The paper presents a novel algorithm for object classification in videos based on improved support vector machine (SVM) and genetic algorithm. One of the problems of support vector machine is selection of the appropriate parameters for the kernel. This has affected the accuracy of the SVM over the years. This research aims at optimizing the SVM Radial Basis kernel parameters using the genetic algorithm. Moving object classification is a requirement in smart visual surveillance systems as it allows the system to know the kind of object in the scene and be able to recognize the actions the object can perform. This paper presents an GA-SVM machine learning approach for real time object classification in videos. Radial distance signal features are extracted from the silhouettes of object detected in videos. The radial distance signals features are then normalized and fed into the GA-SVM model. The classification rate of 99.39% is achieved with the genetically trained SVM algorithm while 99.1% classification accuracy is achieved with the normal SVM. A comparison of this classifier with some other classifiers in terms of classification accuracy shows a better performance than other classifiers such as the normal SVM, Artificial neural network (ANN), Genetic Artificial neural network (GANN), K-nearest neighbor (K-NN) and K-Means classifiers. Akintola Kolawole G."A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd109.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/109/a-novel-ga-svm-model-for-vehicles-and-pedestrial-classification-in-videos/akintola-kolawole-g
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Networkijceronline
Visual Content Recognition has become an attractive research oriented field of computer vision and machine learning for the last few decades. The focus of this work is monument recognition. Imagesof significant locations captured and maintainedas data bases can be used by the travelers before visiting the places. They can use images of a famous building to know the description of the building. In all these applications, the visual content recognition plays a key role. Humans can learn the contents of the images and quickly identify them by seeing again. In this paper we present a constructive training algorithm for Multi-Layer Perceptron Neural Network (MLPNN) applied to a set of targeted object recognition applications. The target set consists of famous monuments in India for travel guide applications. The training data set (TDS) consists 3000 images. The Gist features are extracted for the images. These are given to the neural network during training phase.The mean square error (MSE) on the training data is computed and used as metric to adjust the weights of the neural network,using back propagation algorithm. In the constructive learning, if the MSE is less than a predefined value, the number of hidden neurons is increased. Input patterns are trained incrementally until all patterns of TDS are presented and learned. The parameters or weights obtained during the training phase are used in the testing phase, in which new untrained images are given to the neural network for recognition. If the test image is recognized, the details of the image will also be displayed. The performance accuracy of this method is found to be 95%
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...IAEME Publication
Multiple human tracking based on object detection has been a challenge due to its
complexity. Errors in object detection would be propagated to tracking errors. In this
paper, we propose a tracking method that minimizes the error produced by object
detector. We use RetinaNet as object detector and Hungarian algorithm for tracking.
The cost matrix for Hungarian algorithm is calculated using the RetinaNet features,
bounding box center distances, and intersection of unions of bounding boxes. We
interpolate the missing detections in the last step. The proposed method yield 43.2
MOTA for MOT16 benchmark
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNijaia
Image classification is a popular machine learning based applications of deep learning. Deep learning techniques are very popular because they can be effectively used in performing operations on image data in large-scale. In this paper CNN model was designed to better classify images. We make use of feature extraction part of inception v3 model for feature vector calculation and retrained the classification layer with these feature vector. By using the transfer learning mechanism the classification layer of the CNN model was trained with 20 classes of Caltech101 image dataset and 17 classes of Oxford 17 flower image dataset. After training, network was evaluated with testing dataset images from Oxford 17 flower dataset and Caltech101 image dataset. The mean testing precision of the neural network architecture with Caltech101 dataset was 98 % and with Oxford 17 Flower image dataset was 92.27 %.
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
Existing Medical imaging techniques such as fMRI, positron emission tomography (PET), dynamic 3D ultrasound and dynamic computerized tomography yield large amounts of four-dimensional sets. 4D medical data sets are the series of volumetric images netted in time, large in size and demand a great of assets for storage and transmission. Here, in this paper, we present a method wherein 3D image is taken and Discrete Wavelet Transform(DWT) and Dual-Tree Complex Wavelet Transform(DTCWT) techniques are applied separately on it and the image is split into sub-bands. The encoding and decoding are done using 3D-SPIHT, at different bit per pixels(bpp). The reconstructed image is synthesized using Inverse DWT technique. The quality of the compressed image has been evaluated using some factors such as Mean Square Error(MSE) and Peak-Signal to Noise Ratio (PSNR).
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM ijcisjournal
Color image segmentation algorithms in the literature segment an image on the basis of color, texture, and
also as a fusion of both color and texture. In this paper, a color image segmentation algorithm is proposed
by extracting both texture and color features and applying them to the One-Against-All Multi Class Support
Vector Machine classifier for segmentation. A novel Power Law Descriptor (PLD) is used for extracting
the textural features and homogeneity model is used for obtaining the color features. The Multi Class SVM
is trained using the samples obtained from Soft Rough Fuzzy-C-Means (SRFCM) clustering. Fuzzy set
based membership functions capably handle the problem of overlapping clusters. The lower and upper
approximation concepts of rough sets deal well with uncertainty, vagueness, and incompleteness in data.
Parameterization tools are not a prerequisite in defining Soft set theory. The goodness aspects of soft sets,
rough sets and fuzzy sets are incorporated in the proposed algorithm to achieve improved segmentation
performance. The Power Law Descriptor used for texture feature extraction has the advantage of being
dealt in the spatial domain thereby reducing computational complexity. The proposed algorithm is
comparable and achieved better performance compared with the state of the art algorithms found in the
literature.
Targeted Visual Content Recognition Using Multi-Layer Perceptron Neural Networkijceronline
Visual Content Recognition has become an attractive research oriented field of computer vision and machine learning for the last few decades. The focus of this work is monument recognition. Imagesof significant locations captured and maintainedas data bases can be used by the travelers before visiting the places. They can use images of a famous building to know the description of the building. In all these applications, the visual content recognition plays a key role. Humans can learn the contents of the images and quickly identify them by seeing again. In this paper we present a constructive training algorithm for Multi-Layer Perceptron Neural Network (MLPNN) applied to a set of targeted object recognition applications. The target set consists of famous monuments in India for travel guide applications. The training data set (TDS) consists 3000 images. The Gist features are extracted for the images. These are given to the neural network during training phase.The mean square error (MSE) on the training data is computed and used as metric to adjust the weights of the neural network,using back propagation algorithm. In the constructive learning, if the MSE is less than a predefined value, the number of hidden neurons is increased. Input patterns are trained incrementally until all patterns of TDS are presented and learned. The parameters or weights obtained during the training phase are used in the testing phase, in which new untrained images are given to the neural network for recognition. If the test image is recognized, the details of the image will also be displayed. The performance accuracy of this method is found to be 95%
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...IAEME Publication
Multiple human tracking based on object detection has been a challenge due to its
complexity. Errors in object detection would be propagated to tracking errors. In this
paper, we propose a tracking method that minimizes the error produced by object
detector. We use RetinaNet as object detector and Hungarian algorithm for tracking.
The cost matrix for Hungarian algorithm is calculated using the RetinaNet features,
bounding box center distances, and intersection of unions of bounding boxes. We
interpolate the missing detections in the last step. The proposed method yield 43.2
MOTA for MOT16 benchmark
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNijaia
Image classification is a popular machine learning based applications of deep learning. Deep learning techniques are very popular because they can be effectively used in performing operations on image data in large-scale. In this paper CNN model was designed to better classify images. We make use of feature extraction part of inception v3 model for feature vector calculation and retrained the classification layer with these feature vector. By using the transfer learning mechanism the classification layer of the CNN model was trained with 20 classes of Caltech101 image dataset and 17 classes of Oxford 17 flower image dataset. After training, network was evaluated with testing dataset images from Oxford 17 flower dataset and Caltech101 image dataset. The mean testing precision of the neural network architecture with Caltech101 dataset was 98 % and with Oxford 17 Flower image dataset was 92.27 %.
