The high market demand for broiler chickens requires that chicken farmers improve their production performance. Production cost and poultry welfare are important competitiveness aspects in the poultry industry. To optimize these aspects, chicken behavior such as feeding and aggression needs to be observed continuously. However, this is not practically done entirely by humans. Implementation of precision live stock farming with deep learning can provide continuous, real-time and automated decisions. In this study, the you only look once version 4 (YOLOv4) architecture is used to detect feeding and aggressive chicken behavior. The data used includes 1,045 feeding bounding boxes and 753 aggressive bounding boxes. The model training is performed using the k-fold cross validation method. The best mean average precision (mAP) values obtained were 99.98% for eating behavior and 99.4% for aggressive behavior.
Deep learning-based classification of cattle behavior using accelerometer sen...IAESIJAI
The increasing demand for food has led to the adoption of precision livestock, which relies on information and communication technology to promote the best practices in meat production. By automating various aspects of the industry, precision livestock allows for increased productivity, more effective management strategies, and decision-making. The paper proposes a methodology that uses deep learning techniques to automatically classify cattle behavior using accelerometer sensors embedded in collars. The work aims to enhance the efficiency and productivity of the industry by improving the classification of cattle behaviors, which is essential for farmers and barn managers to make informed decisions. We tested three different classification techniques to classify rumination, movement, resting, feeding, salting and other cattle behaviors and we achieved promising results that can contribute to a better understanding and management of cattle behavior in the livestock industry.
In this research, a hybrid wrapper model is proposed to identify the featured gene subset from the gene expression data. To balance the gap between exploration
and exploitation, a hybrid model with a popular meta-heuristic algorithm named
spider monkey optimizer (SMO) and simulated annealing (SA) is applied. In the proposed model, ReliefF is used as a filter to obtain the relevant gene subset
from dataset by removing the noise and outliers prior to feeding the data to the
wrapper SMO. To enhance the quality of the solution, simulated annealing is
deployed as local search with the SMO in the second phase, which will guide to the detection of the most optimal feature subset. To evaluate the performance of the proposed model, support vector machine (SVM) as a fitness function to recognize the most informative biomarker gene from the cancer datasets along with University of California, Irvine (UCI) datasets. To further evaluate the model, 4 different classifiers (SVM, na¨ıve Bayes (NB), decision tree (DT), and k-nearest neighbors (KNN)) are used. From the experimental results and analysis, it’s noteworthy to accept that the ReliefF-SMO-SA-SVM performs relatively better than its state-of-the-art counterparts. For cancer datasets, our model performs better in terms of accuracy with a maximum of 99.45%.
Deep convolutional neural network-based system for fish classificationIJECEIAES
In computer vision, image classification is one of the potential image processing tasks. Nowadays, fish classification is a wide considered issue within the areas of machine learning and image segmentation. Moreover, it has been extended to a variety of domains, such as marketing strategies. This paper presents an effective fish classification method based on convolutional neural networks (CNNs). The experiments were conducted on the new dataset of Bangladesh’s indigenous fish species with three kinds of splitting: 80-20%, 75-25%, and 70-30%. We provide a comprehensive comparison of several popular optimizers of CNN. In total, we perform a comparative analysis of 5 different state-of-the-art gradient descent-based optimizers, namely adaptive delta (AdaDelta), stochastic gradient descent (SGD), adaptive momentum (Adam), adaptive max pooling (Adamax), Root mean square propagation (Rmsprop), for CNN. Overall, the obtained experimental results show that Rmsprop, Adam, Adamax performed well compared to the other optimization techniques used, while AdaDelta and SGD performed the worst. Furthermore, the experimental results demonstrated that Adam optimizer attained the best results in performance measures for 70-30% and 80-20% splitting experiments, while the Rmsprop optimizer attained the best results in terms of performance measures of 70-25% splitting experiments. Finally, the proposed model is then compared with state-of-the-art deep CNNs models. Therefore, the proposed model attained the best accuracy of 98.46% in enhancing the CNN ability in classification, among others.
Deep learning-based classification of cattle behavior using accelerometer sen...IAESIJAI
The increasing demand for food has led to the adoption of precision livestock, which relies on information and communication technology to promote the best practices in meat production. By automating various aspects of the industry, precision livestock allows for increased productivity, more effective management strategies, and decision-making. The paper proposes a methodology that uses deep learning techniques to automatically classify cattle behavior using accelerometer sensors embedded in collars. The work aims to enhance the efficiency and productivity of the industry by improving the classification of cattle behaviors, which is essential for farmers and barn managers to make informed decisions. We tested three different classification techniques to classify rumination, movement, resting, feeding, salting and other cattle behaviors and we achieved promising results that can contribute to a better understanding and management of cattle behavior in the livestock industry.
In this research, a hybrid wrapper model is proposed to identify the featured gene subset from the gene expression data. To balance the gap between exploration
and exploitation, a hybrid model with a popular meta-heuristic algorithm named
spider monkey optimizer (SMO) and simulated annealing (SA) is applied. In the proposed model, ReliefF is used as a filter to obtain the relevant gene subset
from dataset by removing the noise and outliers prior to feeding the data to the
wrapper SMO. To enhance the quality of the solution, simulated annealing is
deployed as local search with the SMO in the second phase, which will guide to the detection of the most optimal feature subset. To evaluate the performance of the proposed model, support vector machine (SVM) as a fitness function to recognize the most informative biomarker gene from the cancer datasets along with University of California, Irvine (UCI) datasets. To further evaluate the model, 4 different classifiers (SVM, na¨ıve Bayes (NB), decision tree (DT), and k-nearest neighbors (KNN)) are used. From the experimental results and analysis, it’s noteworthy to accept that the ReliefF-SMO-SA-SVM performs relatively better than its state-of-the-art counterparts. For cancer datasets, our model performs better in terms of accuracy with a maximum of 99.45%.
Deep convolutional neural network-based system for fish classificationIJECEIAES
In computer vision, image classification is one of the potential image processing tasks. Nowadays, fish classification is a wide considered issue within the areas of machine learning and image segmentation. Moreover, it has been extended to a variety of domains, such as marketing strategies. This paper presents an effective fish classification method based on convolutional neural networks (CNNs). The experiments were conducted on the new dataset of Bangladesh’s indigenous fish species with three kinds of splitting: 80-20%, 75-25%, and 70-30%. We provide a comprehensive comparison of several popular optimizers of CNN. In total, we perform a comparative analysis of 5 different state-of-the-art gradient descent-based optimizers, namely adaptive delta (AdaDelta), stochastic gradient descent (SGD), adaptive momentum (Adam), adaptive max pooling (Adamax), Root mean square propagation (Rmsprop), for CNN. Overall, the obtained experimental results show that Rmsprop, Adam, Adamax performed well compared to the other optimization techniques used, while AdaDelta and SGD performed the worst. Furthermore, the experimental results demonstrated that Adam optimizer attained the best results in performance measures for 70-30% and 80-20% splitting experiments, while the Rmsprop optimizer attained the best results in terms of performance measures of 70-25% splitting experiments. Finally, the proposed model is then compared with state-of-the-art deep CNNs models. Therefore, the proposed model attained the best accuracy of 98.46% in enhancing the CNN ability in classification, among others.
Multi-Robot Formation Control Based on Leader-Follower Optimized by the IGAIOSRjournaljce
To improve the efficiency of multi-robot formation control, a new formation control algorithm based on leader-follower optimized by the immune genetic algorithm (IGA) is put forward in this paper. Firstly, the formation control is realized by leader-follower algorithm. Then, the proportion coefficients k1, k2 in leaderfollower is optimized by the immune genetic algorithm. Finally, the optimized proportion coefficients k1 and k2 is used in the leader-follower algorithm to finish the multi-robot formation control. Compared with other three formation control algorithms (i.e. GA, simple leader-follower algorithm, behavior algorithm), the experimental results of multi-robot formation control in two environments show that the formation control performance at time and step finishing formation of the proposed formation control algorithm is obviously improved, which verifies the validity of this algorithm.
Single parent mating in genetic algorithm for real robotic system identificationIAESIJAI
System identification (SI) is a method of determining a mathematical model
for a system given a set of input-output data. A representation is made using
a mathematical model based on certain specified assumptions. In SI, model
structure selection is a step where a model structure perceived as an adequate
system representation is selected. A typical rule is that the final model must
have a good balance between parsimony and accuracy. As a popular search
method, genetic algorithm (GA) is used for selecting a model structure.
However, the optimality of the final model depends much on the
effectiveness of GA operators. This paper presents a mating technique
named single parent mating (SPM) in GA for use in a real robotic SI. This
technique is based on the chromosome structure of the parents such that a
single parent is sufficient in achieving mating that eases the search for the
optimal model. The results show that using three different objective
functions (Akaike information criterion, Bayesian information criterion and
parameter magnitude–based information criterion 2) respectively, GA with
the mating technique is able to find more optimal models than without the
mating technique. Validations show that the selected models using the
mating technique are acceptable.
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
Safety and security systems are essential for personnel who need to be protected and valuables. The security and safety system can be supported using a biometric system to identify and verify permitted users or owners. Finger vein is one type of biometric system that has high-level security. The finger vein biometrics system has two primary functions: identification and verification. Safety and security technology development is often followed by hackers' development of science and technology. Therefore, the science and technology of safety and security need to be continuously developed. The paper proposes finger vein identification using capsule networks with hyperparameter tuning. The augmentation, convolution layer parameters, and capsule layers are optimized. The experimental results show that the capsule network with hyperparameter tuning successfully identifies the finger vein images. The system achieves an accuracy of 91.25% using the Shandong University machine learning and applications-homologous multimodal traits (SDUMLA-HMT) dataset.
Detection of Aedes aegypti larvae using single shot multibox detector with tr...journalBEEI
The flavivirus epidemiology has reached an alarming rate which haunts the world population including Malaysia. In fact, World Health Organization has proposed and practised many methods of vector control through environmental management, chemical and biological orientations but still cannot fully overcome the problem. This paper proposed a detection of Aedes Aegypti larvae in water storage tank using Single Shot Multibox Detector with transfer learning. The objective of the study was to acquire the training and the performance metrics of the detection. The detection was done using SSD with Inception_V2 through transfer learning. The experimental results revealed that the probability detection scored more than 80% accuracies and there was no false alarm. These results demonstrate the effectiveness of the model approach.
Effective classification of birds’ species based on transfer learningIJECEIAES
In recent years, with the deterioration of the earth’s ecological environment, the survival of birds has been more threatened. To protect birds and the diversity of species on earth, it is urgent to build an automatic bird image recognition system. Therefore, this paper assesses the performance of traditional machine learning and deep learning models on image recognition. Also, the help-ability of transfer learning in the field of image recognition is tested to evaluate the best model for bird recognition systems. Three groups of classifiers for bird recognition were constructed, namely, classifiers based on the traditional machine learning algorithms, convolutional neural networks, and transfer learning-based convolutional neural networks. After experiments, these three classifiers showed significant differences in the classification effect on the Kaggle-180-birds dataset. The experimental results finally prove that deep learning is more effective than traditional machine learning algorithms in image recognition as the number of bird species increases. Besides, the obtained results show that when the sample data is small, transfer learning can help the deep neural network classifier to improve classification accuracy.
