COMPARATIVE ANALYSIS OF DEEP LEARNING METHODS FOR OBJECT DETECTION

2020 ◽  
Vol 9 (6) ◽  
pp. 3759-3775
Author(s):  
K. Gill ◽  
V. Mangat

Object detection in videos is gaining more attention recently as it is related to video analytics and facilitates image understanding and applicable to . The video object detection methods can be divided into traditional and deep learning based methods. Trajectory classification, low rank sparse matrix, background subtraction and object tracking are considered as traditional object detection methods as they primary focus is informative feature collection, region selection and classification. The deep learning methods are more popular now days as they facilitate high-level features and problem solving in object detection algorithms. We have discussed various object detection methods and challenges in this paper.


2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Dainius Čeponis ◽  
Nikolaj Goranin

The increasing amount of malware and cyberattacks on a host level increases the need for a reliable anomaly-based host IDS (HIDS) that would be able to deal with zero-day attacks and would ensure low false alarm rate (FAR), which is critical for the detection of such activity. Deep learning methods such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs) are considered to be highly suitable for solving data-driven security solutions. Therefore, it is necessary to perform the comparative analysis of such methods in order to evaluate their efficiency in attack classification as well as their ability to distinguish malicious and benign activity. In this article, we present the results achieved with the AWSCTD (attack-caused Windows OS system calls traces dataset), which can be considered as the most exhaustive set of host-level anomalies at the moment, including 112.56 million system calls from 12110 executable malware samples and 3145 benign software samples with 16.3 million system calls. The best results were obtained with CNNs with up to 90.0% accuracy for family classification and 95.0% accuracy for malicious/benign determination. RNNs demonstrated slightly inferior results. Furthermore, CNN tuning via an increase in the number of layers should make them practically applicable for host-level anomaly detection.


Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4424
Author(s):  
Huu Thu Nguyen ◽  
Eon-Ho Lee ◽  
Chul Hee Bae ◽  
Sejin Lee

Multiple object detection is challenging yet crucial in computer vision. In This study, owing to the negative effect of noise on multiple object detection, two clustering algorithms are used on both underwater sonar images and three-dimensional point cloud LiDAR data to study and improve the performance result. The outputs from using deep learning methods on both types of data are treated with K-Means clustering and density-based spatial clustering of applications with noise (DBSCAN) algorithms to remove outliers, detect and cluster meaningful data, and improve the result of multiple object detections. Results indicate the potential application of the proposed method in the fields of object detection, autonomous driving system, and so forth.


2020 ◽  
Vol 7 (1) ◽  
pp. 1805144
Author(s):  
Alexandr Pak ◽  
Atabay Ziyaden ◽  
Kuanysh Tukeshev ◽  
Assel Jaxylykova ◽  
Dana Abdullina

2019 ◽  
Vol 52 (21) ◽  
pp. 64-71
Author(s):  
Frederik E.T. Schöller ◽  
Martin K. Plenge-Feidenhans’l ◽  
Jonathan D. Stets ◽  
Mogens Blanke

2019 ◽  
Vol 8 (3) ◽  
pp. 1163-1166

User quest for information has led to development of Question Answer (QA) system to provide relevant answers to user questions. The QA task are different than normal NLP tasks as they heavily depend to semantics and context of given data. Retrieving and predicting answers to verity of questions require understanding of question, relevance with context and identifying and retrieving of suitable answers. Deep learning helps to produce impressive performance as it employs deep neural network with automatic feature extraction methods. The paper proposes a hybrid model to identify suitable answer for posed question. The proposes power exploits the power of CNN for extracting features and ability of LSTM for considering long term dependencies and semantic of context and question. Paper provides a comparative analysis on deep learning methods useful for predicting answer with the proposed method .The model is implemented on twenty tasks of babI dataset of Facebook .


2020 ◽  
pp. 11-21
Author(s):  
Diana Gaifulina ◽  
◽  
Igor Kotenko ◽  

The purpose of the article: comparative analysis of methods for solving various cybersecurity problems based on the use of deep learning algorithms. Research method: Systematic analysis of modern methods of deep learning in various cybersecurity applications, including intrusion and malware detection, network traffic analysis, and some other tasks. The result obtained: classification scheme of the considered approaches to deep learning in cybersecurity, and their comparative characteristics by the used models, characteristics, and data sets. The analysis showed that many deeper architectures with a large number of neurons on each layer show better results. Recommendations are given for using deep learning methods in cybersecurity applications. The main contribution of the authors to the research of deep learning methods for cybersecurity tasks is the classification of the subject area; conducting a general and comparative analysis of existing approaches that reflect the current state of scientific research.


2020 ◽  
Vol 1529 ◽  
pp. 042086 ◽  
Author(s):  
Shahriar Shakir Sumit ◽  
Junzo Watada ◽  
Anurava Roy ◽  
DRA Rambli

Sign in / Sign up

Export Citation Format

Share Document