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
Existing Medical imaging techniques such as fMRI, positron emission tomography (PET), dynamic 3D ultrasound and dynamic computerized tomography yield large amounts of four-dimensional sets. 4D medical data sets are the series of volumetric images netted in time, large in size and demand a great of assets for storage and transmission. Here, in this paper, we present a method wherein 3D image is taken and Discrete Wavelet Transform(DWT) and Dual-Tree Complex Wavelet Transform(DTCWT) techniques are applied separately on it and the image is split into sub-bands. The encoding and decoding are done using 3D-SPIHT, at different bit per pixels(bpp). The reconstructed image is synthesized using Inverse DWT technique. The quality of the compressed image has been evaluated using some factors such as Mean Square Error(MSE) and Peak-Signal to Noise Ratio (PSNR).
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM ijcisjournal
Color image segmentation algorithms in the literature segment an image on the basis of color, texture, and
also as a fusion of both color and texture. In this paper, a color image segmentation algorithm is proposed
by extracting both texture and color features and applying them to the One-Against-All Multi Class Support
Vector Machine classifier for segmentation. A novel Power Law Descriptor (PLD) is used for extracting
the textural features and homogeneity model is used for obtaining the color features. The Multi Class SVM
is trained using the samples obtained from Soft Rough Fuzzy-C-Means (SRFCM) clustering. Fuzzy set
based membership functions capably handle the problem of overlapping clusters. The lower and upper
approximation concepts of rough sets deal well with uncertainty, vagueness, and incompleteness in data.
Parameterization tools are not a prerequisite in defining Soft set theory. The goodness aspects of soft sets,
rough sets and fuzzy sets are incorporated in the proposed algorithm to achieve improved segmentation
performance. The Power Law Descriptor used for texture feature extraction has the advantage of being
dealt in the spatial domain thereby reducing computational complexity. The proposed algorithm is
comparable and achieved better performance compared with the state of the art algorithms found in the
literature.
With the increase in Internet users the number of malicious users are also growing day-by-day posing a
serious problem in distinguishing between normal and abnormal behavior of users in the network. This
has led to the research area of intrusion detection which essentially analyzes the network traffic and tries
to determine normal and abnormal patterns of behavior.In this paper, we have analyzed the standard
NSL-KDD intrusion dataset using some neural network based techniques for predicting possible
intrusions. Four most effective classification methods, namely, Radial Basis Function Network, Self-
Organizing Map, Sequential Minimal Optimization, and Projective Adaptive Resonance Theory have been
applied. In order to enhance the performance of the classifiers, three entropy based feature selection
methods have been applied as preprocessing of data. Performances of different combinations of classifiers
and attribute reduction methods have also been compared.
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...CSCJournals
The Internet paved way for information sharing all over the world decades ago and its popularity for distribution of data has spread like a wildfire ever since. Data in the form of images, sounds, animations and videos is gaining users’ preference in comparison to plain text all across the globe. Despite unprecedented progress in the fields of data storage, computing speed and data transmission speed, the demands of available data and its size (due to the increase in both, quality and quantity) continue to overpower the supply of resources. One of the reasons for this may be how the uncompressed data is compressed in order to send it across the network. This paper compares the two most widely used training algorithms for multilayer perceptron (MLP) image compression – the Levenberg-Marquardt algorithm and the Scaled Conjugate Gradient algorithm. We test the performance of the two training algorithms by compressing the standard test image (Lena or Lenna) in terms of accuracy and speed. Based on our results, we conclude that both algorithms were comparable in terms of speed and accuracy. However, the Levenberg- Marquardt algorithm has shown slightly better performance in terms of accuracy (as found in the average training accuracy and mean squared error), whereas the Scaled Conjugate Gradient algorithm faired better in terms of speed (as found in the average training iteration) on a simple MLP structure (2 hidden layers).
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...Konstantinos Demertzis
Deep learning architectures are the most e
ective methods for analyzing and classifying Ultra-Spectral Images (USI). However, e ective training of a Deep Learning (DL) gradient classifier aiming to achieve high classification accuracy, is extremely costly and time-consuming. It requires huge datasets with hundreds or thousands of labeled specimens from expert scientists. This research exploits the MAML++ algorithm in order to introduce the Model-Agnostic Meta-Ensemble Zero-shot Learning (MAME-ZsL) approach. The MAME-ZsL overcomes the above diculties, and it can be used as a powerful model to perform Hyperspectral Image Analysis (HIA). It is a novel optimization-based Meta-Ensemble Learning architecture, following a Zero-shot Learning (ZsL) prototype. To the best of our knowledge it is introduced to the literature for the first time. It facilitates learning of specialized techniques for the extraction of user-mediated representations, in complex Deep Learning architectures. Moreover, it leverages the use of first and second-order derivatives as pre-training methods. It enhances learning of features which do not cause issues of exploding or diminishing gradients; thus, it avoids potential overfitting. Moreover, it significantly reduces computational cost and training time, and it oers an improved training stability, high generalization performance and remarkable classification accuracy.
SAR Image Classification by Multilayer Back Propagation Neural NetworkIJMTST Journal
A novel descriptive feature extraction method of Discrete Fourier transform and neural network classifier for classification of Synthetic Aperture Radar (SAR) images is proposed. The classification process has the following stages (1) Image Segmentation using statistical Region Merging (SRM) (2) Polar transform and Feature extraction using Discrete Fourier Transform (3) Neural Network classification using back propagation. This is generally the first step in image analysis. Segmentation subdivides an image into its constituent parts or objects. The level to which this subdivision is carried depends on the problem being solved. The image segmentation in this study is performed using Statistical Region Merging proposed Richard Nock and Frank Nielsen. The key idea of the Statistical Region Merging model is to formulate image segmentation as an inference problem. Here the merging procedure is based on the theorem. Feature vectors as the input for the neural network. Polar transform is applied to segmented SAR image. The rotation problem under the Cartesian coordinates becomes the translation problem under the polar coordinates.
A Time Series ANN Approach for Weather Forecastingijctcm
Weather forecasting is most challenging problem around the world. There are various reason because of its experimented values in meteorology, but it is also a typical unbiased time series forecasting problem in scientific research. A lots of methods proposed by various scientists. The motive behind research is to predict more accurate. This paper contribute the same using artificial neural network (ANN) and simulated in MATLAB to predict two important weather parameters i.e. maximum and minimum temperature. The model has been trained using past 60 years of real data collected from(1901-1960) and tested over 40 years to forecast maximum and minimum temperature. The results based on mean square error function (MSE) confirm, this model which is based on multilayer perceptron has the potential to successful application to weather forecasting
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...csandit
Time-delay estimation is an essential building block of many signal processing applications.This paper follows up on earlier work for acoustic source localization and time delay estimation
using pattern recognition techniques in the adverse environment such as reverberant rooms or underwater; it presents unprecedented high performance results obtained with supervised training of neural networks which challenge the state of the art and compares its performance to that of well-known methods such as the Generalized Cross-Correlation or Adaptive Eigenvalue Decomposition.
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
Object tracking can be defined as the process of detecting an object of interest from a video scene and keeping track of its motion, orientation, occlusion etc. in order to extract useful
information. It is indeed a challenging problem and it’s an important task. Many researchers are getting attracted in the field of computer vision, specifically the field of object tracking in video surveillance. The main purpose of this paper is to give to the reader information of the present state of the art object tracking, together with presenting steps involved in Background Subtraction and their techniques. In related literature we found three main methods of object tracking: the first method is the optical flow; the second is related to the background subtraction, which is divided into two types presented in this paper, and the last one is temporal
differencing. We present a novel approach to background subtraction that compare a current frame with the background model that we have set before, so we can classified each pixel of the image as a foreground or a background element, then comes the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is divided into two different methods, the surface method and the K-NN method, both are explained in the paper.Our proposed method is implemented and evaluated using CAVIAR database.
