the King Oyster Mushroom follows mushroom morphological trends and hence an average image would consist of an equal contribution of uniform images without irregularities in shape Reasons for Errors The reasons for incorrect detection of the mushroom as in Figure 5 may be due to i Inconsistent background conditions of a mushroom in the training database, which alters the significant features of that particular mushroom, while the process of comparison of its mean image. ii Number of train images and their quality. As the number of training images increase, the PCA detection success ratio experiences a proliferation. iii Irregularity in mushrooms as a whole. The distinctive features of a mushroom in general, as discussed earlier are the shape of its cup, stalk, ring (annulus) etc. and this is described by mushroom morphology or the study of mushrooms. Certain mushrooms do not follow this common pattern. For example, the bleeding tooth mushroom neither has a cup nor a stalk, and by nature appears in different odd shapes. PCA finds it difficult to extract specific features from such mushrooms for comparison. Figure 4. Mushrooms that Succeeded in the Recognition Process Figure 5. Mushrooms that were Failed to be Recognized Correctly 5. Analysis of Accuracy and Execution Time The test result shows an appreciably good execution time of approximately 42 seconds when around 10 images are provided for training purpose of one mushroom. The total memory size occupied by the database and the program as a whole sums up to 22.4MB, which most likely adapts to the smart phone standards. The accuracy of the system shows 48 Copyright c 2016 SERSC
7 Execution Time (seconds) Accuracy (%) International Journal of Software Engineering and Its Applications around 85% for a 10 image training set, but was observed to ameliorate substantially with increment in the number of training images. This is depicted in Table 1, and is represented graphically in Figure 6. Table 1. Variations in Accuracy and Execution Time with Respect to No. of Train Images No. of Accuracy Execution Images Time (sec) 10 85% % % % % 77 Variation of Execution Time Execution 85 Time Figure 6. Comparison of Execution Time and Accuracy with Respect to No. of No. of Images Train Images No. of Images 6. Conclusion Variations in Accuracy Accuracy This paper has discussed the extension of PCA algorithm to the recognition of mushrooms by extracting the significant characteristics of a mushroom using its eigenvectors. Predominantly, every mushroom has its own features that are consistent with the mushroom morphology theory, while few rare mushrooms show aberrations. The recognition was performed with differently oriented mushroom images with various positions and background conditions. It was observed that PCA showed around 85% ~96% success rate that increases with the number of training images, and hence proves to be a reliable algorithm for the detection of mushrooms. This paper concentrated PCA based mushroom recognition, subsequently in the near future we plan to combine PCA with neural networks. Having improvised with the detection we plan to have an interactive Graphical User Interface (GUI) based client server system to make this overall system user friendly for smart phone users. Copyright c 2016 SERSC 49
8 Acknowledgments This material is based on work supported by the 2012 Hannam University grant. References [1] [2] M. A. Turk and A. P. Petland, Eigen-faces for Recognition, Journal of Cognitive Neuroscience, vol. 3, (1991), pp [3] B. K. Gunturk, A. U. Batur and Y. Altunbasak, Eigenface-domain super-resolution for face recognition, IEEE Transactions of. Image Processing, vol. 12, no. 5, (2003), pp [4] L.-H. Chan, S.-H. Salleh and C.-M. Ting, Face Biometrics Based on Principal Component Analysis and Linear Discriminant Analysis, Journal of Computer Science, vol. 6, no. 7, (2010), pp [5] B.-J. Oh, Face Recognition by Combining Principal Component Analysis and Multi-layer Neural Networks Classifiers, Journal of Korean Institute of Information Technology, vol. 3, no. 2, (2005), pp [6] A. Gunjan Dashore, B. Dr. V.Cyrril Raj, An efficient method for face recognition using principal component analysis (PCA), International Journal of Advanced Technology & Engineering Research, vol. 2, iss. 2, (2012), pp [7] [8] [9] Authors Ashwin Subramaniam 2014 SRM University, Kattankulathur, Chennai, Tamil Nadu, India Dept. of Electronics Engineering, Hannam University Daejeon, South Korea. Byung-Joo Oh B.S. Electronics Engineering, Busan National University, M.S. Electrical & Computer Engineering, University of New Mexico Ph.D, Electrical & Computer Engineering, University of New Mexico. 1988~ Senior Researcher, ETRI. 1992~Present, Professor in Electronics Engineering, Hannam University. Interest Area: Adaptive control, Neural network, Face detection and recognition, People counting. 50 Copyright c 2016 SERSC
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
More informationAdaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationColour Image Segmentation Technique for Screen Printing
60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationA Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data
, pp. 169-178 http://dx.doi.org/10.14257/ijsh.2014.8.6.16 A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data Eun-Jee Song 1 and
More informationAUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)
AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA) Veena G.S 1, Chandrika Prasad 2 and Khaleel K 3 Department of Computer Science and Engineering, M.S.R.I.T,Bangalore, Karnataka veenags@msrit.edu
More informationFPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
More informationEM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
More informationUsing Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
More informationJournal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
More informationComparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationA Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
More informationMachine Learning and Pattern Recognition Logistic Regression
Machine Learning and Pattern Recognition Logistic Regression Course Lecturer:Amos J Storkey Institute for Adaptive and Neural Computation School of Informatics University of Edinburgh Crichton Street,
