Acknowledgments |
|
xv | |
Preface |
|
xvii | |
Part 1: Machine Learning for Industrial Applications |
|
1 | (140) |
|
1 A Learning-Based Visualization Application for Air Quality Evaluation During COVID-19 Pandemic in Open Data Centric Services |
|
|
3 | (20) |
|
|
|
|
4 | (1) |
|
1.1.1 Open Government Data Initiative |
|
|
4 | (1) |
|
|
4 | (1) |
|
1.1.3 Impact of Lockdown on Air Quality |
|
|
5 | (1) |
|
|
5 | (1) |
|
1.3 Implementation Details |
|
|
6 | (5) |
|
1.3.1 Proposed Methodology |
|
|
7 | (1) |
|
1.3.2 System Specifications |
|
|
8 | (1) |
|
|
8 | (2) |
|
|
10 | (1) |
|
1.4 Results and Discussions |
|
|
11 | (10) |
|
|
21 | (1) |
|
|
21 | (2) |
|
2 Automatic Counting and Classification of Silkworm Eggs Using Deep Learning |
|
|
23 | (18) |
|
|
|
|
|
23 | (1) |
|
2.2 Conventional Silkworm Egg Detection Approaches |
|
|
24 | (1) |
|
|
25 | (10) |
|
|
26 | (2) |
|
2.3.2 Foreground-Background Segmentation |
|
|
28 | (2) |
|
2.3.3 Egg Location Predictor |
|
|
30 | (1) |
|
2.3.4 Predicting Egg Class |
|
|
31 | (4) |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (3) |
|
3 A Wind Speed Prediction System Using Deep Neural Networks |
|
|
41 | (20) |
|
|
|
|
42 | (3) |
|
|
45 | (7) |
|
3.2.1 Deep Neural Networks |
|
|
45 | (2) |
|
3.2.2 The Proposed Method |
|
|
47 | (1) |
|
|
47 | (1) |
|
3.2.2.2 Data Pre-Processing |
|
|
48 | (1) |
|
3.2.2.3 Model Selection and Training |
|
|
50 | (1) |
|
3.2.2.4 Performance Evaluation |
|
|
51 | (1) |
|
|
51 | (1) |
|
3.3 Results and Discussions |
|
|
52 | (5) |
|
3.3.1 Selection of Parameters |
|
|
52 | (1) |
|
3.3.2 Comparison of Models |
|
|
53 | (4) |
|
|
57 | (1) |
|
|
57 | (4) |
|
4 Res-SE-Net: Boosting Performance of ResNets by Enhancing Bridge Connections |
|
|
61 | (16) |
|
|
|
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (3) |
|
|
63 | (1) |
|
4.3.2 Squeeze-and-Excitation Block |
|
|
64 | (2) |
|
|
66 | (2) |
|
4.4.1 Effect of Bridge Connections in ResNet |
|
|
66 | (1) |
|
4.4.2 Res-SE-Net: Proposed Architecture |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (4) |
|
|
73 | (1) |
|
|
74 | (3) |
|
5 Hitting the Success Notes of Deep Learning |
|
|
77 | (22) |
|
|
|
|
|
78 | (1) |
|
5.2 The Big Picture: Artificial Neural Network |
|
|
79 | (1) |
|
5.3 Delineating the Cornerstones |
|
|
80 | (2) |
|
5.3.1 Artificial Neural Network vs. Machine Learning |
|
|
80 | (1) |
|
5.3.2 Machine Learning vs. Deep Learning |
|
|
81 | (1) |
|
5.3.3 Artificial Neural Network vs. Deep Learning |
|
|
81 | (1) |
|
5.4 Deep Learning Architectures |
|
|
82 | (3) |
|
5.4.1 Unsupervised Pre-Trained Networks |
|
|
82 | (1) |
|
5.4.2 Convolutional Neural Networks |
|
|
83 | (1) |
|
5.4.3 Recurrent Neural Networks |
|
|
84 | (1) |
|
5.4.4 Recursive Neural Network |
|
|
85 | (1) |
|
5.5 Why is CNN Preferred for Computer Vision Applications? |
|
|
85 | (4) |
|
5.5.1 Convolutional Layer |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
5.5.4 Fully Connected Layer |
|
|
87 | (2) |
|
5.6 Unravel Deep Learning in Medical Diagnostic Systems |
|
|
89 | (5) |
|
5.7 Challenges and Future Expectations |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (4) |
|
6 Two-Stage Credit Scoring Model Based on Evolutionary Feature Selection and Ensemble Neural Networks |
|
|
99 | (18) |
|
|
|
|
Venkatanareshbabu Kuppili |
|
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
6.3 Proposed Model for Credit Scoring |
|
|
103 | (4) |
|