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Encryption is used to securely transmit data in open networks. Each type of data has its own features. With the rapid growth of internet, security of digital images has become more and more important. Therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper an encryption technique based on elliptic curves for securing images to transmit over public channels will be proposed. Encryption and decryption process are given in details with an example. The comparative study of the proposed scheme and the existing scheme is made. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure. The output encrypted images reveal that the proposed method is robust.
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
The proposed work involves the multiobjective PSO
based optimization of artificial neural network structure for
the classification of multispectral satellite images. The neural
network is used to classify each image pixel in various land
cove types like vegetations, waterways, man-made structures
and road network. It is per pixel supervised classification using
spectral bands (original feature space). Use of neural network
for classification requires selection of most discriminative
spectral bands and determination of optimal number of nodes
in hidden layer. We propose new methodology based on
multiobjective particle swarm optimization (MOPSO) to
determine discriminative spectral bands and the number of
hidden layer node simultaneously. The result obtained using
such optimized neural network is compared with that of
traditional classifiers like MLC and Euclidean classifier. The
performance of all classifiers is evaluated quantitatively using
Xie-Beni and â indexes. The result shows the superiority of
the proposed method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
With the increase in Internet users the number of malicious users are also growing day-by-day posing a
serious problem in distinguishing between normal and abnormal behavior of users in the network. This
has led to the research area of intrusion detection which essentially analyzes the network traffic and tries
to determine normal and abnormal patterns of behavior.In this paper, we have analyzed the standard
NSL-KDD intrusion dataset using some neural network based techniques for predicting possible
intrusions. Four most effective classification methods, namely, Radial Basis Function Network, Self-
Organizing Map, Sequential Minimal Optimization, and Projective Adaptive Resonance Theory have been
applied. In order to enhance the performance of the classifiers, three entropy based feature selection
methods have been applied as preprocessing of data. Performances of different combinations of classifiers
and attribute reduction methods have also been compared.
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...CSCJournals
The Internet paved way for information sharing all over the world decades ago and its popularity for distribution of data has spread like a wildfire ever since. Data in the form of images, sounds, animations and videos is gaining users’ preference in comparison to plain text all across the globe. Despite unprecedented progress in the fields of data storage, computing speed and data transmission speed, the demands of available data and its size (due to the increase in both, quality and quantity) continue to overpower the supply of resources. One of the reasons for this may be how the uncompressed data is compressed in order to send it across the network. This paper compares the two most widely used training algorithms for multilayer perceptron (MLP) image compression – the Levenberg-Marquardt algorithm and the Scaled Conjugate Gradient algorithm. We test the performance of the two training algorithms by compressing the standard test image (Lena or Lenna) in terms of accuracy and speed. Based on our results, we conclude that both algorithms were comparable in terms of speed and accuracy. However, the Levenberg- Marquardt algorithm has shown slightly better performance in terms of accuracy (as found in the average training accuracy and mean squared error), whereas the Scaled Conjugate Gradient algorithm faired better in terms of speed (as found in the average training iteration) on a simple MLP structure (2 hidden layers).
GeoAI: A Model-Agnostic Meta-Ensemble Zero-Shot Learning Method for Hyperspec...Konstantinos Demertzis
Deep learning architectures are the most e
ective methods for analyzing and classifying Ultra-Spectral Images (USI). However, e ective training of a Deep Learning (DL) gradient classifier aiming to achieve high classification accuracy, is extremely costly and time-consuming. It requires huge datasets with hundreds or thousands of labeled specimens from expert scientists. This research exploits the MAML++ algorithm in order to introduce the Model-Agnostic Meta-Ensemble Zero-shot Learning (MAME-ZsL) approach. The MAME-ZsL overcomes the above diculties, and it can be used as a powerful model to perform Hyperspectral Image Analysis (HIA). It is a novel optimization-based Meta-Ensemble Learning architecture, following a Zero-shot Learning (ZsL) prototype. To the best of our knowledge it is introduced to the literature for the first time. It facilitates learning of specialized techniques for the extraction of user-mediated representations, in complex Deep Learning architectures. Moreover, it leverages the use of first and second-order derivatives as pre-training methods. It enhances learning of features which do not cause issues of exploding or diminishing gradients; thus, it avoids potential overfitting. Moreover, it significantly reduces computational cost and training time, and it oers an improved training stability, high generalization performance and remarkable classification accuracy.
SAR Image Classification by Multilayer Back Propagation Neural NetworkIJMTST Journal
A novel descriptive feature extraction method of Discrete Fourier transform and neural network classifier for classification of Synthetic Aperture Radar (SAR) images is proposed. The classification process has the following stages (1) Image Segmentation using statistical Region Merging (SRM) (2) Polar transform and Feature extraction using Discrete Fourier Transform (3) Neural Network classification using back propagation. This is generally the first step in image analysis. Segmentation subdivides an image into its constituent parts or objects. The level to which this subdivision is carried depends on the problem being solved. The image segmentation in this study is performed using Statistical Region Merging proposed Richard Nock and Frank Nielsen. The key idea of the Statistical Region Merging model is to formulate image segmentation as an inference problem. Here the merging procedure is based on the theorem. Feature vectors as the input for the neural network. Polar transform is applied to segmented SAR image. The rotation problem under the Cartesian coordinates becomes the translation problem under the polar coordinates.
A Time Series ANN Approach for Weather Forecastingijctcm
Weather forecasting is most challenging problem around the world. There are various reason because of its experimented values in meteorology, but it is also a typical unbiased time series forecasting problem in scientific research. A lots of methods proposed by various scientists. The motive behind research is to predict more accurate. This paper contribute the same using artificial neural network (ANN) and simulated in MATLAB to predict two important weather parameters i.e. maximum and minimum temperature. The model has been trained using past 60 years of real data collected from(1901-1960) and tested over 40 years to forecast maximum and minimum temperature. The results based on mean square error function (MSE) confirm, this model which is based on multilayer perceptron has the potential to successful application to weather forecasting
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...csandit
Time-delay estimation is an essential building block of many signal processing applications.This paper follows up on earlier work for acoustic source localization and time delay estimation
using pattern recognition techniques in the adverse environment such as reverberant rooms or underwater; it presents unprecedented high performance results obtained with supervised training of neural networks which challenge the state of the art and compares its performance to that of well-known methods such as the Generalized Cross-Correlation or Adaptive Eigenvalue Decomposition.
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
Object tracking can be defined as the process of detecting an object of interest from a video scene and keeping track of its motion, orientation, occlusion etc. in order to extract useful
information. It is indeed a challenging problem and it’s an important task. Many researchers are getting attracted in the field of computer vision, specifically the field of object tracking in video surveillance. The main purpose of this paper is to give to the reader information of the present state of the art object tracking, together with presenting steps involved in Background Subtraction and their techniques. In related literature we found three main methods of object tracking: the first method is the optical flow; the second is related to the background subtraction, which is divided into two types presented in this paper, and the last one is temporal
differencing. We present a novel approach to background subtraction that compare a current frame with the background model that we have set before, so we can classified each pixel of the image as a foreground or a background element, then comes the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is divided into two different methods, the surface method and the K-NN method, both are explained in the paper.Our proposed method is implemented and evaluated using CAVIAR database.
