scholarly journals Flawless Detection of Herbal Plant Leaf by Machine Learning Classifier Through Two Stage Authentication Procedure

Author(s):  
Samuel Manoharan J

Herbal plants are crucial to human existence for medical reasons, and they can also provide free oxygen to the environment. Many herbal plants are rich in therapeutic goods and also it includes the active elements that will benefit future generations. Many valuable plant species are being extinguished and destroyed as a result of factors such as global warming, population growth, occupational secrecy, a lack of government support for research, and a lack of knowledge about therapeutic plants. Due to the lag of dimensional factors such as length and width, many existing algorithms fail to recognize herbal leaf in all seasons with the maximum accuracy. Henceforth, the proposed algorithm focuses on the incomplete problems in the datasets in order to improve the detection rate for herbal leaf identification. The inclusions of dimension factors in the datasets are performing good results in the image segmentation process. The obtained result has been validated with a machine learning classifier when combined with ex-or gate operation is called deep knowledge-based identification. This two-stage authentication (TSA) procedure is improving the recognition rate required for the detection of herbal leaf. This fusion of image segmentation with machine learning is providing good robustness for the proposed architecture. Besides, intelligent selection of image segmentation techniques to segment the leaf from the image is improving the detection accuracy. This procedure is addressing and answering the drawbacks associated with the detection of the herbal leaf by using many Machine Learning (ML) approaches. Also, it improves the rate of detection and minimizes the classification error. From the results, it is evident that the proposed method has obtained better accuracy and other performance measures.

Author(s):  
Nur Sholihah Zaini ◽  
Deris Stiawan ◽  
Mohd Faizal Ab Razak ◽  
Ahmad Firdaus ◽  
Wan Isni Sofiah Wan Din ◽  
...  

<span>The increasing development of the Internet, more and more applications are put into websites can be directly accessed through the network. This development has attracted an attacker with phishing websites to compromise computer systems. Several solutions have been proposed to detect a phishing attack. However, there still room for improvement to tackle this phishing threat. This paper aims to investigate and evaluate the effectiveness of machine learning approach in the classification of phishing attack. This paper applied a heuristic approach with machine learning classifier to identify phishing attacks noted in the web site applications. The study compares with five classifiers to find the best machine learning classifiers in detecting phishing attacks. In identifying the phishing attacks, it demonstrates that random forest is able to achieve high detection accuracy with true positive rate value of 94.79% using website features. The results indicate that random forest is effective classifiers for detecting phishing attacks.</span>


2020 ◽  
pp. 1-19
Author(s):  
Lan Deng ◽  
Yuanjun Wang

BACKGROUND: Effective detection of Alzheimer’s disease (AD) is still difficult in clinical practice. Therefore, establishment of AD detection model by means of machine learning is of great significance to assist AD diagnosis. OBJECTIVE: To investigate and test a new detection model aiming to help doctors diagnose AD more accurately. METHODS: Diffusion tensor images and the corresponding T1w images acquired from subjects (AD = 98, normal control (NC) = 100) are used to construct brain networks. Then, 9 types features (198×90×9 in total) are extracted from the 3D brain networks by a graph theory method. Features with low correction in both groups are selected through the Pearson correlation analysis. Finally, the selected features (198×33, 198×26, 198×30, 198×42, 198×36, 198×23, 198×29, 198×14, 198×25) are separately used into train 3 machine learning classifier based detection models in which 60% of study subjects are used for training, 20% for validation and 20% for testing. RESULTS: The best detection accuracy levels of 3 models are 90%, 98% and 90% with the corresponding sensitivity of 92%, 96%, and 72% and specificity of 88%, 100% and 94% when using a random forest classifier trained with the Shortest Path Length (SPL) features (198×14), a support vector machine trained with the Degree Centrality features (198×33), and a convolution neural network trained with SPL features, respectively. CONCLUSIONS: This study demonstrates that the new method and models not only improve the accuracy of detecting AD, but also avoid bias caused by the method of direct dimensionality reduction from high dimensional data.


Author(s):  
Megha Chhabra ◽  
Manoj Kumar Shukla ◽  
Kiran Kumar Ravulakollu

: Latent fingerprints are unintentional finger skin impressions left as ridge patterns at crime scenes. A major challenge in latent fingerprint forensics is the poor quality of the lifted image from the crime scene. Forensics investigators are in permanent search of novel outbreaks of the effective technologies to capture and process low quality image. The accuracy of the results depends upon the quality of the image captured in the beginning, metrics used to assess the quality and thereafter level of enhancement required. The low quality of the image collected by low quality scanners, unstructured background noise, poor ridge quality, overlapping structured noise result in detection of false minutiae and hence reduce the recognition rate. Traditionally, Image segmentation and enhancement is partially done manually using help of highly skilled experts. Using automated systems for this work, differently challenging quality of images can be investigated faster. This survey amplifies the comparative study of various segmentation techniques available for latent fingerprint forensics.


