scholarly journals Poisonous Shrimp Detection System for Litopenaeus Vannamei using k-Nearest Neighbor Method

Author(s):  
Abdullah Husin ◽  
Othman Mahmod ◽  
Lisa Afrinanda

One of the important seafoods in the food consumption of humans is shrimp. Although shrimp contains proteins that are needed by the human body, sometimes it contains toxins. This is due to environmental factors or catching processes that may use toxins. Therefore, the community should take precautions when consuming shrimp. White shrimp (Litopenaeus vannamei) is one type of shrimp that is preferred because of its delicious taste. The purpose of this research is to develop a computerized system for poisonous white shrimp detection. The category of white shrimps consists of two kinds, i.e., fresh white shrimps that are caught in a natural way (class A), and poisonous white shrimps that are caught by using toxin (class B). The features used are RGB colors (red, green, and blue) and texture (energy, contrast, correlation, and homogeneity). A similarity-based classification is performed by the k-Nearest Neighbor (k-NN) algorithm. The experiment was conducted on a dataset consisting of 90 white shrimp images. The holdout validation method was used to evaluate the system. The original dataset was divided into two parts, whereby 60 images were used as training samples and 30 images were used as testing images. Based on the evaluation results, it can be concluded that the classification accuracy is 73.33%. The benefit of the developed system is to help the community in selecting good and safe white shrimps.

Author(s):  
S. Vijaya Rani ◽  
G. N. K. Suresh Babu

The illegal hackers  penetrate the servers and networks of corporate and financial institutions to gain money and extract vital information. The hacking varies from one computing system to many system. They gain access by sending malicious packets in the network through virus, worms, Trojan horses etc. The hackers scan a network through various tools and collect information of network and host. Hence it is very much essential to detect the attacks as they enter into a network. The methods  available for intrusion detection are Naive Bayes, Decision tree, Support Vector Machine, K-Nearest Neighbor, Artificial Neural Networks. A neural network consists of processing units in complex manner and able to store information and make it functional for use. It acts like human brain and takes knowledge from the environment through training and learning process. Many algorithms are available for learning process This work carry out research on analysis of malicious packets and predicting the error rate in detection of injured packets through artificial neural network algorithms.


Author(s):  
M. Ilayaraja ◽  
S. Hemalatha ◽  
P. Manickam ◽  
K. Sathesh Kumar ◽  
K. Shankar

Cloud computing is characterized as the arrangement of assets or administrations accessible through the web to the clients on their request by cloud providers. It communicates everything as administrations over the web in view of the client request, for example operating system, organize equipment, storage, assets, and software. Nowadays, Intrusion Detection System (IDS) plays a powerful system, which deals with the influence of experts to get actions when the system is hacked under some intrusions. Most intrusion detection frameworks are created in light of machine learning strategies. Since the datasets, this utilized as a part of intrusion detection is Knowledge Discovery in Database (KDD). In this paper detect or classify the intruded data utilizing Machine Learning (ML) with the MapReduce model. The primary face considers Hadoop MapReduce model to reduce the extent of database ideal weight decided for reducer model and second stage utilizing Decision Tree (DT) classifier to detect the data. This DT classifier comprises utilizing an appropriate classifier to decide the class labels for the non-homogeneous leaf nodes. The decision tree fragment gives a coarse section profile while the leaf level classifier can give data about the qualities that influence the label inside a portion. From the proposed result accuracy for detection is 96.21% contrasted with existing classifiers, for example, Neural Network (NN), Naive Bayes (NB) and K Nearest Neighbor (KNN).