6.3.1 Stage-1: Feature Selection |
|
|
104 | (1) |
|
6.3.2 Proposed Criteria Function |
|
|
105 | (1) |
|
6.3.3 Stage-2: Ensemble Classifier |
|
|
106 | (1) |
|
6.4 Results and Discussion |
|
|
107 | (5) |
|
6.4.1 Experimental Datasets and Performance Measures |
|
|
107 | (1) |
|
6.4.2 Classification Results With Feature Selection |
|
|
108 | (4) |
|
|
112 | (1) |
|
|
113 | (4) |
|
7 Enhanced Block-Based Feature Agglomeration Clustering for Video Summarization |
|
|
117 | (24) |
|
|
|
|
118 | (1) |
|
|
119 | (3) |
|
7.3 Feature Agglomeration Clustering |
|
|
122 | (1) |
|
|
122 | (7) |
|
|
123 | (2) |
|
7.4.2 Modified Block Clustering Using Feature Agglomeration Technique |
|
|
125 | (2) |
|
7.4.3 Post-Processing and Summary Generation |
|
|
127 | (2) |
|
|
129 | (9) |
|
7.5.1 Experimental Setup and Data Sets Used |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (7) |
|
|
138 | (1) |
|
|
138 | (3) |
Part 2: Machine Learning for Healthcare Systems |
|
141 | (34) |
|
8 Cardiac Arrhythmia Detection and Classification From ECG Signals Using XGBoost Classifier |
|
|
143 | (16) |
|
|
|
|
|
143 | (2) |
|
8.2 Materials and Methods |
|
|
145 | (4) |
|
8.2.1 MIT-BIH Arrhythmia Database |
|
|
146 | (1) |
|
8.2.2 Signal Pre-Processing |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
8.2.4.1 XGBoost Classifier |
|
|
148 | (1) |
|
8.2.4.2 AdaBoost Classifier |
|
|
149 | (1) |
|
8.3 Results and Discussion |
|
|
149 | (6) |
|
|
155 | (1) |
|
|
156 | (3) |
|
9 GSA-Based Approach for Gene Selection from Microarray Gene Expression Data |
|
|
159 | (16) |
|
|
|
|
159 | (2) |
|
|
161 | (1) |
|
9.3 An Overview of Gravitational Search Algorithm |
|
|
162 | (1) |
|
|
163 | (3) |
|
|
163 | (1) |
|
9.4.2 Proposed GSA-Based Feature Selection |
|
|
164 | (2) |
|
|
166 | (6) |
|
9.5.1 Biological Analysis |
|
|
168 | (4) |
|
|
172 | (1) |
|
|
172 | (3) |
Part 3: Machine Learning for Security Systems |
|
175 | (72) |
|
10 On Fusion of NIR and VW Information for Cross-Spectral Iris Matching |
|
|
177 | (16) |
|
|
|
|
|
|
177 | (2) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
181 | (1) |
|
10.3 Experiments and Results |
|
|
182 | (8) |
|
|
182 | (1) |
|
10.3.2 Experimental Results |
|
|
182 | (1) |
|
10.3.2.1 Same Spectral Matchings |
|
|
183 | (1) |
|
10.3.2.2 Cross Spectral Matchings |
|
|
184 | (2) |
|
10.3.3 Feature-Level Fusion |
|
|
186 | (3) |
|
10.3.4 Score-Level Fusion |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (3) |
|
11 Fake Social Media Profile Detection |
|
|
193 | (18) |
|
|
|
|
|
|
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (7) |
|
|
197 | (1) |
|
|
198 | (1) |
|
11.3.3 Artificial Neural Network |
|
|
199 | (3) |
|
|
202 | (1) |
|
11.3.5 Extreme Gradient Boost |
|
|
202 | (2) |
|
11.3.6 Long Short-Term Memory |
|
|
204 | (1) |
|
11.4 Experimental Results |
|
|
204 | (3) |
|
11.5 Conclusion and Future Work |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (4) |
|
12 Extraction of the Features of Fingerprints Using Conventional Methods and Convolutional Neural Networks |
|
|
211 | (18) |
|
|
|
|
212 | (1) |
|
|
213 | (2) |
|
12.3 Methods and Materials |
|
|
215 | (7) |
|
12.3.1 Feature Extraction Using SURF |
|
|
215 | (1) |
|
12.3.2 Feature Extraction Using Conventional Methods |
|
|
216 | (1) |
|
12.3.2.1 Local Orientation Estimation |
|
|
216 | (1) |
|
12.3.2.2 Singular Region Detection |
|
|
218 | (1) |
|
12.3.3 Proposed CNN Architecture |
|
|
219 | (2) |
|
|