Corn leaf image classification based on machine learning techniques for accu...IJECEIAES
Corn leaf disease possesses a huge impact on the food industry and corn crop yield as corn is one of the essential and basic nutrition of human life especially to vegetarians and vegans. Hence it is obvious that the quality of corn has to be ideal, however, to achieve that it has to be protected from the several diseases. Thus, there is a high demand for an automated method, which can detect the disease in early-stage and take necessary steps. However, early disease detection possesses a huge challenge, and it is highly critical. Thus, in this research work, we focus on designing and developing enhanced k-nearest neighbor (EKNN) model by adopting the basic k-nearest neighbour (KNN) model. EKNN helps in distinguishing the different class disease. Further fine and coarse features with high quality are generated to obtain the discriminative, boundary, pattern and structural related information and this information are used for classification procedure. Classification process provides the gradient-based features of high quality. Moreover, the proposed model is evaluated considering the Plant-Village dataset; also, a comparative analysis is carried out with different traditional classification model with different metrics.
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...ijtsrd
Convolutional Neural Network CNN designs can successfully classify, predict and cluster in many artificial intelligence applications. In the health sector, intensive studies continue for disease classification. When the literature in this field is examined, it is seen that the studies are concentrated on the health sector. Thanks to these studies, doctors can make an accurate diagnosis by examining radiological images more consistently. In addition, doctors can save time to do other patient work by using CNN. In this study, related current manuscripts in the health sector were examined. The contributions of these publications to the literature were explained and evaluated. Complementary and contradictory arguments of the presented perspectives were revealed. It has been stated that the current status of the studies carried out and in which direction the future studies should evolve and that they can make an important contribution to the literature. Suggestions have been made for the guidance for future studies. Ahmet Özcan | Mahmut Ünver | Atilla Ergüzen "A Survey of Convolutional Neural Network Architectures for Deep Learning via Health Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49156.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/49156/a-survey-of-convolutional-neural-network-architectures-for-deep-learning-via-health-images/ahmet-özcan
AN APPROACH TO DESIGN A RECTANGULAR MICROSTRIP PATCH ANTENNA IN S BAND BY TLM...prj_publication
In this paper we have designed a rectangular microstrip antenna in ‘S’ band
transmission line model. The S band frequency ranges from 2 GHz to 4GHz for wireless
application. The desired frequency is chosen to be 2.4 GHz at which the patch antenna is
designed to improve the bandwidth. After calculating the various parameters such as width,
effective dielectric constant, effective length and actual length. The antenna impedance is
matched to 50 ohm using inset feed. The results are obtained (Input Impedance, reflection
coefficient, SWR and bandwidth) by using MATLAB software.
An Hybrid Learning Approach using Particle Intelligence Dynamics and Bacteri...IJMER
The foraging behavior of E. Coli is used for optimization problems. This paper is based on a
hybrid method that combines particle swarm optimization and bacterial foraging (BF) algorithm for
solution of optimization results. We applied this proposed algorithm on different closed loop transfer
functions and the performance of the system using time response for the optimum value of PID
parameters is studied with incorporating PSO method on mutation, crossover, step sizes, and chemotactic
of the bacteria during the foraging. The bacterial foraging particle swarm optimization (BFPSO)
algorithm is applied to tune the PID controller of type 2, 3 and 4 systems with consideration of minimum
peak overshoot and steady state error objective function. The performance of the time response is
evaluated for the designed PID controller as the integral of time weighted squared error. The results
illustrate that the proposed approach is more efficient and provides better results as compared to the
conventional PSO algorithm.
Improved feature selection using a hybrid side-blotched lizard algorithm and ...IJECEIAES
Feature selection entails choosing the significant features among a wide collection of original features that are essential for predicting test data using a classifier. Feature selection is commonly used in various applications, such as bioinformatics, data mining, and the analysis of written texts, where the dataset contains tens or hundreds of thousands of features, making it difficult to analyze such a large feature set. Removing irrelevant features improves the predictor performance, making it more accurate and cost-effective. In this research, a novel hybrid technique is presented for feature selection that aims to enhance classification accuracy. A hybrid binary version of sideblotched lizard algorithm (SBLA) with genetic algorithm (GA), namely SBLAGA, which combines the strengths of both algorithms is proposed. We use a sigmoid function to adapt the continuous variables values into a binary one, and evaluate our proposed algorithm on twenty-three standard benchmark datasets. Average classification accuracy, average number of selected features and average fitness value were the evaluation criteria. According to the experimental results, SBLAGA demonstrated superior performance compared to SBLA and GA with regards to these criteria. We further compare SBLAGA with four wrapper feature selection methods that are widely used in the literature, and find it to be more efficient.
Bike mishaps have been quickly enlarged over time in many countries. A helmet or a protecting cap is the main safety equipment of motorcycle riders, and two wheelers, however many driver’s abandonment wearing helmets. The main outcome of wearing a helmet is to protect the head of a person travelling on two wheelers just in case of a major or minor accident or fall from a running bike. Because of different social and monetary elements, this sort of vehicle is turning out to be progressively famous. The head protector is the fundamental security gear of motorcyclists however, anyway numerous drivers dont utilize it. This paper proposes a framework for identification of motorcyclists without helmets. For this, we have applied the round Hough change and the Histogram of Oriented Gradients descriptor to remove the picture credits. Then the YOLO v3 was utilized and acquired outcomes. The system has given an average recognition accuracy of 75 that is satisfactory. Vijay Khare | Pratiroop Puri | Kratik Chaurasia "Helmet Detection Using Yolo -V3 Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49341.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/49341/helmet-detection-using-yolo-v3-technique/vijay-khare
AUTOMATED TEST CASE GENERATION AND OPTIMIZATION: A COMPARATIVE REVIEWijcsit
Software testing is the primary phase, which is performed during software development and it is carried by a sequence of instructions of test inputs followed by expected output. Evolutionary algorithms are most popular in the computational field based on population. The test case generation process is used to identify
test cases with resources and also identifies critical domain requirements. The behavior of bees is based on
population and evolutionary method. Bee Colony algorithm (BCA) has gained superiority in comparison to other algorithms in the field of computation. The Harmony Search (HS) algorithm is based on the enhancement process of music. When musicians compose the harmony through different possible combinations of the music, at that time the pitches are stored in the harmony memory and the optimization
can be done by adjusting the input pitches and generate the perfect harmony. Particle Swarm Optimization (PSO) is an intelligence based meta-heuristic algorithm where each particle can locate their source of food at different position.. In this algorithm, the particles will search for a better food source position in the hope of getting a better result. In this paper, the role of Artificial Bee Colony, particle swarm optimization
and harmony search algorithms are analyzed in generating random test data and optimized those test data.
Test case generation and optimization through bee colony, PSO and harmony search (HS) algorithms which are applied through a case study, i.e., withdrawal operation in Bank ATM and it is observed that these algorithms are able to generate suitable automated test cases or test data in a client manner. This
section further gives the brief details and compares between HS, PSO, and Bee Colony (BC) Optimization
methods which are used for test case or test data generation and optimization.
Convolutional neural network with binary moth flame optimization for emotion ...IAESIJAI
Electroencephalograph (EEG) signals have the ability of real-time reflecting brain activities. Utilizing the EEG signal for analyzing human emotional states is a common study. The EEG signals of the emotions aren’t distinctive and it is different from one person to another as every one of them has different emotional responses to same stimuli. Which is why, the signals of the EEG are subject dependent and proven to be effective for the subject dependent detection of the Emotions. For the purpose of achieving enhanced accuracy and high true positive rate, the suggested system proposed a binary moth flame optimization (BMFO) algorithm for the process of feature selection and convolutional neural networks (CNNs) for classifications. In this proposal, optimum features are chosen with the use of accuracy as objective function. Ultimately, optimally chosen features are classified after that with the use of a CNN for the purpose of discriminating different emotion states.
A novel ensemble model for detecting fake newsIAESIJAI
Due the growing proliferation of fake news over the past couple of years, our objective in this paper is to propose an ensemble model for the automatic classification of article news as being either real or fake. For this purpose, we opt for a blending technique that combines three models, namely bidirectional long short-term memory (Bi-LSTM), stochastic gradient descent classifier and ridge classifier. The implementation of the proposed model (i.e. BI-LSR) on real world datasets, has shown outstanding results. In fact, it achieved an accuracy score of 99.16%. Accordingly, this ensemble learning has proven to do perform better than individual conventional machine learning and deep learning models as well as many ensemble learning approaches cited in the literature.
More Related Content
Similar to Automatic detection of broiler’s feeding and aggressive behavior using you only look once algorithm
Multi-Robot Formation Control Based on Leader-Follower Optimized by the IGAIOSRjournaljce
To improve the efficiency of multi-robot formation control, a new formation control algorithm based on leader-follower optimized by the immune genetic algorithm (IGA) is put forward in this paper. Firstly, the formation control is realized by leader-follower algorithm. Then, the proportion coefficients k1, k2 in leaderfollower is optimized by the immune genetic algorithm. Finally, the optimized proportion coefficients k1 and k2 is used in the leader-follower algorithm to finish the multi-robot formation control. Compared with other three formation control algorithms (i.e. GA, simple leader-follower algorithm, behavior algorithm), the experimental results of multi-robot formation control in two environments show that the formation control performance at time and step finishing formation of the proposed formation control algorithm is obviously improved, which verifies the validity of this algorithm.
Single parent mating in genetic algorithm for real robotic system identificationIAESIJAI
System identification (SI) is a method of determining a mathematical model
for a system given a set of input-output data. A representation is made using
a mathematical model based on certain specified assumptions. In SI, model
structure selection is a step where a model structure perceived as an adequate
system representation is selected. A typical rule is that the final model must
have a good balance between parsimony and accuracy. As a popular search
method, genetic algorithm (GA) is used for selecting a model structure.
However, the optimality of the final model depends much on the
effectiveness of GA operators. This paper presents a mating technique
named single parent mating (SPM) in GA for use in a real robotic SI. This
technique is based on the chromosome structure of the parents such that a
single parent is sufficient in achieving mating that eases the search for the
optimal model. The results show that using three different objective
functions (Akaike information criterion, Bayesian information criterion and
parameter magnitude–based information criterion 2) respectively, GA with
the mating technique is able to find more optimal models than without the
mating technique. Validations show that the selected models using the
mating technique are acceptable.
Finger vein identification system using capsule networks with hyperparameter ...IAESIJAI
Safety and security systems are essential for personnel who need to be protected and valuables. The security and safety system can be supported using a biometric system to identify and verify permitted users or owners. Finger vein is one type of biometric system that has high-level security. The finger vein biometrics system has two primary functions: identification and verification. Safety and security technology development is often followed by hackers' development of science and technology. Therefore, the science and technology of safety and security need to be continuously developed. The paper proposes finger vein identification using capsule networks with hyperparameter tuning. The augmentation, convolution layer parameters, and capsule layers are optimized. The experimental results show that the capsule network with hyperparameter tuning successfully identifies the finger vein images. The system achieves an accuracy of 91.25% using the Shandong University machine learning and applications-homologous multimodal traits (SDUMLA-HMT) dataset.
