Leaf recognition algorithm using support vector machine with Hu moments and local binary patterns

Author(s):  
Marko Lukic ◽  
Eva Tuba ◽  
Milan Tuba
2020 ◽  
Author(s):  
Harith Al-Sahaf ◽  
Mengjie Zhang ◽  
M Johnston

In machine learning, it is common to require a large number of instances to train a model for classification. In many cases, it is hard or expensive to acquire a large number of instances. In this paper, we propose a novel genetic programming (GP) based method to the problem of automatic image classification via adopting a one-shot learning approach. The proposed method relies on the combination of GP and Local Binary Patterns (LBP) techniques to detect a predefined number of informative regions that aim at maximising the between-class scatter and minimising the within-class scatter. Moreover, the proposed method uses only two instances of each class to evolve a classifier. To test the effectiveness of the proposed method, four different texture data sets are used and the performance is compared against two other GP-based methods namely Conventional GP and Two-tier GP. The experiments revealed that the proposed method outperforms these two methods on all the data sets. Moreover, a better performance has been achieved by Naïve Bayes, Support Vector Machine, and Decision Trees (J48) methods when extracted features by the proposed method have been used compared to the use of domain-specific and Two-tier GP extracted features. © Springer International Publishing 2013.


Symmetry ◽  
2019 ◽  
Vol 11 (3) ◽  
pp. 380 ◽  
Author(s):  
Kai Ye

When identifying the key features of the network intrusion signal based on the GA-RBF algorithm (using the genetic algorithm to optimize the radial basis) to identify the key features of the network intrusion signal, the pre-processing process of the network intrusion signal data is neglected, resulting in an increase in network signal data noise, reducing the accuracy of key feature recognition. Therefore, a key feature recognition algorithm for network intrusion signals based on neural network and support vector machine is proposed. The principal component neural network (PCNN) is used to extract the characteristics of the network intrusion signal and the support vector machine multi-classifier is constructed. The feature extraction result is input into the support vector machine classifier. Combined with PCNN and SVM (Support Vector Machine) algorithms, the key features of network intrusion signals are identified. The experimental results show that the algorithm has the advantages of high precision, low false positive rate and the recognition time of key features of R2L (it is a common way of network intrusion attack) data set is only 3.18 ms.


2014 ◽  
Vol 496-500 ◽  
pp. 1873-1876
Author(s):  
He Zhang ◽  
Jie Li ◽  
Bei Bei Xu

To improve the performance of automatic target recognition technology and solve the problems of traditional methods, such as high false alarm rate and poor adaptability to environment changes, a new algorithm based on support vector machine is proposed. We have realized the feature extraction of the target and the parameter optimization of the support vector machine to get the support vector machine model applied to the target recognition of unknown images. Experiment results show that the algorithm has a good recognition effect, a fast recognition speed and certain anti-interference abilities based on sufficient samples training.


Author(s):  
Li Zhang

At present, Internet data is the world’s largest data resource database. In order to realize fast and automatic intelligent classification, it is of great significance to develop automatic classification of public security intelligent data systems. This paper studies the actual needs of public security information text classification, analyzes the text automatic classification technology support vector machine (SVM) theory and designs and implements SVM-based public security information, and also realizes the classification system of public security information. Automatic classification provides support for subsequent text mining systems and text searches and designs the performance of the system. After optimization and testing, the system was found to have good practical application results.


Sign in / Sign up

Export Citation Format

Share Document