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Encryption is used to securely transmit data in open networks. Each type of data has its own features. With the rapid growth of internet, security of digital images has become more and more important. Therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper an encryption technique based on elliptic curves for securing images to transmit over public channels will be proposed. Encryption and decryption process are given in details with an example. The comparative study of the proposed scheme and the existing scheme is made. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure. The output encrypted images reveal that the proposed method is robust.
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
The proposed work involves the multiobjective PSO
based optimization of artificial neural network structure for
the classification of multispectral satellite images. The neural
network is used to classify each image pixel in various land
cove types like vegetations, waterways, man-made structures
and road network. It is per pixel supervised classification using
spectral bands (original feature space). Use of neural network
for classification requires selection of most discriminative
spectral bands and determination of optimal number of nodes
in hidden layer. We propose new methodology based on
multiobjective particle swarm optimization (MOPSO) to
determine discriminative spectral bands and the number of
hidden layer node simultaneously. The result obtained using
such optimized neural network is compared with that of
traditional classifiers like MLC and Euclidean classifier. The
performance of all classifiers is evaluated quantitatively using
Xie-Beni and â indexes. The result shows the superiority of
the proposed method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract: Tracking and detecting the crowd is the main problem in the current era hence we are making video scenes method .Detection of many individual objects has been improved over recent years. It has been challenging to detect and track the tasks due to occlusions and variation in people appearance. Facing these challenges, we suggest to leverage information on the global structure of the scenes and to resolve jointly. We explore the constraints of the crowd density and detection of optimization using joint energy function. We show how the optimization of such energy function improves to track and detect in floating crowds. We validate our approach on a challenging video dataset of crowded scenes. The addition of different features which is relevant to tracking peoples such as movement, size, height and the observation models in the particle filters and followed by a clustering methods. It minimizes the communication cost and Data Retrieval is easy.
CNN FEATURES ARE ALSO GREAT AT UNSUPERVISED CLASSIFICATION cscpconf
This paper aims at providing insight on the transferability of deep CNN features to
unsupervised problems. We study the impact of different pretrained CNN feature extractors on
the problem of image set clustering for object classification as well as fine-grained
classification. We propose a rather straightforward pipeline combining deep-feature extraction
using a CNN pretrained on ImageNet and a classic clustering algorithm to classify sets of
images. This approach is compared to state-of-the-art algorithms in image-clustering and
provides better results. These results strengthen the belief that supervised training of deep CNN
on large datasets, with a large variability of classes, extracts better features than most carefully
designed engineering approaches, even for unsupervised tasks. We also validate our approach
on a robotic application, consisting in sorting and storing objects smartly based on clustering
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Video surveillance is becoming more and more important forsocial security, law enforcement, social order,military, and other social problems. In order to manage parking information effectively, this vehicle
detection method is presented. In general, motion detection plays an important role in video surveillance
systems. In this paper, firstly this system uses ViBe method to extract the foreground object, then extracts
HOG features on the performance of the ROI of images. At last this paper presents Support vector machine for vehicle recognition. The results of this test show that, the recognition rate of vehicle’s model in this recognition system is up the industrial application standard.
Video surveillance is becoming more and more important forsocial security, law enforcement, social order,military, and other social problems. In order to manage parking information effectively, this vehicle detection method is presented. In general, motion detection plays an important role in video surveillance systems. In this paper, firstly this system uses ViBe method to extract the foreground object, then extracts HOG features on the performance of the ROI of images. At last this paper presents Support vector machine for vehicle recognition. The results of this test show that, the recognition rate of vehicle’s model in this recognition system is up the industrial application standard.
ideo surveillance is becoming more and more important forsocial security, law enforcement, social
order,military, and other social problems. In order to manage parking information effectively, this vehicle
detection method is presented. In general, motion detection plays an important role in video surveillance
systems. In this paper, firstly this system uses ViBe method to extract the foreground object, then extracts
HOG features on the performance of the ROI of images. At last this paper presents Support vector machine
for vehicle recognition. The results of this test show that, the r
Vehicle Recognition Using VIBE and SVMCSEIJJournal
Video surveillance is becoming more and more important forsocial security, law enforcement, social
order,military, and other social problems. In order to manage parking information effectively, this vehicle
detection method is presented. In general, motion detection plays an important role in video surveillance
systems. In this paper, firstly this system uses ViBe method to extract the foreground object, then extracts
HOG features on the performance of the ROI of images. At last this paper presents Support vector machine
for vehicle recognition. The results of this test show that, the recognition rate of vehicle’s model in this
recognition system is up the industrial application standard.
Abstract This paper presents a novel approach for the gesture recognition system using software. In this paper the real time image is taken and is compared with a training set of images and displays a matched training image. In this approach we have used skin detection techniques for detecting the skin threshold regions, Principle Component Analysis (PCA) algorithm and Linear Discriminant Analysis (LDA) for data compressing and analyzing and K-Nearest Neighbor (KNN), Support Vector Machine (SVM) classification for matching the appropriate training image to the real-time image. The software used is MATLAB. The hand gestures used are taken from the American Sign Language. Keywords— PCA algorithm, LDA algorithm, skin detection, KNN and SVM classification
Automated Traffic sign board classification system is one of the key technologies of Intelligent
Transportation Systems (ITS). Traffic Surveillance System is being more and important with improving
urban scale and increasing number of vehicles. This Paper presents an intelligent sign board
classification method based on blob analysis in traffic surveillance. Processing is done by three main
steps: moving object segmentation, blob analysis, and classifying. A Sign board is modelled as a
rectangular patch and classified via blob analysis. By processing the blob of sign boards, the meaningful
features are extracted. Tracking moving targets is achieved by comparing the extracted features with
training data. After classifying the sign boards the system will intimate to user in the form of alarms,
sound waves. The experimental results show that the proposed system can provide real-time and useful
information for traffic surveillance.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
1. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
153
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
A Novel GA-SVM Model For Vehicles And
Pedestrial Classification In Videos
AKINTOLA K.G.
Department of Computer Science,
Federal University of Technology
Akure, Ondo State, Nigeria
Abstract
The paper presents a novel algorithm for object
classification in videos based on improved support
vector machine (SVM) and genetic algorithm. One of
the problems of support vector machine is selection of
the appropriate parameters for the kernel. This has
affected the accuracy of the SVM over the years. This
research aims at optimizing the SVM Radial Basis
kernel parameters using the genetic algorithm.
Moving object classification is a requirement in smart
visual surveillance systems as it allows the system to
know the kind of object in the scene and be able to
recognize the actions the object can perform.
1 Introduction
Object classification in videos is the process of
recognizing the classes of objects detected in videos.
It is an important requirement in surveillance systems
as it aids understanding of the intentions or actions
that the object can perform. For instance human
beings can sit, walk, run or fall while vehicles can
move, run, over-speed or crash. Object classification
is a challenging task because of various object poses,
illumination and occlusion [2].
Recently, many research works have been carried out
in literature on object classification in videos.
Heikkila and Silven, [7], presents a real-time system
for monitoring of cyclists and pedestrians. The
classification algorithm adopted is learning vector
quantization however, the classification accuracy
obtained is low. The classification rate is low. The
authors in [5] classified moving object blobs into
general classes such as ‘humans’ and ‘vehicles’ using
neural networks. Each neural network is a standard
three-layer network. Learning in the network is
accomplished using the back propagation algorithm.
Input features to the network are a mixture of image-
based and scene based object parameters namely
image blob dispersednes (perimeter2
/area (pixels));
image blob area (pixels); apparent aspect ratio of the
blob bounding box; and camera zoom. There are three
output classes, namely human, vehicle and human
group. This approach fails to discriminate object with
similar dispersednes. The authors in [9] used Artificial
Neural Network approach for the classification of
human motion on a still camera. It is noted that task to
classify and identify objects in the video is difficult
for human operator. Object is detected using
background subtraction technique. The detected
moving object is divided into 8x8 non-overlapping
blocks. The mean of each of the blocks is calculated.