Detection of Aedes aegypti larvae using single shot multibox detector with tr...journalBEEI
The flavivirus epidemiology has reached an alarming rate which haunts the world population including Malaysia. In fact, World Health Organization has proposed and practised many methods of vector control through environmental management, chemical and biological orientations but still cannot fully overcome the problem. This paper proposed a detection of Aedes Aegypti larvae in water storage tank using Single Shot Multibox Detector with transfer learning. The objective of the study was to acquire the training and the performance metrics of the detection. The detection was done using SSD with Inception_V2 through transfer learning. The experimental results revealed that the probability detection scored more than 80% accuracies and there was no false alarm. These results demonstrate the effectiveness of the model approach.
Effective classification of birds’ species based on transfer learningIJECEIAES
In recent years, with the deterioration of the earth’s ecological environment, the survival of birds has been more threatened. To protect birds and the diversity of species on earth, it is urgent to build an automatic bird image recognition system. Therefore, this paper assesses the performance of traditional machine learning and deep learning models on image recognition. Also, the help-ability of transfer learning in the field of image recognition is tested to evaluate the best model for bird recognition systems. Three groups of classifiers for bird recognition were constructed, namely, classifiers based on the traditional machine learning algorithms, convolutional neural networks, and transfer learning-based convolutional neural networks. After experiments, these three classifiers showed significant differences in the classification effect on the Kaggle-180-birds dataset. The experimental results finally prove that deep learning is more effective than traditional machine learning algorithms in image recognition as the number of bird species increases. Besides, the obtained results show that when the sample data is small, transfer learning can help the deep neural network classifier to improve classification accuracy.
Corn leaf image classification based on machine learning techniques for accu...IJECEIAES
Corn leaf disease possesses a huge impact on the food industry and corn crop yield as corn is one of the essential and basic nutrition of human life especially to vegetarians and vegans. Hence it is obvious that the quality of corn has to be ideal, however, to achieve that it has to be protected from the several diseases. Thus, there is a high demand for an automated method, which can detect the disease in early-stage and take necessary steps. However, early disease detection possesses a huge challenge, and it is highly critical. Thus, in this research work, we focus on designing and developing enhanced k-nearest neighbor (EKNN) model by adopting the basic k-nearest neighbour (KNN) model. EKNN helps in distinguishing the different class disease. Further fine and coarse features with high quality are generated to obtain the discriminative, boundary, pattern and structural related information and this information are used for classification procedure. Classification process provides the gradient-based features of high quality. Moreover, the proposed model is evaluated considering the Plant-Village dataset; also, a comparative analysis is carried out with different traditional classification model with different metrics.
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...ijtsrd
Convolutional Neural Network CNN designs can successfully classify, predict and cluster in many artificial intelligence applications. In the health sector, intensive studies continue for disease classification. When the literature in this field is examined, it is seen that the studies are concentrated on the health sector. Thanks to these studies, doctors can make an accurate diagnosis by examining radiological images more consistently. In addition, doctors can save time to do other patient work by using CNN. In this study, related current manuscripts in the health sector were examined. The contributions of these publications to the literature were explained and evaluated. Complementary and contradictory arguments of the presented perspectives were revealed. It has been stated that the current status of the studies carried out and in which direction the future studies should evolve and that they can make an important contribution to the literature. Suggestions have been made for the guidance for future studies. Ahmet Özcan | Mahmut Ünver | Atilla Ergüzen "A Survey of Convolutional Neural Network Architectures for Deep Learning via Health Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49156.pdf Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/49156/a-survey-of-convolutional-neural-network-architectures-for-deep-learning-via-health-images/ahmet-özcan
AN APPROACH TO DESIGN A RECTANGULAR MICROSTRIP PATCH ANTENNA IN S BAND BY TLM...prj_publication
In this paper we have designed a rectangular microstrip antenna in ‘S’ band
transmission line model. The S band frequency ranges from 2 GHz to 4GHz for wireless
application. The desired frequency is chosen to be 2.4 GHz at which the patch antenna is
designed to improve the bandwidth. After calculating the various parameters such as width,
effective dielectric constant, effective length and actual length. The antenna impedance is
matched to 50 ohm using inset feed. The results are obtained (Input Impedance, reflection
coefficient, SWR and bandwidth) by using MATLAB software.
An Hybrid Learning Approach using Particle Intelligence Dynamics and Bacteri...IJMER
The foraging behavior of E. Coli is used for optimization problems. This paper is based on a
hybrid method that combines particle swarm optimization and bacterial foraging (BF) algorithm for
solution of optimization results. We applied this proposed algorithm on different closed loop transfer
functions and the performance of the system using time response for the optimum value of PID
parameters is studied with incorporating PSO method on mutation, crossover, step sizes, and chemotactic
of the bacteria during the foraging. The bacterial foraging particle swarm optimization (BFPSO)
algorithm is applied to tune the PID controller of type 2, 3 and 4 systems with consideration of minimum
peak overshoot and steady state error objective function. The performance of the time response is
evaluated for the designed PID controller as the integral of time weighted squared error. The results
illustrate that the proposed approach is more efficient and provides better results as compared to the
conventional PSO algorithm.
Improved feature selection using a hybrid side-blotched lizard algorithm and ...IJECEIAES
Feature selection entails choosing the significant features among a wide collection of original features that are essential for predicting test data using a classifier. Feature selection is commonly used in various applications, such as bioinformatics, data mining, and the analysis of written texts, where the dataset contains tens or hundreds of thousands of features, making it difficult to analyze such a large feature set. Removing irrelevant features improves the predictor performance, making it more accurate and cost-effective. In this research, a novel hybrid technique is presented for feature selection that aims to enhance classification accuracy. A hybrid binary version of sideblotched lizard algorithm (SBLA) with genetic algorithm (GA), namely SBLAGA, which combines the strengths of both algorithms is proposed. We use a sigmoid function to adapt the continuous variables values into a binary one, and evaluate our proposed algorithm on twenty-three standard benchmark datasets. Average classification accuracy, average number of selected features and average fitness value were the evaluation criteria. According to the experimental results, SBLAGA demonstrated superior performance compared to SBLA and GA with regards to these criteria. We further compare SBLAGA with four wrapper feature selection methods that are widely used in the literature, and find it to be more efficient.
Bike mishaps have been quickly enlarged over time in many countries. A helmet or a protecting cap is the main safety equipment of motorcycle riders, and two wheelers, however many driver’s abandonment wearing helmets. The main outcome of wearing a helmet is to protect the head of a person travelling on two wheelers just in case of a major or minor accident or fall from a running bike. Because of different social and monetary elements, this sort of vehicle is turning out to be progressively famous. The head protector is the fundamental security gear of motorcyclists however, anyway numerous drivers dont utilize it. This paper proposes a framework for identification of motorcyclists without helmets. For this, we have applied the round Hough change and the Histogram of Oriented Gradients descriptor to remove the picture credits. Then the YOLO v3 was utilized and acquired outcomes. The system has given an average recognition accuracy of 75 that is satisfactory. Vijay Khare | Pratiroop Puri | Kratik Chaurasia "Helmet Detection Using Yolo -V3 Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-2 , February 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49341.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/49341/helmet-detection-using-yolo-v3-technique/vijay-khare
AUTOMATED TEST CASE GENERATION AND OPTIMIZATION: A COMPARATIVE REVIEWijcsit
Software testing is the primary phase, which is performed during software development and it is carried by a sequence of instructions of test inputs followed by expected output. Evolutionary algorithms are most popular in the computational field based on population. The test case generation process is used to identify
test cases with resources and also identifies critical domain requirements. The behavior of bees is based on
population and evolutionary method. Bee Colony algorithm (BCA) has gained superiority in comparison to other algorithms in the field of computation. The Harmony Search (HS) algorithm is based on the enhancement process of music. When musicians compose the harmony through different possible combinations of the music, at that time the pitches are stored in the harmony memory and the optimization
can be done by adjusting the input pitches and generate the perfect harmony. Particle Swarm Optimization (PSO) is an intelligence based meta-heuristic algorithm where each particle can locate their source of food at different position.. In this algorithm, the particles will search for a better food source position in the hope of getting a better result. In this paper, the role of Artificial Bee Colony, particle swarm optimization
and harmony search algorithms are analyzed in generating random test data and optimized those test data.
Test case generation and optimization through bee colony, PSO and harmony search (HS) algorithms which are applied through a case study, i.e., withdrawal operation in Bank ATM and it is observed that these algorithms are able to generate suitable automated test cases or test data in a client manner. This
section further gives the brief details and compares between HS, PSO, and Bee Colony (BC) Optimization
methods which are used for test case or test data generation and optimization.
Similar to Automatic detection of broiler’s feeding and aggressive behavior using you only look once algorithm (20)
Convolutional neural network with binary moth flame optimization for emotion ...IAESIJAI
Electroencephalograph (EEG) signals have the ability of real-time reflecting brain activities. Utilizing the EEG signal for analyzing human emotional states is a common study. The EEG signals of the emotions aren’t distinctive and it is different from one person to another as every one of them has different emotional responses to same stimuli. Which is why, the signals of the EEG are subject dependent and proven to be effective for the subject dependent detection of the Emotions. For the purpose of achieving enhanced accuracy and high true positive rate, the suggested system proposed a binary moth flame optimization (BMFO) algorithm for the process of feature selection and convolutional neural networks (CNNs) for classifications. In this proposal, optimum features are chosen with the use of accuracy as objective function. Ultimately, optimally chosen features are classified after that with the use of a CNN for the purpose of discriminating different emotion states.
A novel ensemble model for detecting fake newsIAESIJAI
Due the growing proliferation of fake news over the past couple of years, our objective in this paper is to propose an ensemble model for the automatic classification of article news as being either real or fake. For this purpose, we opt for a blending technique that combines three models, namely bidirectional long short-term memory (Bi-LSTM), stochastic gradient descent classifier and ridge classifier. The implementation of the proposed model (i.e. BI-LSR) on real world datasets, has shown outstanding results. In fact, it achieved an accuracy score of 99.16%. Accordingly, this ensemble learning has proven to do perform better than individual conventional machine learning and deep learning models as well as many ensemble learning approaches cited in the literature.
K-centroid convergence clustering identification in one-label per type for di...IAESIJAI
Disease prediction is a high demand field which requires significant support from machine learning (ML) to enhance the result efficiency. The research works on application of K-means clustering supervised classification in disease prediction where each class only has one labeled data. The K-centroid convergence clustering identification (KC3 I) system is based on semi-K-means clustering but only requires single labeled data per class for the training process with the training dataset to update the centroid. The KC3 I model also includes a dictionary box to index all the input centroids before and after the updating process. Each centroid matches with a corresponding label inside this box. After the training process, each time the input features arrive, the trained centroid will put them to its cluster depending on the Euclidean distance, then convert them into the specific class name, which is coherent to that centroid index. Two validation stages were carried out and accomplished the expectation in terms of precision, recall, F1-score, and absolute accuracy. The last part demonstrates the possibility of feature reduction by selecting the most crucial feature with the extra tree classifier method. Total data are fed into the KC3 I system with the most important features and remain the same accuracy.
Plant leaf detection through machine learning based image classification appr...IAESIJAI
Since maize is a staple diet for people, especially vegetarians and vegans, maize leaf disease has a significant influence here on the food industry including maize crop productivity. Therefore, it should be understood that maize quality must be optimal; yet, to do so, maize must be safeguarded from several illnesses. As a result, there is a great demand for such an automated system that can identify the condition early on and take the appropriate action. Early disease identification is crucial, but it also poses a major obstacle. As a result, in this research project, we adopt the fundamental k-nearest neighbor (KNN) model and concentrate on building and developing the enhanced k-nearest neighbor (EKNN) model. EKNN aids in identifying several classes of disease. To gather discriminative, boundary, pattern, and structurally linked information, additional high-quality fine and coarse features are generated. This information is then used in the classification process. The classification algorithm offers high-quality gradient-based features. Additionally, the proposed model is assessed using the Plant-Village dataset, and a comparison with many standard classification models using various metrics is also done.