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationDevelopment of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver
, pp.161-165 http://dx.doi.org/10.14257/astl.205.98.41 Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver Jeong MyeongSu 1, Moon ChangSoo 1, Gwon DaeHyeok 1 and Cho
More informationDesign and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More informationComputer Vision Based Employee Activities Analysis
Volume 03 Issue 05, September 2014 Computer Vision Based Employee Activities Analysis Md. Zahangir Alom, Nabil Tahmidul Karim, Shovon Paulinus Rozario *, Md. Rezwanul Hoque, Md. Rumman Bin Ashraf, Saikat
More informationANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 ANN Based Fault Classifier and Fault Locator for Double Circuit
More informationHow To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
More information2. IMPLEMENTATION. International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013
Prediction of Market Capital for Trading Firms through Data Mining Techniques Aditya Nawani Department of Computer Science, Bharati Vidyapeeth s College of Engineering, New Delhi, India Himanshu Gupta
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationIndex Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
More informationAssessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
More informationARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM Ms. Radhika D. Rathi 1, Assistant Prof. Ashish Mulajkar 2, Assistant Prof. S. S. Badhe 3 1 Student, E&TCDepartment, Dr.D.Y.Patil School of
More informationKeywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.
Global Journal of Computer Science and Technology Volume 11 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationFacebook Friend Suggestion Eytan Daniyalzade and Tim Lipus
Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information
More informationUse of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationEnvironmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
More informationMachine Learning Logistic Regression
Machine Learning Logistic Regression Jeff Howbert Introduction to Machine Learning Winter 2012 1 Logistic regression Name is somewhat misleading. Really a technique for classification, not regression.
More informationBit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
More information4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS
4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS The GPCRs sequences are made up of amino acid polypeptide chains. We can also call them sub units. The number and
More informationA Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
More informationPattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process
Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process Seung Hwan Park, Cheng-Sool Park, Jun Seok Kim, Youngji Yoo, Daewoong An, Jun-Geol Baek Abstract Depending
More informationA Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method
More informationClustering on Large Numeric Data Sets Using Hierarchical Approach Birch
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationTHREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS
THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS O.U. Sezerman 1, R. Islamaj 2, E. Alpaydin 2 1 Laborotory of Computational Biology, Sabancı University, Istanbul, Turkey. 2 Computer Engineering
More informationImpact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationHow To Cluster
Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main
More information1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationComparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
More informationA Survey on Pre-processing and Post-processing Techniques in Data Mining
, pp. 99-128 http://dx.doi.org/10.14257/ijdta.2014.7.4.09 A Survey on Pre-processing and Post-processing Techniques in Data Mining Divya Tomar and Sonali Agarwal Indian Institute of Information Technology,
More informationComponent Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
More informationBiometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
More informationMADR Algorithm to Recover Authenticity from Damage of the Important Data
, pp. 443-452 http://dx.doi.org/10.14257/ijmue.2014.9.12.39 MADR Algorithm to Recover Authenticity from Damage of the Important Data Seong-Ho An 1, * Kihyo Nam 2, Mun-Kweon Jeong 2 and Yong-Rak Choi 1
More informationFace Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
More information15.062 Data Mining: Algorithms and Applications Matrix Math Review
.6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop
More informationLinear Threshold Units
Linear Threshold Units w x hx (... w n x n w We assume that each feature x j and each weight w j is a real number (we will relax this later) We will study three different algorithms for learning linear
More informationAn Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
More informationCredit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
More informationEfficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
More informationCROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES
Proceedings of the 2 nd Workshop of the EARSeL SIG on Land Use and Land Cover CROP CLASSIFICATION WITH HYPERSPECTRAL DATA OF THE HYMAP SENSOR USING DIFFERENT FEATURE EXTRACTION TECHNIQUES Sebastian Mader
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationA Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow
, pp.233-237 http://dx.doi.org/10.14257/astl.2014.51.53 A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow Giwoo Kim 1, Hye-Youn Lim 1 and Dae-Seong Kang 1, 1 Department of electronices
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationLEAF COLOR, AREA AND EDGE FEATURES BASED APPROACH FOR IDENTIFICATION OF INDIAN MEDICINAL PLANTS
LEAF COLOR, AREA AND EDGE FEATURES BASED APPROACH FOR IDENTIFICATION OF INDIAN MEDICINAL PLANTS Abstract Sandeep Kumar.E Department of Telecommunication Engineering JNN college of Engineering Affiliated
More informationDimensionality Reduction: Principal Components Analysis
Dimensionality Reduction: Principal Components Analysis In data mining one often encounters situations where there are a large number of variables in the database. In such situations it is very likely