All mean value is then accumulated to form a feature
vector. A neural network is trained using the
generated feature vectors. Experiment performed
shows a good classification rate but the object
detection algorithm used cannot work under a quasi-
stationary background. Not only this, the
computational time of the features is time consuming
which is a problem to surveillance systems. In [2], a
neuro-genetic model for moving object classification
in videos is presented. A genetic model is used to
obtain optimum weights of a neural network. The
optimum weights are used later by the multilayer
feed-forward neural network model to classify objects
as human or vehicle. The model is compared with a
neural network trained using back-propagation
algorithm on a set of objects detected from real life
videos. The neuro-genetic model outperforms with
classification rate of 99.09% while the back-
propagation neural network achieves the classification
rate of 98.5% .
In [11] SVM is used to recognize facial expressions in
videos. Automatic facial feature trackers are used to
locate faces in videos. Features are then extracted
2. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
154
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
which are then supplied to SVM to recognize facial
expression. The classification accuracy shows that
SVM is capable of recognizing facial expressions. In
[12], SVM is used to recognize detected objects in
video for tracking purposes. A simple background
subtraction technique is used to extract the object.
Moment features of the detected objects are calculated
and fed into SVM for classification. In [11] and [12]
more classification accuracy could have been
achieved by optimizing the parameters of the SVM.
The hybrid of GA and SVM have been used in [13]
for classification of satellite images. There is the need
to improve the object classification in video
surveillance applications.
Recently SVM have been reported as an efficient
classifier. SVM is based on the statistical learning
method based on structural risk minimization instead
of the empirical risk minimization to improve the
generalization ability of a model. It is however
realized that the selection of appropriate kernel and
kernel parameters can have great influence on the
performance of the model [13]. The approach that
have been used for optimizing the hyper-parameters
of the SVM is the grid search which is always time
consuming and does not perform well [13]. In this
paper, a genetically optimized support vector machine
is presented for human object classification in videos.
2 Support Vector Machines (SVM)
Support Vector Machines are a set of supervised
learning methods used in classification and
regression. This machine learning technique was
proposed by Vapnik in 1995. The classification
problem can be restricted to consideration of the two-
class problem without loss of generality. In this
problem, the goal is to separate the two classes by a
function which is induced from available examples
[16].
The motivation for SVM is to create a classifier that
will work well on unseen examples, that is,
generalizes well. The objective is to create a classifier
that uses the structural minimization principle as
against those that use empirical error minimization
principle. Consider the example in Figure 1. There
are many possible linear classifiers that can separate
the data, but there is only one that maximizes the
margin (maximizes the distance between it and the
nearest data point of each class). This linear classifier
is termed the optimal separating hyper-plane.
Intuitively, this boundary is expected to generalize
well as opposed to the other possible boundaries.
Let m-dimensional training input vectors, xi
(i=1,…,m) belong to class 1 or 2 and the associated
labels be yi =1 for class 1 and -1 for class 2. If these
data are linearly separable, a decision function
satisfying Equation 1 can be constructed.
bxwxD i
T
)( (1)
where w is an m-dimensional vector and b is a bias
term.
If the training data is linearly separable, then no
training data satisfy:
0 bxw i
T
(2)
This hyper-plane should have the best generalization
capability. As shown in Figure 1, the +1 and the -1 are
the training dataset which belong to two classes. The
plane H series are the hyperplanes that separate the
two classes. The optimal plane H is found by
maximizing the margin value ||||/2 w . Hyperplanes
1H and 2H are the planes on the border of each class
and also parallel to the optimal hyper-plane H. The
data located on 1H and 2H are called support vectors
[8].
Figure 1 The SVM Binary Classification
3. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
155
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
Given a set of training samples mx,...,x,x 21
with labels }1,1{ iy
,
a hyper-plane
bxw. separates the data into classes such
that:
.
1if1x.w
1if1x.w
i
yb
yb
iii
ii
These constraints can be expressed in compact form
as:
1)x.(w by ii
(5)
which can be written as:
01)x.(w by ii
It has been shown that if no hyper-plane exists
(because the data is not linearly separable), a penalty
terms i is added to account for misclassifications.
This can be translated to the following minimization
problem:
minimize: i iCw 2/
2
(7)
where C, the capacity, is a parameter which allows us
to specify how strictly the classifier can fit the
training data. This can be translated into the following
dual problem:
maximize:
ji
jijiji
i
i yy
,2
1
xx
(8)
subject to: Ci 0
0 iy
i
i
which can be solved by standard techniques of
quadratic programming. The vector w that defines the
optimum separating hyperplane is obtained by:
ii
m
i
i yw x.
1
(9)
The threshold b of the optimal separating
hyper-plane is obtained by:
m
j
ijiii yby
1
xx (10)
m
j
jiiii yyb
1
xx (11)
The prediction of new patterns is given by
by
m
i
kiiii
1
xxsign)xClass(
The training samples for which the Lagrange
multipliers are non-zero are called support vectors.
Samples for which the corresponding Lagrange
multiplier is zero can be removed from the training set
without affecting the position of the final hyperplane.
The classification framework outlined above is
limited to linear separating hyperplanes. It is possible
however to use a non-linear hyper-plane by first
mapping the sample points into a higher dimensional
space using a non-linear mapping. That is, by
choosing a map n
: where the dimension of
is greater than .n A separating hyper-plane is then
found in the higher dimensional space. This is
equivalent to a non-linear separating surface in n
.
The data only ever appears in our training problem in
the form of dot products, so in the higher dimensional
space the data appears in the form )().( ji xx . If the
dimensionality of is very large, this product could
be difficult or expensive to compute. However, by
introducing a kernel function such that:
)().(),( jijiK xxxx (13)
Equation 13 can be used in place of ji xx . everywhere
in the optimization problem and never need to know
explicitly what is. The development of a SVM
classification model depends on the selection of
kernel function K. There are several kernels that can
be used in SVM models. These include linear,
polynomial, Radial Basis Function (RBF) and
sigmoid function. The Radial Basis Kernel is given
by:
2
2
2
1
exp),( iji XXxxK
(14)
The RBF is by far the most popular choice of kernel
types used in SVM. This is mainly because of their
localized and finite responses across the entire range
of the real x-axis. After solving for w and b, the class
a test vector tx belongs to is determined by
evaluating bt xw. or bt )x(.w if a transform to a
(4)
(3)
(6)
(12)
4. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
156
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
higher dimensional space has been used. It can be
shown that the solution for w is given by:
i
i
ii yw x (15)
Therefore, bt )(. xw can be rewritten thus:
btiK
i iyibii iyi )x,x()tx()x( (16)
Thus, the Kernel function can be used rather than
actually making the transformation to higher
dimensional space since the data appears only in dot
product form. The σ and C are the free hyper-
parameters the users can supply. These two
parameters has a great role to play in the performance
of the SVM. Several choices have used to select
optimal values of these parameters. These include
cross-validation, Particle swarm optimization and
genetic optimization. In this paper, however, the
genetic program approach is employed.
3 Genetic Algorithm
3.1 Genetic Algorithms
Genetic Algorithm (GA) was developed by John
Holland in 1975. The algorithm is based on the
mechanics of the natural selection process (biological
evolution). The concept of the GA is that the strong
tends to adapt and survive while the weak tends to die
out [17] The technique is about generating a random
initial population of individuals, each of which
represents a potential solution to a problem [14]. The
process begins by coding the genes in a form that
represents the solution to the particular problem. In
Holland’s Genetic Algorithm, each feasible solution is
encoded as a chromosome (string of zeros and ones)
also called a genotype. Then initial population size is
specified and a number of chromosomes of the
population size are then created. Optimization is
based on evolution, and the "Survival of the fittest"
concept. Each chromosome is given a measure of
fitness via a fitness (evaluation or objective) function.