Backbone search for object detection for applications in intrusion warning sy...IAESIJAI
In this work, we propose a novel backbone search method for object detection for applications in intrusion warning systems. The goal is to find a compact model for use in embedded thermal imaging cameras widely used in intrusion warning systems. The proposed method is based on faster region-based convolutional neural network (Faster R-CNN) because it can detect small objects. Inspired by EfficientNet, the sought-after backbone architecture is obtained by finding the most suitable width scale for the base backbone (ResNet50). The evaluation metrics are mean average precision (mAP), number of parameters, and number of multiply–accumulate operations (MACs). The experimental results showed that the proposed method is effective in building a lightweight neural network for the task of object detection. The obtained model can keep the predefined mAP while minimizing the number of parameters and computational resources. All experiments are executed elaborately on the person detection in intrusion warning systems (PDIWS) dataset.
Deep learning method for lung cancer identification and classificationIAESIJAI
Lung cancer (LC) is calming many lives and is becoming a serious cause of concern. The detection of LC at an early stage assists the chances of recovery. Accuracy of detection of LC at an early stage can be improved with the help of a convolutional neural network (CNN) based deep learning approach. In this paper, we present two methodologies for Lung cancer detection (LCD) applied on Lung image database consortium (LIDC) and image database resource initiative (IDRI) data sets. Classification of these LC images is carried out using support vector machine (SVM), and deep CNN. The CNN is trained with i) multiple batches and ii) single batch for LC image classification as non cancer and cancer image. All these methods are being implemented in MATLAB. The accuracy of classification obtained by SVM is 65%, whereas deep CNN produced detection accuracy of 80% and 100% respectively for multiple and single batch training. The novelty of our experimentation is near 100% classification accuracy obtained by our deep CNN model when tested on 25 Lung computed tomography (CT) test images each of size 512×512 pixels in less than 20 iterations as compared to the research work carried out by other researchers using cropped LC nodule images.
Optically processed Kannada script realization with Siamese neural network modelIAESIJAI
Optical character recognition (OCR) is a technology that allows computers to recognize and extract text from images or scanned documents. It is commonly used to convert printed or handwritten text into machine-readable format. This Study presents an OCR system on Kannada Characters based on siamese neural network (SNN). Here the SNN, a Deep neural network which comprises of two identical convolutional neural network (CNN) compare the script and ranks based on the dissimilarity. When lesser dissimilarity score is identified, prediction is done as character match. In this work the authors use 5 classes of Kannada characters which were initially preprocessed using grey scaling and convert it to pgm format. This is directly input into the Deep convolutional network which is learnt from matching and non-matching image between the CNN with contrastive loss function in Siamese architecture. The Proposed OCR system uses very less time and gives more accurate results as compared to the regular CNN. The model can become a powerful tool for identification, particularly in situations where there is a high degree of variation in writing styles or limited training data is available.
Embedded artificial intelligence system using deep learning and raspberrypi f...IAESIJAI
Melanoma is a kind of skin cancer that originates in melanocytes responsible for producing melanin, it can be a severe and potentially deadly form of cancer because it can metastasize to other regions of the body if not detected and treated early. To facilitate this process, Recently, various computer-assisted low-cost, reliable, and accurate diagnostic systems have been proposed based on artificial intelligence (AI) algorithms, particularly deep learning techniques. This work proposed an innovative and intelligent system that combines the internet of things (IoT) with a Raspberry Pi connected to a camera and a deep learning model based on the deep convolutional neural network (CNN) algorithm for real-time detection and classification of melanoma cancer lesions. The key stages of our model before serializing to the Raspberry Pi: Firstly, the preprocessing part contains data cleaning, data transformation (normalization), and data augmentation to reduce overfitting when training. Then, the deep CNN algorithm is used to extract the features part. Finally, the classification part with applied Sigmoid Activation Function. The experimental results indicate the efficiency of our proposed classification system as we achieved an accuracy rate of 92%, a precision of 91%, a sensitivity of 91%, and an area under the curve- receiver operating characteristics (AUC-ROC) of 0.9133.
Deep learning based biometric authentication using electrocardiogram and irisIAESIJAI
Authentication systems play an important role in wide range of applications. The traditional token certificate and password-based authentication systems are now replaced by biometric authentication systems. Generally, these authentication systems are based on the data obtained from face, iris, electrocardiogram (ECG), fingerprint and palm print. But these types of models are unimodal authentication, which suffer from accuracy and reliability issues. In this regard, multimodal biometric authentication systems have gained huge attention to develop the robust authentication systems. Moreover, the current development in deep learning schemes have proliferated to develop more robust architecture to overcome the issues of tradition machine learning based authentication systems. In this work, we have adopted ECG and iris data and trained the obtained features with the help of hybrid convolutional neural network- long short-term memory (CNN-LSTM) model. In ECG, R peak detection is considered as an important aspect for feature extraction and morphological features are extracted. Similarly, gabor-wavelet, gray level co-occurrence matrix (GLCM), gray level difference matrix (GLDM) and principal component analysis (PCA) based feature extraction methods are applied on iris data. The final feature vector is obtained from MIT-BIH and IIT Delhi Iris dataset which is trained and tested by using CNN-LSTM. The experimental analysis shows that the proposed approach achieves average accuracy, precision, and F1-core as 0.985, 0.962 and 0.975, respectively.
Hybrid channel and spatial attention-UNet for skin lesion segmentationIAESIJAI
Melanoma is a type of skin cancer which has affected many lives globally. The American Cancer Society research has suggested that it a serious type of skin cancer and lead to mortality but it is almost 100% curable if it is detected and treated in its early stages. Currently automated computer vision-based schemes are widely adopted but these systems suffer from poor segmentation accuracy. To overcome these issue, deep learning (DL) has become the promising solution which performs extensive training for pattern learning and provide better classification accuracy. However, skin lesion segmentation is affected due to skin hair, unclear boundaries, pigmentation, and mole. To overcome this issue, we adopt UNet based deep learning scheme and incorporated attention mechanism which considers low level statistics and high-level statistics combined with feedback and skip connection module. This helps to obtain the robust features without neglecting the channel information. Further, we use channel attention, spatial attention modulation to achieve the final segmentation. The proposed DL based scheme is instigated on publically available dataset and experimental investigation shows that the proposed Hybrid Attention UNet approach achieves average performance as 0.9715, 0.9962, 0.9710.
Photoplethysmogram signal reconstruction through integrated compression sensi...IAESIJAI
The transmission of photoplethysmogram (PPG) signals in real-time is extremely challenging and facilitates the use of an internet of things (IoT) environment for healthcare- monitoring. This paper proposes an approach for PPG signal reconstruction through integrated compression sensing and basis function aware shallow learning (CSBSL). Integrated-CSBSL approach for combined compression of PPG signals via multiple channels thereby improving the reconstruction accuracy for the PPG signals essential in healthcare monitoring. An optimal basis function aware shallow learning procedure is employed on PPG signals with prior initialization; this is further fine-tuned by utilizing the knowledge of various other channels, which exploit the further sparsity of the PPG signals. The proposed method for learning combined with PPG signals retains the knowledge of spatial and temporal correlation. The proposed Integrated-CSBSL approach consists of two steps, in the first step the shallow learning based on basis function is carried out through training the PPG signals. The proposed method is evaluated using multichannel PPG signal reconstruction, which potentially benefits clinical applications through PPG monitoring and diagnosis.
Speaker identification under noisy conditions using hybrid convolutional neur...IAESIJAI
Speaker identification is biometrics that classifies or identifies a person from other speakers based on speech characteristics. Recently, deep learning models outperformed conventional machine learning models in speaker identification. Spectrograms of the speech have been used as input in deep learning-based speaker identification using clean speech. However, the performance of speaker identification systems gets degraded under noisy conditions. Cochleograms have shown better results than spectrograms in deep learning-based speaker recognition under noisy and mismatched conditions. Moreover, hybrid convolutional neural network (CNN) and recurrent neural network (RNN) variants have shown better performance than CNN or RNN variants in recent studies. However, there is no attempt conducted to use a hybrid CNN and enhanced RNN variants in speaker identification using cochleogram input to enhance the performance under noisy and mismatched conditions. In this study, a speaker identification using hybrid CNN and the gated recurrent unit (GRU) is proposed for noisy conditions using cochleogram input. VoxCeleb1 audio dataset with real-world noises, white Gaussian noises (WGN) and without additive noises were employed for experiments. The experiment results and the comparison with existing works show that the proposed model performs better than other models in this study and existing works.
Multi-channel microseismic signals classification with convolutional neural n...IAESIJAI
Identifying and classifying microseismic signals is essential to warn of mines’ dangers. Deep learning has replaced traditional methods, but labor-intensive manual identification and varying deep learning outcomes pose challenges. This paper proposes a transfer learning-based convolutional neural network (CNN) method called microseismic signals-convolutional neural network (MS-CNN) to automatically recognize and classify microseismic events and blasts. The model was instructed on a limited sample of data to obtain an optimal weight model for microseismic waveform recognition and classification. A comparative analysis was performed with an existing CNN model and classical image classification models such as AlexNet, GoogLeNet, and ResNet50. The outcomes demonstrate that the MS-CNN model achieved the best recognition and classification effect (99.6% accuracy) in the shortest time (0.31 s to identify 277 images in the test set). Thus, the MS-CNN model can efficiently recognize and classify microseismic events and blasts in practical engineering applications, improving the recognition timeliness of microseismic signals and further enhancing the accuracy of event classification.
Sophisticated face mask dataset: a novel dataset for effective coronavirus di...IAESIJAI
Efficient and accurate coronavirus disease (COVID-19) surveillance necessitates robust identification of individuals wearing face masks. This research introduces the sophisticated face mask dataset (SFMD), a comprehensive compilation of high-quality face mask images enriched with detailed annotations on mask types, fits, and usage patterns. Leveraging cutting-edge deep learning models—EfficientNet-B2, ResNet50, and MobileNet-V2—, we compare SFMD against two established benchmarks: the real-world masked face dataset (RMFD) and the masked face recognition dataset (MFRD). Across all models, SFMD consistently outperforms RMFD and MFRD in key metrics, including accuracy, precision, recall, and F1 score. Additionally, our study demonstrates the dataset's capability to cultivate robust models resilient to intricate scenarios like low-light conditions and facial occlusions due to accessories or facial hair.
Transfer learning for epilepsy detection using spectrogram imagesIAESIJAI
Epilepsy stands out as one of the common neurological diseases. The neural activity of the brain is observed using electroencephalography (EEG). Manual inspection of EEG brain signals is a slow and arduous process, which puts heavy load on neurologists and affects their performance. The aim of this study is to find the best result of classification using the transfer learning model that automatically identify the epileptic and the normal activity, to classify EEG signals by using images of spectrogram which represents the percentage of energy for each coefficient of the continuous wavelet. Dataset includes the EEG signals recorded at monitoring unit of epilepsy used in this study to presents an application of transfer learning by comparing three models Alexnet, visual geometry group (VGG19) and residual neural network ResNet using different combinations with seven different classifiers. This study tested the models and reached a different value of accuracy and other metrics used to judge their performances, and as a result the best combination has been achieved with ResNet combined with support vector machine (SVM) classifier that classified EEG signals with a high success rate using multiple performance metrics such as 97.22% accuracy and 2.78% the value of the error rate.
