31 research outputs found

    A Modified Bayesian Optimization based Hyper-Parameter Tuning Approach for Extreme Gradient Boosting

    Full text link
    It is already reported in the literature that the performance of a machine learning algorithm is greatly impacted by performing proper Hyper-Parameter optimization. One of the ways to perform Hyper-Parameter optimization is by manual search but that is time consuming. Some of the common approaches for performing Hyper-Parameter optimization are Grid search Random search and Bayesian optimization using Hyperopt. In this paper, we propose a brand new approach for hyperparameter improvement i.e. Randomized-Hyperopt and then tune the hyperparameters of the XGBoost i.e. the Extreme Gradient Boosting algorithm on ten datasets by applying Random search, Randomized-Hyperopt, Hyperopt and Grid Search. The performances of each of these four techniques were compared by taking both the prediction accuracy and the execution time into consideration. We find that the Randomized-Hyperopt performs better than the other three conventional methods for hyper-paramter optimization of XGBoost.Comment: Pre-review version of the paper submitted to IEEE 2019 Fifteenth International Conference on Information Processing (ICINPRO). The paper is accepted for publicatio

    Applications of Artificial Intelligence to Cryptography

    Get PDF
    This paper considers some recent advances in the field of Cryptography using Artificial Intelligence (AI). It specifically considers the applications of Machine Learning (ML) and Evolutionary Computing (EC) to analyze and encrypt data. A short overview is given on Artificial Neural Networks (ANNs) and the principles of Deep Learning using Deep ANNs. In this context, the paper considers: (i) the implementation of EC and ANNs for generating unique and unclonable ciphers; (ii) ML strategies for detecting the genuine randomness (or otherwise) of finite binary strings for applications in Cryptanalysis. The aim of the paper is to provide an overview on how AI can be applied for encrypting data and undertaking cryptanalysis of such data and other data types in order to assess the cryptographic strength of an encryption algorithm, e.g. to detect patterns of intercepted data streams that are signatures of encrypted data. This includes some of the authors’ prior contributions to the field which is referenced throughout. Applications are presented which include the authentication of high-value documents such as bank notes with a smartphone. This involves using the antenna of a smartphone to read (in the near field) a flexible radio frequency tag that couples to an integrated circuit with a non-programmable coprocessor. The coprocessor retains ultra-strong encrypted information generated using EC that can be decrypted on-line, thereby validating the authenticity of the document through the Internet of Things with a smartphone. The application of optical authentication methods using a smartphone and optical ciphers is also briefly explored

    Segmentation of images by color features: a survey

    Get PDF
    En este articulo se hace la revisión del estado del arte sobre la segmentación de imagenes de colorImage segmentation is an important stage for object recognition. Many methods have been proposed in the last few years for grayscale and color images. In this paper, we present a deep review of the state of the art on color image segmentation methods; through this paper, we explain the techniques based on edge detection, thresholding, histogram-thresholding, region, feature clustering and neural networks. Because color spaces play a key role in the methods reviewed, we also explain in detail the most commonly color spaces to represent and process colors. In addition, we present some important applications that use the methods of image segmentation reviewed. Finally, a set of metrics frequently used to evaluate quantitatively the segmented images is shown

    Image Error Detection: A Systematic Literature Review

    Get PDF
    The advancement of technology, as well as the creation of new techniques and methodologies for image analysis, is rapid. However, image detection may face some errors. Image error detection will be discussed in this comprehensive literature review. Throughout the papers, this work attempts to learn about the types of images used, algorithms that are frequently used, techniques that are frequently used, and metrics used to test the correctness of the suggested approach. The most commonly used image type is medical images such as Magnetic Resonance Imaging, the algorithm that is widely used is a Convolutional Neural Networks based algorithm. The method that is widely used is a machine learning-based method, and the measurement that is widely used is a Peak Signal Noise Ratio measurement method to measure the accuracy of the algorithm

    The Difference Adoption of E-Commerce Technology among Z and Y Generations

    Get PDF
    The rapid growth of e-commerce transactions among Y and Z generations in Indonesia goes along with the large number of internet users on both of the generations. Indonesia has become a potential market for the digital creative industry, especially to applications of online payments, online shopping, online booking, and online banking. In-depth investigations into these two generations in the form of developing e-commerce technology adoption models will provide valuable contributions in the development of models and implementation of e-commerce industries in Indonesia. This study aims to obtain factors that influence the acceptance of generation Z and Y against e-commerce technology and reveal the differences in their acceptance of it. Investigation was done by collecting 343 questionnaires in age range of Y and Z generations. The results of this study reveal that all variables employing in the model naming Satisfaction, Trust, Perceived Information Quality, Perceived Service Quality, Performance Expectancy, Effort Expectancy, Hedonic Motivation, Social Influence, Price Value, Habit, and Facilitating Conditions have statistically significantly correlation to Behavioral Intention and to each other. The significantly difference of adoption of ecommerce technology among Z and Y generations are only found on Hedonic Motivation and Social Influence. The other difference on gender is found on Age, Education, Satisfaction, Effort Expectancy, and Perceive Information Quality. This study can contribute to who have concern on enhance adopting of e-commerce technology especially to the two generations, especially developers of e-commerce application considering the factors that have correlation to intention to use e-commerce

    Ensemble classification of integrated CT scan datasets in detecting COVID-19 using feature fusion from contourlet transform and CNN

    Get PDF
    The COVID-19 disease caused by coronavirus is constantly changing due to the emergence of different variants and thousands of people are dying every day worldwide. Early detection of this new form of pulmonary disease can reduce the mortality rate. In this paper, an automated method based on machine learning (ML) and deep learning (DL) has been developed to detect COVID-19 using computed tomography (CT) scan images extracted from three publicly available datasets (A total of 11,407 images; 7397 COVID-19 images and 4010 normal images). An unsupervised clustering approach that is a modified region-based clustering technique for segmenting COVID-19 CT scan image has been proposed. Furthermore, contourlet transform and convolution neural network (CNN) have been employed to extract features individually from the segmented CT scan images and to fuse them in one feature vector. Binary differential evolution (BDE) approach has been employed as a feature optimization technique to obtain comprehensible features from the fused feature vector. Finally, a ML/DL-based ensemble classifier considering bagging technique has been employed to detect COVID-19 from the CT images. A fivefold and generalization cross-validation techniques have been used for the validation purpose. Classification experiments have also been conducted with several pre-trained models (AlexNet, ResNet50, GoogleNet, VGG16, VGG19) and found that the ensemble classifier technique with fused feature has provided state-of-the-art performance with an accuracy of 99.98%

    Applied Metaheuristic Computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC
    corecore