The fitness of a chromosome determines its ability to
survive and produce offspring [17]. As reproduction
takes place, the crossover operator exchanges parts of
two single chromosomes to produce children and the
mutation operator changes the gene value in some
randomly chosen location of the chromosome [10].
The process of evaluation, selection, and
recombination is iterated until the population
converges to an acceptable solution.Genetic
Algorithms (GA) has been applied in various areas of
computer vision such as weights optimization of
artificial neural networks [2;10;14;15], video
segmentation [4].
3 SVM parameter selection based on Genetic
Algorithm
Using the Genetic algorithm, the two parameters C
and σ of SVM model can be optimized. The process
of optimizing these parameters is shown in Figure 2.
Figure 2 Flowchart of GA for SVM parameters
optimization.
a. Initialization. To start with, the initial population
is made up of chromosomes chosen at random or
based on heuristically selected strings. Population
size affects the efficiency of the performance of a
GA. The first step in GA implementation is the
Initialization
Perform Cross Over
Perform Mutation
Train SVM
Calculate fitness by
Cross-validation
Terminate? Output
SVM optimal
No Yes
5. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
157
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
determination of a genetic encoding scheme, that
is, to denote each possible point in the problem’s
search space as a characteristic string of defined
length. The genes represent the value of σ and C
and are concatenated to form a chromosome.
Several of these chromosomes are randomly
generated from the network architecture to form
the initial population of the solution space. Figure
3 shows a typical chromosome.
Figure 3: Sample Chromosome Encoding of C and σ
of the RBF using strings.
In this research work, C and σ values of the RBF are
simultaneously coded as one gene. Each of the gene
is coded using randomized binary numbers of length
5. The minimum value is 0.1 while the maximum
value is 100. The number of bits to represent the
value of a gene must satisfy:
≥ (
∆
+ 1);i=1,2.3,,
(17)
where v is the string length, min is the
minimum value of the gene, max is the
maximum value of the gene and ∆ is the error
tolerance.
A chromosome represents one RBF. The length of
chromosome is obtained by concatenating the bits
representing each gene as shown in Figure 3.
b. Fitness Function by Cross-Validation.
When GA is applied to solve a problem, the
definition of the evaluation function to evaluate the
problem-solving ability of a chromosome is
important. Since SVM works by classification, the
classification rate is used as the fitness function. The
Accuracy is computed as:
Accuracy=correctly / total *100 (18)
c. Perform Selection. The fitness of the new
offspring is calculated and sorted in the descending
order. So, chromosomes of highest fitness values are
selected for the next generation. In this research
work, the roulette wheel method is adopted for
selection. The probability of selection is given by:
= ∑
= (19)
in which; fi is the fitness value of individual i, fsum is
the total fitness value of population; Pi is the
selective probability of individual. It is obvious that
individuals with high flexibility values are more
likely to be reproduced during the next generation.
d. Perform Crossover. In this research work,
one-point crossing is adopted. The specific operation
is to randomly set one crossing point among
individual strings. When crossing is executed,
partial configuration of the anterior point and
posterior point are exchanged, and this gave birth to
two new offspring
e. Mutation. As for two-value code strings,
mutation operation is to reverse the gene
values within a random number generated
between zero and one.
f. Termination Criterion: The termination
condition is the maximum number of
generations.
Genetic control parameters dictate how the algorithm
will behave. Changing these parameters can change
the computational result. These parameters are
population size, crossing probability, mutation
probability and network termination condition. In this
work population size N is 50, crossing probability Pc
is 0.8, mutation probability Pm is 0.5, and network’s
terminative condition is MAXGEN of 100.
4 Object Classification using the proposed
GA-SVM model
4.1 Data Acquisition
The data used for this research work are obtained
from videos of moving objects taken in Nigeria roads.
The moving objects are detected using background
subtraction algorithm and the features are extracted
from the silhouettes of the detected objects.
4.1.1 Object Segmentation
01010 10011
6. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
158
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
Kernel Density Estimation (KDE) is the mostly used
and studied nonparametric density estimation
algorithm. The model is the reference dataset,
containing the reference points indexed natural
numbered and has been used in [6] for foreground
detection. The algorithm assumed that a local kernel
function is centered upon each reference point and its
scale parameter (the bandwidth). The common
choices for kernels include the Gaussian and the
Epanechnikov kernel. The algorithm is presented as
follows. Let , , … , , ϵ be a random sample
taken from a continuous, univariate density f, KDE is
given by:
( , ℎ) = ∑ (20)
k(.) is the function satisfying :
( ) = 1 (21)
k(.) is refered to as the Kernel, h is a positive number,
usually called the bandwidth or window width. The
Gaussian Kernel is given by:
= (2 ) exp (22)
where r = ‖ ‖
The Epanechnikov kernel is given by:
=
( )( ) < 1
0 ℎ
(23)
where d is the dimension of feature space, is the
volume of the d-dimensional sphere.
KDE for background modeling involves using a
number of frames (training frames) to build the
probability density of each pixel location. The
adaptive threshold of each pixel is found after the
construction of the histogram.
For every pixel observation, classification involves
determining if the pixel belongs to the background or
the foreground (as shown in Figure 4). The first few
initial frames in the video sequence (called learning
frames) are used to build histogram of distributions of
the pixel color. No classification is done for these
learning frames, but for the subsequent frames
depending on whether the obtained value exceeds the
threshold or not. If the threshold is exceeded,
background classification is done, otherwise
foreground classification. Typically, in a video
sequence involving moving objects, at a particular
spatial pixel position a majority of the pixel
observations would correspond to the background.
Therefore, background clusters would typically
account for much more observations than the
foreground clusters. This means that the probability of
any background pixel would be higher than that of a
foreground pixel. The pixels are ordered based on
their corresponding value of the histogram bin which
relies on the adaptive threshold in the previous stage.
The pixel intensity values for the subsequent frames
are estimated and the corresponding histogram bin is
evaluated with the bin value corresponding to the
intensity determined.
4.1.2 Feature Extraction
The blobs extracted from videos used to extract the
feature vectors which were are then normalized by
dividing the vector by the sum of the lengths. These
vectors are then used to train the support vector
machine.
Instead of segmenting the silhouettes into 8x8 non-
overlapping blocks as shown in [9], radial features are
directly calculated from the detected objects as shown
in Figure 4. This captures the shape and a series of the
features encodes the motion information.
The centroid of the contour (cx, cy) is calculated using
Equation 24. From the centroid, a pre-defined number
of axes are projected outwards at specified regular
angles to the nearest edges of the contour in an anti-
clockwise direction as shown in Figures 4.
, = (∑ , ∑ )
(24)
7. International Journal of Trend in Scientific Research and Development, Volume 1(
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
Figure 4: The radial Distance Shape Features
Extraction
The distance from the centroid to its nearest edge
along a predefined angle is then stored. This is done
for a set of angular vectors. The dimension of each
vector equals the number of axes being projected
the centroid. The vector is then normalized to ensure
that the vector is scale invariant and the largest value
in the vector will at this point be 1.0, which will be
the longest of the axes projected. Figure
show the execrated features from human and vehicles
respectively.