Deep neural network for lateral control of self-driving cars in urban environ...IAESIJAI
The exponential growth of the automotive industry clearly indicates that self-driving cars are the future of transportation. However, their biggest challenge lies in lateral control, particularly in urban bottlenecking environments, where disturbances and obstacles are abundant. In these situations, the ego vehicle has to follow its own trajectory while rapidly correcting deviation errors without colliding with other nearby vehicles. Various research efforts have focused on developing lateral control approaches, but these methods remain limited in terms of response speed and control accuracy. This paper presents a control strategy using a deep neural network (DNN) controller to effectively keep the car on the centerline of its trajectory and adapt to disturbances arising from deviations or trajectory curvature. The controller focuses on minimizing deviation errors. The Matlab/Simulink software is used for designing and training the DNN. Finally, simulation results confirm that the suggested controller has several advantages in terms of precision, with lateral deviation remaining below 0.65 meters, and rapidity, with a response time of 0.7 seconds, compared to traditional controllers in solving lateral control.
Attention mechanism-based model for cardiomegaly recognition in chest X-Ray i...IAESIJAI
Recently, cardiovascular diseases (CVDs) have become a rapidly growing problem in the world, especially in developing countries. The latter are facing a lifestyle change that introduces new risk factors for heart disease, that requires a particular and urgent interest. Besides, cardiomegaly is a sign of cardiovascular diseases that refers to various conditions; it is associated with the heart enlargement that can be either transient or permanent depending on certain conditions. Furthermore, cardiomegaly is visible on any imaging test including Chest X-Radiation (X-Ray) images; which are one of the most common tools used by Cardiologists to detect and diagnose many diseases. In this paper, we propose an innovative deep learning (DL) model based on an attention module and MobileNet architecture to recognize Cardiomegaly patients using the popular Chest X-Ray8 dataset. Actually, the attention module captures the spatial relationship between the relevant regions in Chest X-Ray images. The experimental results show that the proposed model achieved interesting results with an accuracy rate of 81% which makes it suitable for detecting cardiomegaly disease.
Efficient commodity price forecasting using long short-term memory modelIAESIJAI
Predicting commodity prices, particularly food prices, is a significant concern for various stakeholders, especially in regions that are highly sensitive to commodity price volatility. Historically, many machine learning models like autoregressive integrated moving average (ARIMA) and support vector machine (SVM) have been suggested to overcome the forecasting task. These models struggle to capture the multifaceted and dynamic factors influencing these prices. Recently, deep learning approaches have demonstrated considerable promise in handling complex forecasting tasks. This paper presents a novel long short-term memory (LSTM) network-based model for commodity price forecasting. The model uses five essential commodities namely bread, meat, milk, oil, and petrol. The proposed model focuses on advanced feature engineering which involves moving averages, price volatility, and past prices. The results reveal that our model outperforms traditional methods as it achieves 0.14, 3.04%, and 98.2% for root mean square error (RMSE), mean absolute percentage error (MAPE), and R-squared (R2 ), respectively. In addition to the simplicity of the model, which consists of an LSTM single-cell architecture that reduced the training time to a few minutes instead of hours. This paper contributes to the economic literature on price prediction using advanced deep learning techniques as well as provides practical implications for managing commodity price instability globally.
1-dimensional convolutional neural networks for predicting sudden cardiacIAESIJAI
Sudden cardiac arrest (SCA) is a serious heart problem that occurs without symptoms or warning. SCA causes high mortality. Therefore, it is important to estimate the incidence of SCA. Current methods for predicting ventricular fibrillation (VF) episodes require monitoring patients over time, resulting in no complications. New technologies, especially machine learning, are gaining popularity due to the benefits they provide. However, most existing systems rely on manual processes, which can lead to inefficiencies in disseminating patient information. On the other hand, existing deep learning methods rely on large data sets that are not publicly available. In this study, we propose a deep learning method based on one-dimensional convolutional neural networks to learn to use discrete fourier transform (DFT) features in raw electrocardiogram (ECG) signals. The results showed that our method was able to accurately predict the onset of SCA with an accuracy of 96% approximately 90 minutes before it occurred. Predictions can save many lives. That is, optimized deep learning models can outperform manual models in analyzing long-term signals.
A deep learning-based approach for early detection of disease in sugarcane pl...IAESIJAI
In many regions of the nation, agriculture serves as the primary industry. The farming environment now faces a number of challenges to farmers. One of the major concerns, and the focus of this research, is disease prediction. A methodology is suggested to automate a process for identifying disease in plant growth and warning farmers in advance so they can take appropriate action. Disease in crop plants has an impact on agricultural production. In this work, a novel DenseNet-support vector machine: explainable artificial intelligence (DNet-SVM: XAI) interpretation that combines a DenseNet with support vector machine (SVM) and local interpretable model-agnostic explanation (LIME) interpretation has been proposed. DNet-SVM: XAI was created by a series of modifications to DenseNet201, including the addition of a support vector machine (SVM) classifier. Prior to using SVM to identify if an image is healthy or un-healthy, images are first feature extracted using a convolution network called DenseNet. In addition to offering a likely explanation for the prediction, the reasoning is carried out utilizing the visual cue produced by the LIME. In light of this, the proposed approach, when paired with its determined interpretability and precision, may successfully assist farmers in the detection of infected plants and recommendation of pesticide for the identified disease.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Automatic detection of broiler’s feeding and aggressive behavior using you only look once algorithm
1. IAES International Journal of Artificial Intelligence (IJ-AI)
Vol. 13, No. 1, March 2024, pp. 104~114
ISSN: 2252-8938, DOI: 10.11591/ijai.v13.i1.pp104-114 104
Journal homepage: http://ijai.iaescore.com
Automatic detection of broiler’s feeding and aggressive
behavior using you only look once algorithm
Sri Wahjuni1
, Wulandari1
, Rafael Tektano Grandiawan Eknanda1
, Iman Rahayu Hidayati Susanto2
,
Auriza Rahmad Akbar1
1
Department of Computer Science, Faculty of Mathematics and Natural Science, IPB University, Bogor, Indonesia
2
Department of Animal Production and Technology, Faculty of Animal Science, IPB University, Bogor, Indonesia
Article Info ABSTRACT
Article history:
Received Nov 11, 2022
Revised Jan 27, 2023
Accepted Mar 10, 2023
The high market demand for broiler chickens requires that chicken farmers
improve their production performance. Production cost and poultry welfare
are important competitiveness aspects in the poultry industry. To optimize
these aspects, chicken behavior such as feeding and aggression needs to be
observed continuously. However, this is not practically done entirely by
humans. Implementation of precision live stock farming with deep learning
can provide continuous, real-time and automated decisions. In this study, the
you only look once version 4 (YOLOv4) architecture is used to detect feeding
and aggressive chicken behavior. The data used includes 1,045 feeding
bounding boxes and 753 aggressive bounding boxes. The model training is
performed using the k-fold cross validation method. The best mean average
precision (mAP) values obtained were 99.98% for eating behavior and 99.4%
for aggressive behavior.
Keywords:
Critical-condition notification
Object detection
Real-time monitoring
Remote observation
Smart coop
This is an open access article under the CC BY-SA license.
Corresponding Author:
Sri Wahjuni
Department of Computer Science, Faculty of Mathematics and Natural Science, IPB University
Kampus IPB Dramaga, Jl. Meranti W20 L5, Bogor, Jawa Barat, Indonesia
Email: my_juni04@apps.ipb.ac.id
1. INTRODUCTION
Chicken is a livestock commodity that has a large enough demand so that the broiler industry has a
very high potential for increasing economic growth. Indonesia's market demand for broiler meat in 2020
reached 3,442,558 tons, greater than beef and buffalo with a demand of 269,603.4 tons [1]. The high market
demand for this commodity means that broiler breeders need to improve their production performance. The
research of [2] aims to increase the excellence competitiveness in broiler chicken business by decreasing the
production costs. According to this research, the main component on the production cost structure is feed,
around 70%.
The frequency of feeding and the amount of feed are considered in calculating the production costs.
However, the welfare of broilers also needs to be considered. One indicator of the welfare level can be seen
from the level of broiler mortality. Productivity increases with broiler welfare [3]. There are several problems
related to the welfare of broilers, and one of the main problems is aggressive behavior. Increased aggressiveness
of male broilers causes female broilers to experience injury and stress. Hens that are stressed and injured tend
to be susceptible to disease and infection and even death [4]. The separation of aggressive chickens is a way to
overcome aggressiveness [5]. The decision to feed and select aggressive chickens is made through continuous
observations by experienced breeders. However, this is not practical to do when considering the large
dimensions of the farm, it reduces the attention given to the condition of each chicken and requires a larger
number of workers. The existence of precision livestock farming can help farmers monitor and control livestock
2. Int J Artif Intell ISSN: 2252-8938
Automatic detection of broiler’s feeding and aggressive behavior using you only … (Sri Wahjuni)
105
productivity as well as livestock health and welfare in a continuous, real-time and automated manner [6]. The
precision livestock farming method utilizes various technologies, one of which is image-based. The first step
necessary to determine the feeding decisions, and the selection of aggressive chickens is to detect their feeding
and aggressive behaviors.
Image-based technology using the deep learning method to achieve precise feeding has been applied
by Khairunissa et al. [7] with the intention of detecting the movement of the poultry, with the goal of
recognizing particular poultry habits. The research to detect the movement of birds in a free-range system uses
the single shot multibox detector (SSD) architecture with a pretrained model from the common object in context
(COCO) dataset. The precision of the model to detect the movement of the birds reached 60.4%. The third
version of the you only look once (YOLOv3) object detection architecture included in the deep learning method
has been applied to improve livestock welfare by detecting chicken behavior such as eating (feeding), fighting,
and drinking. The accuracy of the feeding, fighting and drinking detections is 93.10%, 88.67% and 86.88%,
respectively, obtained by the model [8].
In 2020, YOLO produced its fourth version which had an improved performance. In addition,
YOLOv4 was efficiently developed so that conventional graphics processing units (GPUs) could obtain real-
time, high-quality, and promising object detection results [9]. The research of [10] used the YOLOv4
architecture to count pears in real time. A trained model is able to achieve a mean average precision (mAP) on
the test data of above 96%, and the inference speed reaches 37.3 frames per second (fps). With the
aforementioned advantages, YOLOv4 is the best candidate for implementation in this study. The purpose of
this study is to build an effective and efficient deep learning model to detect feeding behavior and
aggressiveness in broilers by applying YOLO v4. Furthermore, it is hoped that the resulting model can be
implemented in a smart coop monitoring system that provides notifications if unexpected conditions occur in
the coop. The rest of this paper is organized. The closely related background areas are presented in section 2;
in section 3 we explain the methods used in this research; and the results obtained are presented in section 4.
The last section wraps up the overall paper and its conclusions.