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4805
Author(s):  
Saad Abbasi ◽  
Mahmoud Famouri ◽  
Mohammad Javad Shafiee ◽  
Alexander Wong

Human operators often diagnose industrial machinery via anomalous sounds. Given the new advances in the field of machine learning, automated acoustic anomaly detection can lead to reliable maintenance of machinery. However, deep learning-driven anomaly detection methods often require an extensive amount of computational resources prohibiting their deployment in factories. Here we explore a machine-driven design exploration strategy to create OutlierNets, a family of highly compact deep convolutional autoencoder network architectures featuring as few as 686 parameters, model sizes as small as 2.7 KB, and as low as 2.8 million FLOPs, with a detection accuracy matching or exceeding published architectures with as many as 4 million parameters. The architectures are deployed on an Intel Core i5 as well as a ARM Cortex A72 to assess performance on hardware that is likely to be used in industry. Experimental results on the model’s latency show that the OutlierNet architectures can achieve as much as 30x lower latency than published networks.


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4736
Author(s):  
Sk. Tanzir Mehedi ◽  
Adnan Anwar ◽  
Ziaur Rahman ◽  
Kawsar Ahmed

The Controller Area Network (CAN) bus works as an important protocol in the real-time In-Vehicle Network (IVN) systems for its simple, suitable, and robust architecture. The risk of IVN devices has still been insecure and vulnerable due to the complex data-intensive architectures which greatly increase the accessibility to unauthorized networks and the possibility of various types of cyberattacks. Therefore, the detection of cyberattacks in IVN devices has become a growing interest. With the rapid development of IVNs and evolving threat types, the traditional machine learning-based IDS has to update to cope with the security requirements of the current environment. Nowadays, the progression of deep learning, deep transfer learning, and its impactful outcome in several areas has guided as an effective solution for network intrusion detection. This manuscript proposes a deep transfer learning-based IDS model for IVN along with improved performance in comparison to several other existing models. The unique contributions include effective attribute selection which is best suited to identify malicious CAN messages and accurately detect the normal and abnormal activities, designing a deep transfer learning-based LeNet model, and evaluating considering real-world data. To this end, an extensive experimental performance evaluation has been conducted. The architecture along with empirical analyses shows that the proposed IDS greatly improves the detection accuracy over the mainstream machine learning, deep learning, and benchmark deep transfer learning models and has demonstrated better performance for real-time IVN security.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1436
Author(s):  
Tuoru Li ◽  
Senxiang Lu ◽  
Enjie Xu

The internal detector in a pipeline needs to use the ground marker to record the elapsed time for accurate positioning. Most existing ground markers use the magnetic flux leakage testing principle to detect whether the internal detector passes. However, this paper uses the method of detecting vibration signals to track and locate the internal detector. The Variational Mode Decomposition (VMD) algorithm is used to extract features, which solves the defect of large noise and many disturbances of vibration signals. In this way, the detection range is expanded, and some non-magnetic flux leakage internal detectors can also be located. Firstly, the extracted vibration signals are denoised by the VMD algorithm, then kurtosis value and power value are extracted from the intrinsic mode functions (IMFs) to form feature vectors, and finally the feature vectors are input into random forest and Multilayer Perceptron (MLP) for classification. Experimental research shows that the method designed in this paper, which combines VMD with a machine learning classifier, can effectively use vibration signals to locate the internal detector and has the characteristics of high accuracy and good adaptability.


2021 ◽  
Vol 1770 (1) ◽  
pp. 012012
Author(s):  
P. Asha ◽  
A. Jesudoss ◽  
S. Prince Mary ◽  
K. V. Sai Sandeep ◽  
K. Harsha Vardhan

Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1761
Author(s):  
Hanan Hindy ◽  
Robert Atkinson ◽  
Christos Tachtatzis ◽  
Ethan Bayne ◽  
Miroslav Bures ◽  
...  

Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the choice of model. A range of studies have, with varying degrees of success, attempted to discriminate between benign traffic and well-known cyber-attacks. The features used in these studies are broadly similar and have demonstrated their effectiveness in situations where cyber-attacks do not imitate benign behaviour. To overcome this barrier, in this manuscript, we introduce new features based on a higher level of abstraction of network traffic. Specifically, we perform flow aggregation by grouping flows with similarities. This additional level of feature abstraction benefits from cumulative information, thus qualifying the models to classify cyber-attacks that mimic benign traffic. The performance of the new features is evaluated using the benchmark CICIDS2017 dataset, and the results demonstrate their validity and effectiveness. This novel proposal will improve the detection accuracy of cyber-attacks and also build towards a new direction of feature extraction for complex ones.


Sign in / Sign up

Export Citation Format

Share Document