Author(s):  
Aishwarya Priyadarshini ◽  
Sanhita Mishra ◽  
Debani Prasad Mishra ◽  
Surender Reddy Salkuti ◽  
Ramakanta Mohanty

<p>Nowadays, fraudulent or deceitful activities associated with financial transactions, predominantly using credit cards have been increasing at an alarming rate and are one of the most prevalent activities in finance industries, corporate companies, and other government organizations. It is therefore essential to incorporate a fraud detection system that mainly consists of intelligent fraud detection techniques to keep in view the consumer and clients’ welfare alike. Numerous fraud detection procedures, techniques, and systems in literature have been implemented by employing a myriad of intelligent techniques including algorithms and frameworks to detect fraudulent and deceitful transactions. This paper initially analyses the data through exploratory data analysis and then proposes various classification models that are implemented using intelligent soft computing techniques to predictively classify fraudulent credit card transactions. Classification algorithms such as K-Nearest neighbor (K-NN), decision tree, random forest (RF), and logistic regression (LR) have been implemented to critically evaluate their performances. The proposed model is computationally efficient, light-weight and can be used for credit card fraudulent transaction detection with better accuracy.</p>


2019 ◽  
Vol 2019 ◽  
pp. 1-7 ◽  
Author(s):  
Sheng-wei Fei

Fault diagnosis of bearing based on variational mode decomposition (VMD)-phase space reconstruction (PSR)-singular value decomposition (SVD) and improved binary particle swarm optimization (IBPSO)-K-nearest neighbor (KNN) which is abbreviated as VPS-IBPSOKNN is presented in this study, among which VMD-PSR-SVD (VPS) is presented to obtain the features of the bearing vibration signal (BVS), and IBPSO is presented to select the parameter K of KNN. In IBPSO, the calculation of the next position of each particle is improved to fit the evolution of the particles. The traditional KNN with different parameter K and trained by the training samples with the features based on VMD-SVD (VS-KNN) can be used to compare with the proposed VPS-IBPSOKNN method. The experimental result demonstrates that fault diagnosis ability of bearing of VPS-IBPSOKNN is better than that of VS-KNN, and it can be concluded that fault diagnosis of bearing based on VPS-IBPSOKNN is effective.


Author(s):  
Faisal Dharma Adhinata ◽  
Diovianto Putra Rakhmadani ◽  
Danur Wijayanto

Background: The COVID-19 pandemic has made people spend more time on online meetings more than ever. The prolonged time looking at the monitor may cause fatigue, which can subsequently impact the mental and physical health. A fatigue detection system is needed to monitor the Internet users well-being. Previous research related to the fatigue detection system used a fuzzy system, but the accuracy was below 85%. In this research, machine learning is used to improve accuracy.Objective: This research examines the combination of the FaceNet algorithm with either k-nearest neighbor (K-NN) or multiclass support vector machine (SVM) to improve the accuracy.Methods: In this study, we used the UTA-RLDD dataset. The features used for fatigue detection come from the face, so the dataset is segmented using the Haar Cascades method, which is then resized. The feature extraction process uses FaceNet's pre-trained algorithm. The extracted features are classified into three classes—focused, unfocused, and fatigue—using the K-NN or multiclass SVM method.Results: The combination between the FaceNet algorithm and K-NN, with a value of  resulted in a better accuracy than the FaceNet algorithm with multiclass SVM with the polynomial kernel (at 94.68% and 89.87% respectively). The processing speed of both combinations of methods has allowed for real-time data processing.Conclusion: This research provides an overview of methods for early fatigue detection while working at the computer so that we can limit staring at the computer screen too long and switch places to maintain the health of our eyes. 


2017 ◽  
Vol 6 (2) ◽  
pp. 113
Author(s):  
Taftyani Yusuf Prahudaya ◽  
Agus Harjoko

Guava (Psidium guajava L.) is a fruit that has many health benefits. Guava also has commercial value in Indonesia and has a large market share. This indicates that the commodity of guava has been consumed by society extensively. This time the sorting process is still done manually which still has many shortcomings. This classification gives the classification results are less accurate and inconsistent due to the carelessness of humans. Grading process in the marketing sector is essential. Improper grading potentially detrimental to farmers because all the fruit quality were priced the same. Therefore, we need a consistent classification system.The system uses image processing to extract the color and texture features of guava. As a quality classification KNN method (K-Nearest Neighbor) is used. This system will classify guava into four quality classes, namely the super class, class A, class B, and external quality. KNN designed with input 7 features extraction which is the average value of RGB (Red, Green, and Blue), total defect area, and the GLCM value (entropy, homogeneity, and contrast) with the 4 outputs of quality. From the test results showed that the classification method is able to classify the quality of guava. The highest accuracy is obtained in testing K = 3 with 91.25% accuracy rate.