2. RESEARCH METHOD
The following subsection will provide an overview of the you only look once version 4 (YOLOv4)
algorithm implemented in this research. To provide a brief information on the chicken behaviors that are related
to this research, the next subsection contains a short description of the feeding and aggressive behaviors. The
research steps that guide this work are explained in the last subsection.
2.1. Overview of you only look once object version 4 (YOLOv4)
The YOLOv4 algorithm is the result of the development of the first YOLO version. This algorithm
claimed to be a faster and more accurate state-of-the-art detector but it can be implemented on conventional
GPUs, so it is widely used. Modern detection systems generally have 2 parts, the backbone and the head. The
backbone section extracts features to improve accuracy [11]. The head section is used to predict the final
classification and refine the bounding box [12]. YOLOv4 consists of the backbone: cross-stage partial (CSP)
CSPDarknet53 [13], neck: spatial pyramid pooling (SPP) [14] and path aggregation network (PAN) [15], and
head: YOLOv3. The new terms used in YOLOv4 are bag of freebies (BoF) and bag of specials (BoS). The
BoF in object detection can be interpreted as data augmentations and semantic data distributions that may have
a bias. This method tends to replace the training strategy with only a small increase in inference costs. BoS is
a collection of postprocessing methods and plugin modules that enlarge the receptive field, introduce attention
mechanisms, and strengthen feature integration capabilities; they add a small inference cost but can
significantly increase accuracy. On the backbone, YOLOv4 provides BoF: CutMix [16] and mosaic data
augmentation, DropBlock regularization [17], class label smoothing [18], and BoS: Mish activation [19], CSP
connections and multi input weighted residual connections (MIWRC). In the detector section, YOLOv4
provides BoF: CioU-loss, cross mini-batch normalization (CmBN), DropBlock regularization, mosaic data
augmentation, self-adversarial training, elimination of grid sensitivity, the use of multiple anchors for a single
ground truth, optimal hyperparameters, and random training shapes, as well as BoS: Mish activation, SPP
block, spatial attention module (SAM) block [20], PAN path aggregation block and distance intersection over
union- non-maximum suppression (DioU-NMS).
In optimizing data classifications, YOLOv4 applies class label smoothing, which converts hard labels
into soft labels. Specifically, the one-hot encoded training data (δk,y) are transformed into a combination of the
parameter divided by the number of classes (K) by multiplying the one-hot encoded labeling score minus 1.
The class label smoothing method can be seen in (1).
3. ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 1, March 2024: 104-114
106
𝑞′(𝑘) = (1 − 𝛼) ∗ 𝛿𝑘,𝑦 +
𝛼
𝐾
(1)
This formula can overcome the overfitted model training cases so that the model is more adaptive.
YOLOv4 also adds DropBlock to its model to address the overfitting issue. The DropBlock method removes
continuous regions from the feature map of a layer to reduce neural networks that are too large. The activation
function used in YOLOv4 is a mish activation. Mish is a nonmonotomic function that can be defined in (2).
𝑓(𝑥) = 𝑥. tanh (𝜍(𝑥)) (2)
Functions 𝜍(𝑥) equal to ln(1 + 𝑒𝑥) or a softplus activation. The Mish activation function can
overcome the significantly slowed training caused by the near-zero gradient. On the neck, SPP is applied with
the advantage of allowing the input of images of various sizes. The size of the input image will be transformed
by the SPP into a fixed size so that it can be fed to the classifier. In SPP, multilevel pooling is applied so that
the model remains robust on deformative objects.
2.2. Feeding and aggressive behaviors of broiler chicken
Behavior is derived from the offspring of its predecessors and the impact of the environment on its
genotype. There are some behaviors that persist against environmental changes, which can be said to be a fixed
pattern of action. An ethogram is a behavioral profile, a catalog of the major fixed action patterns of a species
[21]. Chicken behavior is summarized in an ethogram based on [22] and can be seen in Table 1.
Table 1. Chicken feeding behavior ethogram and aggressive behavior [22], [23]
Behavior Definition
Feeding Seen as a chicken swallow food with its head extending to the place to eat
Fights Two chickens face each other, with their necks and heads at the same height and kick
Pecks One chicken raises its head and violently pecks the body of the other chicken
Wing-flapping Chicken wings spread and flap on the side or above the body
Chicken feeding behavior occurs in a cycle, with a tendency to act at certain photoperiods called
diurnal cycles according to [24]. Chickens usually eat at photoperiods of six to eight hours, and the peak usually
occurs in the morning. However, in broiler chickens, the commercial rearing process is exposed to continuous
light so that it has a photoperiod of 24 hours or 23 hours to maximize food intake and growth rates. These data
are based on the statement of [25] referred to by [26]. The feeding intention of broilers is controlled by the
satiety mechanism rather than the starvation mechanism. This causes broilers to spend more time eating than
in other activities, as long as food is still available. Broiler chickens will stop eating when they reach their
maximum physical capacity [27].
Aggression of broiler chickens can be driven by social rank, group size in the coop and hunger. In the
research of [28], the precision feeding method was tested by adjusting the food needs of each broiler based on
body weight. The approach involves building a feeding station in the coop that can only be entered by one
chicken. When the chicken enters, the tool will provide a portion of food based on a certain meal time. When
the feeding time is up, the chicken inside the station is automatically removed. This approach causes the broiler
chicken feeding duration to be short, causing aggressiveness in the chickens. In addition, fluctuations in social
ranking are rare. Social ranking fluctuations are indicated by the frequency of the appearance of aggressive
behavior. When social ranking is stable, aggressive behavior will decrease and is replaced by threat behavior
that tends to be less destructive. However, the larger the group size in a coop, the longer it takes to achieve
social stability. Note that the group size reaches its saturation point at a certain group size. When the density
and group size are too large, the broilers tend to choose to compete for resources, thereby reducing the
frequency of the aggressive behavior [29].
2.3. Research steps
There are five steps that guide this research, they are, data collection, data preprocessing, data division,
model training and model evaluation. These steps can be seen in the general block diagram in Figure 1. Detail
of each step is explained in the following paragraphs.
2.3.1. Data acquisition
Data used in this research were recorded from flocks in the field section of block B poultry unit,
Faculty of Animal Science, IPB University. Data acquisition was performed from 18 August 2021 until
4. Int J Artif Intell ISSN: 2252-8938
Automatic detection of broiler’s feeding and aggressive behavior using you only … (Sri Wahjuni)
107
13 September 2021. The video recording is in h264 format with a size of 1,280×720 pixels using a speed of
25 fps.
Figure 1. Research steps of broiler behavior detection
2.3.2. Data preprocessing
This stage produces the data that are used for model development. The data are obtained from videos
that are converted into a JPG format image file for every single frame. The converted data are selected based
on the object activity that is relevant to the object detection classes. The object detection classes are eaten and
aggressive. The aggressive class is a combination of several behaviors that show aggressive habits, such as
fights, pecks and wing-flapping, as listed in Table 1.
To balance the classes, random augmentation is performed. Data augmentation is an approach to
overcome overfitting from the root of the problem, namely, the training dataset. This augmentation adds
manipulated data to the training dataset to increase its numbers. The addition of these data can be called
oversampling. The augmentation that can be applied is a geometric augmentation, because according to
research by [30], there was a 3% increase in the performance of the CIFAR-10 classification using geometric
augmentation. Random augmentation was performed with a rotation of 1° to 180°, and the result of random
rotation was transformed to a reflection about the y-axis.
2.3.3. Data dividing
The model training method uses the cross-validation k–fold method. Cross validation k-fold is a
method of evaluating and comparing algorithms by dividing K parts of the data in a balanced manner, where
in the K-th iteration, the K data section will be used as validation data and the other data sections will be used
as training data. The application of the k-fold cross validation method is generally for three contexts,
performance estimation, model selection and model parameter setting [31]. The data are divided by a ratio of
80:20, which means that 80% of the dataset will be used for training data, and 20% will be used for test data.
2.3.4. Model training
The model will be trained with the configuration in Table 2. The configuration parameters used are
width x height, subdivision and learning rate. The width × height parameter is the width and height that will
be inputted to the model. The subdivision parameter is the number of fractions of the batch processed by the
GPU in the model building process. The number of images processed in one iteration is referred to as a batch.
The subdivision is the number of batch fractions. In this study, the batch parameter is set to 64. If the
subdivision parameter is 32, the image or data to be processed by the GPU are two images multiplied by 32
parts, and this image is processed in parallel.
Table 2. Model training parameter configuration
Scheme Width × Height Subdivision Learning rate
A 128×128 64 0.001
B 416×416 64 0.001
C 416×416 32 0.01
D*
416×416 32 0.001
*Research scheme D uses the standard configuration by Bochkovskiy et al. [9]
2.3.5. Model evaluation
The detection model in this study will be evaluated using the metrics intersection over union (IoU),
precision, recall and mAP. The IoU metric is the result of dividing the overlap area between the detected
5. ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 1, March 2024: 104-114
108
ground-truth and bounding box with the union area of the two bounding boxes. The IoU formula can be seen
in (3).
𝐼𝑜𝑈 =
𝑎𝑟𝑒𝑎 𝑜𝑓 𝑜𝑣𝑒𝑟𝑙𝑎𝑝
𝑎𝑟𝑒𝑎 𝑜𝑓 𝑢𝑛𝑖𝑜𝑛
(3)
IoU values can be used to express the classification of true positives (TPs), false-positives (FPs), and
false negatives (FNs). The IoU threshold value used for object detection is 50%. The threshold values will be
used to determine TP, FP and FN. If the IoU is more than the threshold, then it is classified as TP. If the IoU
is less than the threshold, it is classified as FP. Classification FN is if the IoU is equal to 0 [32].
This classification is useful for finding the precision and recall values. The precision value is a
measure to show the model's ability to identify relevant objects according to the object detection results. The
recall value is a measure to show the model's ability to find objects that match the ground truth. If defined in a
formula, Precision (Pr) and Recall (Rc) can be calculated in (4) and (5). In (4) and (5), it is assumed that in the
dataset, there are G ground truths, and the model produces N bounding box predictions. In the prediction results,
there are S bounding boxes that successfully predict the ground truths.
𝑃𝑟 =
∑ 𝑇𝑃𝑛
𝑆
𝑛=1
∑ 𝑇𝑃𝑛+∑ 𝐹𝑃𝑛
𝑁−𝑆
𝑛=1
𝑆
𝑛=1
=
∑ 𝑇𝑃𝑛
𝑆
𝑛=1
𝑠𝑒𝑚𝑢𝑎 𝑑𝑒𝑡𝑒𝑘𝑠𝑖
(4)
𝑅𝑐 =
∑ 𝑇𝑃𝑛
𝑆
𝑛=1
∑ 𝑇𝑃𝑛+∑ 𝐹𝑁𝑛
𝐺−𝑆
𝑛=1
𝑆
𝑛=1
=
∑ 𝑇𝑃𝑛
𝑆
𝑛=1
𝑠𝑒𝑚𝑢𝑎 𝑔𝑟𝑜𝑢𝑛𝑑 𝑡𝑟𝑢𝑡ℎ𝑠
(5)
The average precision (AP) metric is the value of the area under the curve between Pr and Rc. This
curve summarizes the trade-off between precision and recall determined by the confidence level of the
bounding box. The detection model can be said to be good when the level of confidence decreases, and the
precision and recall remain high. The AP formula can be seen in (6).