More informationSupervised Feature Selection & Unsupervised Dimensionality Reduction
Supervised Feature Selection & Unsupervised Dimensionality Reduction Feature Subset Selection Supervised: class labels are given Select a subset of the problem features Why? Redundant features much or
More informationRobust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
More informationINVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION
INVESTIGATIONS INTO EFFECTIVENESS OF AND CLASSIFIERS FOR SPAM DETECTION Upasna Attri C.S.E. Department, DAV Institute of Engineering and Technology, Jalandhar (India) upasnaa.8@gmail.com Harpreet Kaur
More informationFingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
More informationMonitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations
Monitoring of Complex Industrial Processes based on Self-Organizing Maps and Watershed Transformations Christian W. Frey 2012 Monitoring of Complex Industrial Processes based on Self-Organizing Maps and
More informationReal Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
More informationCapacity of an RCE-based Hamming Associative Memory for Human Face Recognition
Capacity of an RCE-based Hamming Associative Memory for Human Face Recognition Paul Watta Department of Electrical & Computer Engineering University of Michigan-Dearborn Dearborn, MI 48128 watta@umich.edu
More informationA Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
More informationPrincipal components analysis
CS229 Lecture notes Andrew Ng Part XI Principal components analysis In our discussion of factor analysis, we gave a way to model data x R n as approximately lying in some k-dimension subspace, where k
More informationDeveloping Safety Management Systems for Track Workers Using Smart Phone GPS
, pp.137-148 http://dx.doi.org/10.14257/ijca.2013.6.5.13 Developing Safety Management Systems for Track Workers Using Smart Phone GPS Jin-Hee Ku 1 and Duk-Kyu Park 2 1 Dept of Liberal Education and 2 Dept
More informationAdaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement
Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Toshio Sugihara Abstract In this study, an adaptive
More informationThe Delicate Art of Flower Classification
The Delicate Art of Flower Classification Paul Vicol Simon Fraser University University Burnaby, BC pvicol@sfu.ca Note: The following is my contribution to a group project for a graduate machine learning
More informationPerformance Evaluation of Online Image Compression Tools
Performance Evaluation of Online Image Compression Tools Rupali Sharma 1, aresh Kumar 1, Department of Computer Science, PTUGZS Campus, Bathinda (Punjab), India 1 rupali_sharma891@yahoo.com, naresh834@rediffmail.com
More informationPrincipal Component Analysis
Principal Component Analysis ERS70D George Fernandez INTRODUCTION Analysis of multivariate data plays a key role in data analysis. Multivariate data consists of many different attributes or variables recorded
More informationAdvanced Ensemble Strategies for Polynomial Models
Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer
More informationPatent Big Data Analysis by R Data Language for Technology Management
, pp. 69-78 http://dx.doi.org/10.14257/ijseia.2016.10.1.08 Patent Big Data Analysis by R Data Language for Technology Management Sunghae Jun * Department of Statistics, Cheongju University, 360-764, Korea
More informationCOMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
More informationSingle Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results
, pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department
More informationA 0.9 0.9. Figure A: Maximum circle of compatibility for position A, related to B and C
MEASURING IN WEIGHTED ENVIRONMENTS (Moving from Metric to Order Topology) Claudio Garuti Fulcrum Ingenieria Ltda. claudiogaruti@fulcrum.cl Abstract: This article addresses the problem of measuring closeness
More informationLayered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
More informationNovelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
More informationMethod of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
More informationA Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
, pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and
More informationA MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationA New Method for Dimensionality Reduction using K- Means Clustering Algorithm for High Dimensional Data Set
A New Method for Dimensionality Reduction using K- Means Clustering Algorithm for High Dimensional Data Set D.Napoleon Assistant Professor Department of Computer Science Bharathiar University Coimbatore
More informationTemplate-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
More informationAnomaly Detection using multidimensional reduction Principal Component Analysis
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. II (Jan. 2014), PP 86-90 Anomaly Detection using multidimensional reduction Principal Component
More informationHigh Productivity Data Processing Analytics Methods with Applications
High Productivity Data Processing Analytics Methods with Applications Dr. Ing. Morris Riedel et al. Adjunct Associate Professor School of Engineering and Natural Sciences, University of Iceland Research
More informationHow To Solve The Kd Cup 2010 Challenge
A Lightweight Solution to the Educational Data Mining Challenge Kun Liu Yan Xing Faculty of Automation Guangdong University of Technology Guangzhou, 510090, China catch0327@yahoo.com yanxing@gdut.edu.cn
More informationAn Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology
Vol.63 (NT 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.63.01 An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology Hojae Lee 1, Junkwon Jung 1, Taeyoung
More informationCrime Hotspots Analysis in South Korea: A User-Oriented Approach
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk
More information3 An Illustrative Example
Objectives An Illustrative Example Objectives - Theory and Examples -2 Problem Statement -2 Perceptron - Two-Input Case -4 Pattern Recognition Example -5 Hamming Network -8 Feedforward Layer -8 Recurrent
More information