Information ◽  
2021 ◽  
Vol 12 (10) ◽  
pp. 397
Author(s):  
Yan Zhang ◽  
Shiyun Wa ◽  
Pengshuo Sun ◽  
Yaojun Wang

To address the current situation, in which pear defect detection is still based on a workforce with low efficiency, we propose the use of the CNN model to detect pear defects. Since it is challenging to obtain defect images in the implementation process, a deep convolutional adversarial generation network was used to augment the defect images. As the experimental results indicated, the detection accuracy of the proposed method on the 3000 validation set was as high as 97.35%. Variant mainstream CNNs were compared to evaluate the model’s performance thoroughly, and the top performer was selected to conduct further comparative experiments with traditional machine learning methods, such as support vector machine algorithm, random forest algorithm, and k-nearest neighbor clustering algorithm. Moreover, the other two varieties of pears that have not been trained were chosen to validate the robustness and generalization capability of the model. The validation results illustrated that the proposed method is more accurate than the commonly used algorithms for pear defect detection. It is robust enough to be generalized well to other datasets. In order to allow the method proposed in this paper to be applied in agriculture, an intelligent pear defect detection system was built based on an iOS device.


Author(s):  
Md Nasim Khan ◽  
Mohamed M. Ahmed

Snowfall negatively affects pavement and visibility conditions, making it one of the major causes of motor vehicle crashes in winter weather. Therefore, providing drivers with real-time roadway weather information during adverse weather is crucial for safe driving. Although road weather stations can provide weather information, these stations are expensive and often do not represent real-time trajectory-level weather information. The main motivation of this study was to develop an affordable in-vehicle snow detection system which can provide trajectory-level weather information in real time. The system utilized SHRP2 Naturalistic Driving Study video data and was based on machine learning techniques. To train the snow detection models, two texture-based image features including gray level co-occurrence matrix (GLCM) and local binary pattern (LBP), and three classification algorithms: support vector machine (SVM), k-nearest neighbor (K-NN), and random forest (RF) were used. The analysis was done on an image dataset consisting of three weather conditions: clear, light snow, and heavy snow. While the highest overall prediction accuracy of the models based on the GLCM features was found to be around 86%, the models considering the LBP based features provided a much higher prediction accuracy of 96%. The snow detection system proposed in this study is cost effective, does not require a lot of technical support, and only needs a single video camera. With the advances in smartphone cameras, simple mobile apps with proper data connectivity can effectively be used to detect roadway weather conditions in real time with reasonable accuracy.


Author(s):  
Jiahua Jin ◽  
Lu Lu

Hotel social media provides access to dissatisfied customers and their experiences with services. However, due to massive topics and posts in social media, and the sparse distribution of complaint-related posts and, manually identifying complaints is inefficient and time-consuming. In this study, we propose a supervised learning method including training samples enlargement and classifier construction. We first identified reliable complaint and noncomplaint samples from the unlabeled dataset by using small labeled samples as training samples. Combining the labeled samples and enlarged samples, classification algorithms support vector machine and k-nearest neighbor were then adopted to build binary classifiers during the classifier construction process. Experimental results indicate the proposed method can identify complaints from social media efficiently, especially when the amount of labeled training samples is small. This study provides an efficient approach for hotel companies to distinguish a certain kind of consumer complaint information from large number of unrelated information in hotel social media.


Sign in / Sign up

Export Citation Format

Share Document