𝐴𝑃 =
1
𝑁
∑ 𝑃𝑟𝑖𝑛𝑡𝑒𝑟𝑝(𝑅𝑟(𝑛))
𝑁
𝑛=1 (6)
In (6), 𝑃𝑟𝑖𝑛𝑡𝑒𝑟𝑝is generated from the precision and recall graph that has been interpolated because the
graph is still in monotonic form. The value 𝑅𝑟(𝑛)is the recall value in the interpolation of N points. The formula
𝑅𝑟(𝑛)can be seen in (7).
𝑅𝑟(𝑛) =
𝑁−𝑛
𝑁−1
𝑛 = 1, 2, … , 𝑁 (7)
The AP scores are obtained in individual classes. To find the whole class, we need to calculate the
mAP. The mAP formula can be seen in (8). The value 𝐴𝑃𝑖is the average precision value in the i-th class, and C
is the total existing class.
𝑚𝐴𝑃 =
1
𝐶
∑ 𝐴𝑃𝑖
𝐶
𝑖=1 (8)
3. RESULTS AND DISCUSSION
3.1. Data preprocessing
125,893 images are obtained from the conversion. The images are annotated in the form of a bounding
box along with a class label. From the total converted images, selections need to be made because there are
frames that do not show any relevance to the class to be detected. A total of 4,711 images were used for
annotation. The images are annotated in the form of a bounding box along with a class label. Image annotation
was performed using LabelImg version 1.8.1. In Figure 2, an example of the LabelImg display in the annotation
process is shown. The aggressive class is a combination of behaviors derived from aggressive habits because
the specific behavior of the aggressive habits shows a small frequency. Chickens are fed ad libitum, and the
availability of feed in the coops is sufficient for all the chickens so that it does not cause a significant frequency
of aggressive behavior due to lack of competition [28]. Even though the aggressive class has been combined
with behavior, the number of bounding box annotations is still smaller than the eating behavior. The bounding
box annotations before augmentation were 7,857 boxes with eating labels and 739 boxes with aggressive labels.
The YOLO bounding box format used can be seen from the data pieces in Table 3. Figure 3 shows an example
of the annotation results from each class. Figure 3(a) shows an example of annotation result for Feeding class,
6. Int J Artif Intell ISSN: 2252-8938
Automatic detection of broiler’s feeding and aggressive behavior using you only … (Sri Wahjuni)
109
Figure 3(b) for Fight class, Figure 3(c) for Peck class, and Figure 3(d) for Wing-Flapping class. The
classification follows [22] and [23]. In this research, due to limited data, class Fight, Peck and Wing-Flapping
are grouped into one class, that is Aggressive class.
Figure 2. LabelImg window on the annotation process
Table 3. Sample data with YOLO bounding box format
Image name c X Y h w
video_01_09_21….h2646 1 0.551172 0.284722 0.107031 0.258330
video_01_09_21….h26419 1 0.551953 0.282639 0.102344 0.237500
video_01_09_21….h26442 1 0.572656 0.645833 0.129688 0.175000
video_01_09_21….h26442 1 0.762109 0.554167 0.094531 0.211111
with:
Image name: Annotated file/image name
c: class of bounding box annotation with 1 as “eat” and 0 as “aggressive”
X: center coordinate of the bounding box on the X axis
Y: center coordinate of the bounding box on the Y. axis
h: width of the bounding box
w: height of the bounding box
The X, Y, h and w values are floats because they are the ratio of the width and height of the image.
Therefore, they can practically change the size of the architecture of the input image for the network. This
makes it easy to adjust to data availability.
(a) (b) (c) (d)
Figure 3. Feeding, (a) feeding, (b) fight, (c) pecks, and (d) wing-flapping dataset annotations
To balance between the classes, the classes with small occurrence frequencies will be augmented, and
those with large occurrences will be deleted until the number is close to the other classes. Images that have the
aggressive class will be augmented. For images that have two concurrent classes (aggressive class and eating
class), the feeding class will be set aside before being augmented. The aggressive class is added as much as the
7. ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 1, March 2024: 104-114
110
image needs to balance according to the average class appearance across the image. Next, the training data and
test data were distributed randomly, with the number of bounding boxes listed in Table 4.
Table 4. Number of bounding boxes of training and test data
Class name Training data Test data
Eat 823 222
Aggressive 686 167
3.2. Model training
The model training was implemented using a laptop with an AMD Ryzen 5 3550H CPU with Radeon
Vega Mobile Gfx (8 Core), 8 GB RAM, connected to Google Collaboratory using a 12 GB Nvidia K80 GPU
on its backend server. Prior to training, the training data and validation data are uploaded to the Roboflow web
application. The data already stored in the web application are exported and used in the Google Collaboratory
notebook file.
Figure 4 shows a graph of each training model. The blue line (the lower line) shows the loss value for
each iteration, and the red line (the upper line) shows the mAP value. Each subfigure using configuration as
listed in Table 3. A graphic comparison between Scheme A (Figure 4(a)) and Scheme B (Figure 4(b)), with
different input sizes of 128×128 and 416×416, shows that Scheme B, with a larger input size, supports the
model for faster convergence. The loss value at size 128×128 experiences greater oscillation. In addition,
Scheme A is overfitting in iterations above 4,500 because the loss value has increased from before. A
comparison of the graph between Scheme B (Figure 4(b)) and Scheme D (Figure 4(c)) when wanting to
compare the effect of subdivision on training, shows that the loss curve does not show a significant difference.
This shows that the subdivision parameters do not affect the training performance. However, it should be noted
that the subdivision is the number of data fragments that will be entered into the GPU process; the smaller the
subdivision value is, the more GPU memory will be used. Changes in the subdivision parameters will be
relevant if the research uses a conventional GPU. A comparison of Scheme D (Figure 4(c)) and Scheme C
(Figure 4(d)) when looking at the effect of the learning rate on the training performance shows that Scheme D
with a smaller learning rate can converge more quickly. The average loss value is below 0.5 in 3,500 iterations
in Scheme D, while in Scheme C, the average loss value is below 0.5 in 4,000 iterations. During model training,
a graph is generated between the loss value and the number of iterations and the mAP value after the 1,000th
iteration. Model training is carried out until the 5,000th iteration. Samples were taken at the first fold in each
model to compare the training performance.
3.3. Model evaluation
Table 5 shows the training results of each model and the five folds. Of the four training schemes, the
largest mAP value reached 99.69% resulting from the input configuration of 416×416, subdivision of 32, and
learning rate of 0.001 (Scheme D). The mAP value of this model is obtained from the results of the 4-fold
average of the eating and aggressive mAP values in the scheme. While the smallest mAP value is generated
from the 128×128 input configuration, the subdivision is 64, and the learning rate is 0.001 (Scheme A). In
scheme A, the highest mAP model value is 73.95%. The size of the input is the most significant factor in the
performance of the object detection. This is related to the purpose of YOLOv4 and the use of CSPDarknet53
as a backbone to increase the receptive area so that the architecture can detect more accurately. The larger the
input image size is, the better the object detection, especially against small targets [33].
The subdivision parameter has no significant effect on the object detection performance. When
compared, Scheme B and Scheme D, which have the same input size and learning rate but different
subdivisions, give the results of the mAP model value with a difference of 0.02%. This is in accordance with
the statement of [9] that the mini-batch size or the division between batches and subdivisions does not have a
significant effect on the object detection performance and only affects the estimated training time. The results
in Table 5 also show that the learning rate parameter does not provide a significant change in performance in
this research. This is shown by schemes C and D, which only have a slight difference in the mAP model value.
An example of the model detection results of the four schemes can be seen in Figure 5. Each subfigure shows
the example of model detection result for each scheme as stated in Table 3. The green box indicates the
bounding box of the ground truth, while the blue box indicates the bounding box of the prediction results. In
Figure 5(a), which uses small size image (128×128), there is no prediction result bounding box. The prediction
result bounding box appears in Figure 5(b), Figure 5(c) and Figure 5(d), which use image size of 416×416.
Figure 5(a) is different from Figure 5(b) in the image size, while the Figure 5(c) is different from Figure 5(d)
in the learning rate.
8. Int J Artif Intell ISSN: 2252-8938
Automatic detection of broiler’s feeding and aggressive behavior using you only … (Sri Wahjuni)
111
(a) (b)
(c) (d)
Figure 4. Loss and iteration graph of first fold model training for, (a) Scheme A: 128×128–64–0.001,
(b) Scheme B: 416×416–64–0.001, (c) Scheme D: 416×416–32–0.001, and (d) Scheme C: 416×416–32–0.01
Table 5. Modeling results with 5-fold cross validation
Scheme Fold mAP of Behavior mAPModel A-IoU
Aggressive Feeding
A 1 71.68% 76.23% 73.95% 31.83%
2 65.92 72.83% 69.38% 36.16%
3 62.14% 72.93% 67.54% 35.91%
4 66.55% 75.11% 70.83% 36.24%
5 65.49% 74.96% 70.23% 36.00%
B 1 98.09% 98.74% 98.41% 84.18%
2 99.40% 99.92% 99.66% 84.90%
3 99.40% 99.95% 99.67% 82.97%
4 99.42% 97.83% 98.63% 83.94%
5 96.83% 98.91% 97.87% 81.86%
C 1 99.16% 99.16% 99.16% 79.39%
2 97.79% 99.46% 98.63% 80.05%
3 99.40% 99.94% 99.67% 83.41%
4 98.20% 99.96% 99.08% 86.32%
5 99.40% 99.91% 99.66% 84.26%
D 1 98.52% 98.76% 98.64% 85.58%
2 98.63% 98.79% 98.71% 79.93%
3 99.44% 98.43% 98.93% 83.76%
4 99.39% 99.98% 99.69% 81.52%
5 99.40% 99.97% 99.69% 83.41%
9. ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 1, March 2024: 104-114
112
(a) (b)
(c) (d)
Figure 5. Bounding box comparison between the ground truth and model prediction for, (a) Scheme A:
128×128–64–0.001, (b) Scheme B: 416×416–64–0.001, (c) Scheme C: 416×416–32–0.01 and (d) Scheme D:
416×416–32–0.001
4. CONCLUSION
This research was successful in developing a model for detecting the feeding and aggressive behavior
of broiler chickens using YOLOv4. In model training with a 128×128–64 subdivision –0.001 learning rate
scheme, the highest mAP was 71.68% and 76.23% for aggressive and feeding behavior, respectively. The
model trained with a 416×416–64 subdivision –0.001 learning rate scheme obtained a higher mAP than the
previous scheme. In this scheme, the highest mAP for the aggressive behavior was 99.40%, and the highest
mAP for the feeding behavior was 99.95%. The third scheme trained the model using the 416×416–32
subdivisions –0.01 learning rate parameters. This scheme produced the highest mAP of 99,40% for aggressive
behavior and 99.94 for feeding behavior. The last scheme used a parameter value of 416×416–32 subdivisions
–a 0.001. The learning rate reached 99.39% as the highest mAP of the aggressive behavior and 99.98% for the
feeding behavior. Scheme C produced the highest average IoU (A-IoU), with similar mAP values for both
behaviors. This study shows that the size of the image has a significant effect on the mAP value. However, the
effect of the subdivision parameter values and the learning rate still needs to be studied more deeply.
ACKNOWLEDGEMENTS
The authors would like to thank The Department of Computer Science, IPB University for facilitating
the work. We also thank to The Faculty of Animal Science, IPB University for the field facility.