Figure 5a: Typiocal Radial 1- D distance feature
vector from Humans (left) and vehicles
0
0.02
0.04
0.06
1 5 9 13 17 21 25 29
human features
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN:
www.ijtsrd.com
: The radial Distance Shape Features
The distance from the centroid to its nearest edge
along a predefined angle is then stored. This is done
for a set of angular vectors. The dimension of each
vector equals the number of axes being projected from
the centroid. The vector is then normalized to ensure
that the vector is scale invariant and the largest value
in the vector will at this point be 1.0, which will be
the longest of the axes projected. Figures 5a and 5b
features from human and vehicles
D distance feature
vector from Humans (left) and vehicles (right)
Figure 5b: Typiocal Radial 1
vector from Humans (left) and vehicles (right)
Let S be the segmented object region within the
frame, be a line projected from the centroid to the
object boundary at angle i
passing through the centoroid of the object, then the
length of each line to the contour boundary of the
object is given by:
= ∑ ( ( , ))
k and l are the co-ordinates in the
respectively c is the centre point and
boundary. l is given by ktan(
function that returns 0 or 1.
( , ) =
1 (
0 ℎ
where p(k, ) is the pixel value of the object.
The number of lines in each image containing an
object as well as the number of
layer is j where j = 1, 2, 3, …., n and n is given by n =
360/ where is the smallest of the angles.
Angular size of 10 degrees interval is used to obtain
36 regions beginning with 10
these regions were selected as feature vectors.
for more details of the segmentation algorithm.
human
features
0
0.05
0.1
1 5 9 1317212529
car features
), ISSN: 2456-6470
159
: Typiocal Radial 1- D distance feature
vector from Humans (left) and vehicles (right)
be the segmented object region within the
be a line projected from the centroid to the
to the horizontal line
passing through the centoroid of the object, then the
length of each line to the contour boundary of the
(25)
ordinates in the x and y directions
is the centre point and w is the contour
is given by ktan( ), (. ) is a binary
( , ) (26)
) is the pixel value of the object.
The number of lines in each image containing an
object as well as the number of neurons in the input
layer is j where j = 1, 2, 3, …., n and n is given by n =
is the smallest of the angles.
Angular size of 10 degrees interval is used to obtain
36 regions beginning with 100
. Thirty two (32) of
were selected as feature vectors. See [1]
for more details of the segmentation algorithm.
29
car features
car
features
8. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
160
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
4.2 GA-SVM Object Classification
In this work, the training of the SVM consists of
providing the SVM with data for vehicles and
pedestrians. Data for each class consist of a set of n
dimensional vectors. A Radial Basis Function
(RBF) kernel is applied to the SVM which then
attempts to construct a hyper-plane in the n-
dimensional space, attempting to maximize the
margin between the two input classes. The SVM type
used in this work is C-SVM using a non-linear
classifier where C is the cost hyper-parameter [2]. The
SVM is trained using 1D radial signals extracted from
the silhouettes of the labeled images of humans and
vehicles. Given a training set of human and vehicle
images consisting of multiple labeled images of each
human and vehicle classes an SVM classifier is
trained as follow: 1D features data are extracted from
the training set images to create the vector X = (x1,
x2,...,xL) for human and Y = (y1,y2, ..., yK) for vehicle
images. where L and K are the total number of
training images for class human and vehicle
respectively. To train the SVM, X = (x1, x2, ..., xL) are
used as the positive labeled training data and Y =
(y1,y2, ...,yL) are used as the negative labeled training
data. The SVM is then trained to maximize the hyper-
plane margin between their respective classes (Φ1,
Φ2). To classify
an object F, it must be assigned to one of the p
possible classes (Φ1, Φ2), in this case p takes two
values. For each object class, Φp, an SVM is used to
calculate this class that the object F belongs to given
measurement vector D where in this case D is the set
of 1D radial features.
5 Implementation of the Proposed Model
In order to evaluate the classification performance of
the proposed SVM model, some video data were
gotten from major roads in Akure, Nigeria. The
background subtraction algorithm was applied to
detect objects from the videos. Features of these
objects are exccted and stored in a database. The data
are divided randomly into the 80 training dataset 333
test dataset. The 80 training dataset consist of 40
vehicles and 40 pedestrians. The test dataset consists
of 100 vehicles and 223 pedestrians. The class vehicle
is assigned 1 while the class human is assigned 0. The
GA-SVM model is trained using [3]. In order to
compare the classification performance of the
proposed model with other classifiers such as the
normal SVM, K-Means, K-NN, ANN, GA-ANN, the
training is done with the same set of data and the
same testing dataset is used to evaluate each classifier.
In the proposed GA-SVM model, the SVM adopts
Radial Basis Function as the kernel. The parameters C
and γ of the SVM are optimized using Genetic
Algorithm. Then these optimal parameters are used to
train the SVM model. In the normal SVM model, the
SVM use RBF as the kernel function. The parameters
C and γ are randomly selected. In the K-Nearest
Neighbour training, data for vehicles and pedestrians
are provided for the K-NN. As many instances of
vehicles and pedestrians are provided with their
corresponding class labels. After the training is done,
K-Nearest can then be used to classify test instances.
To classify a new instance, the instance is supplied
and the number of neighbors k. This k defines the
neighborhood in which training data is consulted. The
test data is compared with the training data. The
nearest K-instances are checked and the majority
nearest to k dictates the class that the instance
belongs. In this research, k is set to 5. For the
Classification Using K-Means Algorithm, Given a
training set of human and vehicle classes, a K-Means
clustering algorithm is trained using the vector X =
(x1, x2,...,xL) for human and Y = (y1,y2, ..., yL) for
vehicle data. where L is the total number of training
images. To train the K-means, the number of classes
and the mean of each class is provided. K-Means now
clusters each data item to any of the classes based on
the Euclidean distance of the data to the mean of each
cluster. The minimum distance from each class
determines which cluster the data falls. Now after the
entire instance are clustered, the means are re-
evaluated again and the process continues until a
given terminating condition is fulfilled. To cluster a
new data, the distances of the new data to each of the
evaluated cluster means are calculated and the one
with minimum is the class of the new data. Object
classification using ANN uses input nodes, which are
32 in number, the hidden layer which has 32 neurons
and the output layer which has one neuron. The
following steps are adopted in the Neural Network
modeling for object classification. In this approach,
shape features extracted from the detected moving
objects are used to train a neural network classifier in
order to recognize human and vehicle classes. The
Learning Algorithm used is the back propagation
algorithm. The dimension of input data is thirty two.
9. International Journal of Trend in Scientific Research and Development, Volume 1(
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
The network has one hidden layer having thirty two
neurons and one output neuron. The network is
trained using the back-propagation.
supervised learning algorithm in which the input
vectors are supplied together with the desired output.
The back propagation algorithm (BPN)
the training epoch. Several epochs are needed before
the network can sufficiently learn and provide a
satisfactory result. The number of epochs used is
500, with the momentum of 0.5 and learning rate of
0.3. The initial weights are randomly initialized to
small random numbers less than 1 using random
number generators. The object classification using
using neuro-genetic model (GA-ANN) applies genetic
algorithm to optimize the weights before the ANN is
trained with the optimized weight. In this case, there
are (32*32+32) number of weights which signifies a
chromosome. The population size N is 50, crossing
probability Pc is 0.8, mutation probability
and network’s terminative condition is MAXGEN of
100. This combination gives an excellent empirical
performance.
6 Results and discussion
Table 1 shows the analysis result for
SVM,GA-ANN, K-MEANS, K-NN. GA
the GA-SVM, 80 data are used to train the model.
The support vectors’ values from the training are then
saved. The gamma parameter obtained is 19.28 and
the C value is 6.49. For testing, 333
consisting of 110 vehicle data and 223 pedestrian data
are used. Out of the 110 vehicles, all are classified
correctly while for 223 human class data items, o
are misclassified. Error in classification
the accuracy is 99.39%. For the normal
classification is 0.9% and the accuracy is 99.1%. For
GA-ANN, error in classification is 0.9% and the
accuracy is 99.1%. For K-MEANS
classification is 1.2% and the accuracy is 98.8% and
for ANN, error in classification is 1.5% and accuracy
is 98.5% and for K-NN, error in classification
and accuracy is 95.2%. Figure 6
classification accuracy. From the figure, it is show
that the proposed model has the highest classification
accuracy.