REFERENCES
[1] M. Yuwono, “Farm in numbers 2022,” Central Bureau of Statistics, pp. 1–121, 2022.
[2] S. Rahardjo, M. P. Hutagaol, and A. Sukmawati, “Strategy to growth an excellence competitiveness (A case study : Poultry company
in Indonesia),” International Journal of Scientific and Research Publications, vol. 7, no. 11, pp. 593–598, 2017.
[3] S. Vetter, L. Vasa, and L. Ózsvári, “Economic aspects of animal welfare,” Acta Polytechnica Hungarica, vol. 11, no. 7,
pp. 119–134, 2014, doi: 10.12700/aph.11.07.2014.07.8.
[4] S. T. Millman, “The animal welfare dilemma of broiler breeder aggressiveness,” Poult. Perspect. Newsl. Coll. Agric. Nat. Resour.,
vol. 4, no. 1, pp. 1–6, 2002.
[5] S. A. Queiroz and V. U. Cromberg, “Aggressive behavior in the genus Gallus sp,” Revista Brasileira de Ciencia Avicola, vol. 8,
no. 1, pp. 1–14, 2006, doi: 10.1590/S1516-635X2006000100001.
[6] J. Schillings, R. Bennett, and D. C. Rose, “Exploring the potential of precision livestock farming technologies to help address farm
animal welfare,” Frontiers in Animal Science, vol. 2, 2021, doi: 10.3389/fanim.2021.639678.
[7] J. Khairunissa, S. Wahjuni, I. R. H. Soesanto, and W. Wulandari, “Detecting poultry movement for poultry behavioral analysis
using the multi-object tracking (MOT) algorithm,” Proceedings of the 8th International Conference on Computer and
Communication Engineering, ICCCE 2021, pp. 265–268, 2021, doi: 10.1109/ICCCE50029.2021.9467144.
[8] J. Wang, N. Wang, L. Li, and Z. Ren, “Real-time behavior detection and judgment of egg breeders based on YOLO v3,” Neural
Computing and Applications, vol. 32, no. 10, pp. 5471–5481, 2020, doi: 10.1007/s00521-019-04645-4.
10. Int J Artif Intell ISSN: 2252-8938
Automatic detection of broiler’s feeding and aggressive behavior using you only … (Sri Wahjuni)
113
[9] A. Bochkovskiy, C.-Y. Wang, and H.-Y. M. Liao, “YOLOv4: optimal speed and accuracy of object detection,” arXiv > Computer
Science > Computer Vision and Pattern Recognition, 2020, doi: 10.48550/arXiv.2004.10934.
[10] A. I. B. Parico and T. Ahamed, “Real time pear fruit detection and counting using yolov4 models and deep sort,” Sensors, vol. 21,
no. 14, 2021, doi: 10.3390/s21144803.
[11] Y. Chen, T. Yang, X. Zhang, G. Meng, X. Xiao, and J. Sun, “DetNAS: Backbone search for object detection,” Advances in Neural
Information Processing Systems, vol. 32, 2019.
[12] J. Guo et al., “Hit-detector: Hierarchical trinity architecture search for object detection,” Proceedings of the IEEE Computer Society
Conference on Computer Vision and Pattern Recognition, pp. 11402–11411, 2020, doi: 10.1109/CVPR42600.2020.01142.
[13] C. Y. Wang, H. Y. Mark Liao, Y. H. Wu, P. Y. Chen, J. W. Hsieh, and I. H. Yeh, “CSPNet: A new backbone that can enhance
learning capability of CNN,” IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops,
vol. 2020-June, pp. 1571–1580, 2020, doi: 10.1109/CVPRW50498.2020.00203.
[14] K. He, X. Zhang, S. Ren, and J. Sun, “Spatial pyramid pooling in deep convolutional networks for visual recognition,” Lecture
Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 8691 LNCS, no. PART 3, pp. 346–361, 2014, doi: 10.1007/978-3-319-10578-9_23.
[15] S. Liu, L. Qi, H. Qin, J. Shi, and J. Jia, “PANet: path aggregation network for instance segmentation,” in 2018 IEEE/CVF Conference
on Computer Vision and Pattern Recognition, Jun. 2019, pp. 8759–8768, doi: 10.1109/cvpr.2018.00913.
[16] S. Yun, D. Han, S. Chun, S. J. Oh, J. Choe, and Y. Yoo, “CutMix: Regularization strategy to train strong classifiers with localizable
features,” Proceedings of the IEEE International Conference on Computer Vision, vol. 2019-October, pp. 6022–6031, 2019,
doi: 10.1109/ICCV.2019.00612.
[17] G. Ghiasi, T. Y. Lin, and Q. V. Le, “Dropblock: A regularization method for convolutional networks,” Advances in Neural
Information Processing Systems, vol. 2018-December, pp. 10727–10737, 2018.
[18] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the Inception Architecture for Computer Vision,” in
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Jun. 2016, vol. 2016-Decem,
pp. 2818–2826, doi: 10.1109/CVPR.2016.308.
[19] D. Misra, “Mish: A self regularized non-monotonic activation function,” arXiv > Computer Science > Machine Learning, 2019,
doi: 10.48550/arXiv.1908.08681.
[20] S. Woo, J. Park, J.-Y. Lee, and I. S. Kweon, “CBAM: convolutional block attention module,” in Proceedings of the European
conference on computer vision (ECCV), 2018, pp. 3–19, doi: 10.1007/978-3-030-01234-2_1.
[21] I. J. H. Duncan, “The ethogram of the domesticated hen,” The Laying Hen and its Environment, pp. 5–18, 1980, doi: 10.1007/978-
94-009-8922-1_2.
[22] A. B. Webster and J. F. Hurnik, “An ethogram of white leghorn-type hens in battery cages,” Canadian Journal of Animal Science,
vol. 70, no. 3, pp. 751–760, 1990, doi: 10.4141/cjas90-094.
[23] S. McGary, I. Estevez, and E. Russek-Cohen, “Reproductive and aggressive behavior in male broiler breeders with varying fertility
levels,” Applied Animal Behaviour Science, vol. 82, no. 1, pp. 29–44, 2003, doi: 10.1016/S0168-1591(03)00038-8.
[24] C. J. Savory and B. O. Hughes, “Behaviour and welfare,” British Poultry Science, vol. 51, no. SUPPL. 1, pp. 13–22, 2010,
doi: 10.1080/00071668.2010.506762.
[25] P. D. Lewis and R. M. Gous, “Broilers perform better on short or step-up photoperiods,” South African Journal of Animal Science,
vol. 37, no. 2, pp. 90–96, 2007, doi: 10.4314/sajas.v37i2.4032.
[26] I. Rodrigues and M. Choct, “Feed intake pattern of broiler chickens under intermittent lighting: Do birds eat in the dark?,” Animal
Nutrition, vol. 5, no. 2, pp. 174–178, 2019, doi: 10.1016/j.aninu.2018.12.002.
[27] E. A. M. Bokkers and P. Koene, “Eating behaviour, and preprandial and postprandial correlations in male broiler and layer
chickens,” British Poultry Science, vol. 44, no. 4, pp. 538–544, 2003, doi: 10.1080/00071660310001616165.
[28] T. E. Girard, M. J. Zuidhof, and C. J. Bench, “Aggression and social rank fluctuations in precision-fed and skip-a-day-fed broiler
breeder pullets,” Applied Animal Behaviour Science, vol. 187, pp. 38–44, 2017, doi: 10.1016/j.applanim.2016.12.005.
[29] I. Estevez, R. C. Newberry, and L. J. Keeling, “Dynamics of aggression in the domestic fowl,” Applied Animal Behaviour Science,
vol. 76, no. 4, pp. 307–325, 2002, doi: 10.1016/S0168-1591(02)00013-8.
[30] C. Shorten and T. M. Khoshgoftaar, “A survey on image data augmentation for deep learning,” Journal of Big Data, vol. 6, no. 1,
2019, doi: 10.1186/s40537-019-0197-0.
[31] P. Refaeilzadeh, L. Tang, and H. Liu, “Cross-validation,” Encyclopedia of Database Systems, pp. 532–538, 2009, doi: 10.1007/978-
0-387-39940-9_565.
[32] R. Padilla, W. L. Passos, T. L. B. Dias, S. L. Netto, and E. A. B. Da Silva, “A comparative analysis of object detection metrics with
a companion open-source toolkit,” Electronics (Switzerland), vol. 10, no. 3, pp. 1–28, 2021, doi: 10.3390/electronics10030279.
[33] H. Feng, G. Mu, S. Zhong, P. Zhang, and T. Yuan, “Benchmark analysis of YOLO performance on edge intelligence devices,”
Cryptography, vol. 6, no. 2, 2022, doi: 10.3390/cryptography6020016.
BIOGRAPHIES OF AUTHORS
Sri Wahjuni is a member of the Division of Computer Systems and Networks
as well being on the teaching staff at the Department of Computer Science IPB University;
she obtained a bachelor's degree from the Sepuluh Nopember Institute of Technology (ITS)
as well as a master's and doctoral degree from the University of Indonesia. Her research fields
include embedded systems, heterogeneous networks and the Internet of Things. She is a
member of the Institute of Electrical and Electronics Engineers (IEEE) and the International
Association of Engineers (IAENG). She can be contacted at email:
my_juni04@apps.ipb.ac.id.
11. ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 1, March 2024: 104-114
114
Wulandari received the M. Agr.Sc degree (Master of Agricultural Science) in
the Division of Environmental Science and Engineering, Graduate School of Agriculture,
Kyoto University, Japan. She has been a computer science lecturer in the Department of
Computer Science, IPB University, Bogor, Indonesia, since 2017. In addition, she is serving
as the head of the Internet of Things for Smart Urban Farming Laboratory (ISurf) (2019–
present). Her research interests are in image processing, machine learning, the Internet of
Things, and biosensing engineering. She is a member of the Japan Society of Agriculture
Machinery (JSAM), International Association of Engineers (IAENG), and the Institute of
Electrical and Electronics Engineers (IEEE). She can be contacted at email:
wulandari.ilkom@apps.ipb.ac.id.
Rafael Tektano Grandiawan Eknanda holds a Bachelor of Computer Science
Engineering (B.Comp.) from the Department of Computer Science, IPB University, Bogor,
Indonesia. His research areas of interest include machine learning and image processing. He
can be contacted at email: rafael_28@apps.ipb.ac.id.
Iman Rahayu Hidayati Susanto is a professor and head of the Poultry
Production Division at the Department of Animal Production Science and Technology, IPB
University; she obtained a bachelor's degree from IPB, a master's degree from Padjadjaran
University and a doctoral degree from Universiti Putera Malaysia; Her research fields include
production, nutrition and the processing of poultry products, poultry functional food based
on patent acquisition (omega eggs and low cholesterol carcass), behavioral applications,
poultry farming (breed and local) and the use of IoT in poultry. She can be contacted at email:
imanso@apps.ipb.ac.id.
Auriza Rahmad Akbar holds a Bachelor of Computer Science (BCS), Master
of Computer Science (MCS), in addition to several professional certificates and skills. He is
currently lecturing with the Department of Computer Science at Institut Pertanian Bogor,
Indonesia. His research areas of interest include Computer Networks, Parallel Processing,
and the Internet of Things (IoT). He can be contacted at email: auriza@apps.ipb.ac.id.