Table 1 Comparison of Classification Algorithms
International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN:
www.ijtsrd.com
layer having thirty two
neurons and one output neuron. The network is
. This is a
supervised learning algorithm in which the input
vectors are supplied together with the desired output.
The back propagation algorithm (BPN) learns during
the training epoch. Several epochs are needed before
the network can sufficiently learn and provide a
The number of epochs used is
500, with the momentum of 0.5 and learning rate of
y initialized to
small random numbers less than 1 using random
The object classification using
ANN) applies genetic
algorithm to optimize the weights before the ANN is
In this case, there
which signifies a
opulation size N is 50, crossing
mutation probability Pm is 0.015
and network’s terminative condition is MAXGEN of
n excellent empirical
the analysis result for GA-SVM,
NN. GA-SVM. For
SVM, 80 data are used to train the model..
The support vectors’ values from the training are then
The gamma parameter obtained is 19.28 and
For testing, 333 data items
pedestrian data
. Out of the 110 vehicles, all are classified
correctly while for 223 human class data items, only 2
classification is 0.61% and
the normal SVM, error in
is 0.9% and the accuracy is 99.1%. For
is 0.9% and the
MEANS, error in
is 1.2% and the accuracy is 98.8% and
is 1.5% and accuracy
classification is 4.8%
6 shows the
accuracy. From the figure, it is showned
that the proposed model has the highest classification
1 Comparison of Classification Algorithms
S
N
PARAME
TER
GA
-
SV
M
S
V
M
1 Number
observed
features
413 41
3
2 Number of
training set
80 80
3 Number of
classes
2 2
4 Dimension
of input
features
32 32
5 Number of
test set
333 33
3
6 Total
Recognize
d
331 33
0
7
Classificati
on
accuracy
99.
39
%
99
.1
%
Figure 6: Classification Accuracy of the classifiers
93.00%
94.00%
95.00%
96.00%
97.00%
98.00%
99.00%
100.00%
GA-SVM
SVM
GA-ANN
K-MEANS
ANN
), ISSN: 2456-6470
161
GA
-
AN
N
K-
ME
AN
S
A
N
N
K-
N
N
413 413 41
3
41
3
80 80 80 80
2 2 2 2
32 32 32 32
333 333 33
3
33
3
330 329 32
8
31
7
99.
1%
98.
8%
98
.5
%
95
.2
%
Accuracy of the classifiers
ANN
K-NN
Series1
10. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
162
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
7 Conclusion
In this paper, SVM with GA is applied to object
classification in videos. In the proposed model, an
optimized RBF kernel function and parameter C of
SVM is obtained. Video data of moving objects have
been used to evaluate the model. The experimental
results show that the proposed classifier performs
better than the SVM in which parameters are chosen
randomly. The comparative analysis of the model
with that of SVM, GA-ANN, K-MEANS, K-
NN.ANN shows that the model shows more excellent
performance in terms of classification accuracy. In
future other optimization techniques will be looked
into in order to investigate the performance of the
SVM model on other optimization techniques.
References
[1] Akintola K.G, Tavakkolie A. (2011). Robust
Foreground Detection in Videos using
Adaptive Colour Histogram Thresholding and
Shadow Removal. Proceedings of the 7th
International Symposium on Visual
Computing, Vol. part ii JSVC’11, pp. 496-505,
Berlin, Heideiberg, Germany, September,
2011.
[2] Akintola K.G., Olabode O. (2014) A Neuro-
Genetic Model For Moving Object
Classification In Video Surveillance Systems.
International Journal of research in Computer
Applications and Robotics Vol. 2, No8 pp.
143-151, July, 2014.
[3] Chang C.C and Lin, C. J. (2001) LIBSVM: A
Library for Support Vector Machines.
Software available at
http://www.csie.ntu.edu.tw/~cjlin/libsvm.
[4] Chiu P., Girgensohn A., Polak W., Rieffel, E,
Wilcox L. (2000). A Genetic Algorithm for
video Segmentation and Summarization.
Proceedings of IEE International Conference
on Multimedia and Expo, Vol. 3, pp. 1329-
1332, New York, 30th
July-2nd
August, 2000.
[5] Collins, R. T., Lipton, A. J., Fujiyoshi, H., and
Kanade, T. (2000). A System for Video
Surveillance and Monitoring: VSAM Final
Technical Report, CMU-RI-TR-00-12,
Robotics Institute, Carnegie Mellon
University, May 2000.
[6] Elgammal A., Duraiswami R, Harwood D.,and
Davis L.S. (2002). Background and
Foreground Modeling Using Nonparametric
Kernel Density Estimation for Visual
Surveillance. Proceedings of the IEEE Vol.90,
No.7, pp. 1151-1163, JULY 2002.
[7] Heikkila J. and Silven O. (1999) A real-time
system for monitoring of cyclists and
pedestrians. Prococeedings of Second IEEE
Workshop on Visual Surveillance, pp. 74–81,
Fort Collins, Colorado, June 1999.
[8] Hochreiter S., (2009). Theoretical
Bioinformatics and Machine Learning Lecture
Notes. Institute of Bioinformatics, Johannes
Kepler University A-4040 Linz, Austria.
[9] Modi R. V. and Mehta T. B. (2011). ‘Neural
Network-Based Approach for Recognition of
Human Motion Using Stationary Camera’.
International Journal of Computer
Applications, Vol. 25, No. 6, pages 975-887.
[10] Montana D.J., and Davis L.D. (1989).
Training Feed-Forward Networks using
Genetic Algorithms. Proceedings of the
International Joint Conference on Artificial
Intelligence, IJCAI-89. Morgan Kaufman
Publishers, Deutrot, MI, pp.762-767.
[11] Michael P. and El-Kaliouby R. (2003) Real
time facial expression recognition in video
using Support Vector Machine in proceedings
of ICM Nov 5-7, 2003 Vancour, British
Columbia, Canada.
[12] Ramya G and Srclatha M. (2014) Multiple
Object Tracking using Support Vector
Machine. Global Journal of Researches in
Engineering Subtraction Vol. 14 Issue 6
Version 1.
11. International Journal of Trend in Scientific Research and Development, Volume 1(4), ISSN: 2456-6470
www.ijtsrd.com
163
IJTSRD | May-Jun 2017
Available Online @www.ijtsrd.com
[13] Ravindra M Chandraslekhar G. (2014)
Classification of Satellite Images based on
SVM
Classifier using Genetic Algorithm.
International Journal of Innovative Research
in Electrical Electronics Instrumentation and
Control Engineering Vol. 2 Issue 5, May 2014
[14] Rilley J., Ciesielski V.B. (1998). An
Approach to Training Feed-Forward and
Recurrent Neural Networks. Proceedings of
the Second International Conference on
Knowledge-Based Intelligent Electronic
Systems (KES’98), pp. 596-602, Adelaide,
April 1998, USA.
[15] VishwaKarma D.D. (2012). Genetic
Algorithm Based Weights Optimization of
Artificial Neural Network, International
Journal of Advanced Research in Electrical,
Electronics and Instrumentation Vol. 1. No
3, August 2012.
[16] Vapnik V,N.(1995). The Nature of Statistical
Learning Theory. Springer Verlag, New York,
1995. ISBN, 0-387-94559-8.
[17] Wainwright R.L. (1993). Introduction to
Genetic Algorithms Theory and Applications.
The seventh Oklahoma Symposium on
Artificial Intelligence. November, 19,1993.
The
University of Tilsa Cao Smith College
Avenue, Tulsa Oklaoma.