221 | (1) |
|
12.3.5 Computational Environment |
|
|
221 | (1) |
|
|
222 | (4) |
|
12.4.1 Feature Extraction and Visualization |
|
|
223 | (3) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (3) |
|
13 Facial Expression Recognition Using Fusion of Deep Learning and Multiple Features |
|
|
229 | (18) |
|
|
|
|
|
|
230 | (2) |
|
|
232 | (3) |
|
|
235 | (7) |
|
13.3.1 Convolutional Neural Network |
|
|
236 | (1) |
|
13.3.1.1 Convolution Layer |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
13.3.1.4 Fully Connected Layer |
|
|
238 | (1) |
|
13.3.2 Histogram of Gradient |
|
|
239 | (1) |
|
13.3.3 Facial Landmark Detection |
|
|
240 | (1) |
|
13.3.4 Support Vector Machine |
|
|
241 | (1) |
|
13.3.5 Model Merging and Learning |
|
|
242 | (1) |
|
13.4 Experimental Results |
|
|
242 | (3) |
|
|
242 | (3) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (2) |
Part 4: Machine Learning for Classification and Information Retrieval Systems |
|
247 | (84) |
|
14 AnimNet: An Animal Classification Network using Deep Learning |
|
|
249 | (18) |
|
|
|
|
|
|
249 | (3) |
|
14.1.1 Feature Extraction |
|
|
250 | (1) |
|
14.1.2 Artificial Neural Network |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (2) |
|
14.3 Proposed Methodology |
|
|
254 | (4) |
|
14.3.1 Dataset Preparation |
|
|
254 | (1) |
|
14.3.2 Training the Model |
|
|
254 | (4) |
|
|
258 | (5) |
|
14.4.1 Using Pre-Trained Networks |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (3) |
|
|
263 | (1) |
|
|
264 | (3) |
|
15 A Hybrid Approach for Feature Extraction From Reviews to Perform Sentiment Analysis |
|
|
267 | (22) |
|
|
|
|
268 | (1) |
|
|
269 | (2) |
|
|
271 | (11) |
|
15.3.1 Feedback Collector |
|
|
272 | (1) |
|
15.3.2 Feedback Pre-Processor |
|
|
272 | (1) |
|
|
272 | (2) |
|
|
274 | (1) |
|
15.3.4.1 Removal of Terms From Tentative List of Features on the Basis of Syntactic Knowledge |
|
|
274 | (1) |
|
15.3.4.2 Removal of Least Significant Terms on the Basis of Contextual Knowledge |
|
|
276 | (1) |
|
15.3.4.3 Removal of Less Significant Terms on the Basis of Association With Sentiment Words |
|
|
277 | (1) |
|
15.3.4.4 Removal of Terms Having Similar Sense |
|
|
278 | (1) |
|
15.3.4.5 Removal of Terms Having Same Root |
|
|
279 | (1) |
|
15.3.4.6 Identification of Multi-Term Features |
|
|
279 | (1) |
|
15.3.4.7 Identification of Less Frequent Feature |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
282 | (4) |
|
|
286 | (1) |
|
|
286 | (3) |
|
16 Spark-Enhanced Deep Neural Network Framework for Medical Phrase Embedding |
|
|
289 | (16) |
|
|
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (5) |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
294 | (3) |
|
|
297 | (1) |
|
16.4.1 Dataset Preparation |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (5) |
|
|
298 | (1) |
|
|
298 | (5) |
|
|
303 | (1) |
|
|
303 | (2) |
|
17 Image Anonymization Using Deep Convolutional Generative Adversarial Network |
|
|
305 | (26) |
|
|
|
|
306 | (4) |
|
17.2 Background Information |
|
|
310 | (9) |
|
17.2.1 Black Box and White Box Attacks |
|
|
310 | (1) |
|
17.2.2 Model Inversion Attack |
|
|
311 | (1) |
|
17.2.3 Differential Privacy |
|
|
312 | (1) |
|
|
312 | (1) |
|
17.2.4 Generative Adversarial Network |
|
|
313 | (3) |
|
17.2.5 Earth-Mover (EM) Distance/Wasserstein Metric |
|
|
316 | (1) |
|
|
317 | (1) |
|
17.2.7 Improved Wasserstein GAN (WGAN-GP) |
|
|
317 | (1) |
|
17.2.8 KL Divergence and JS Divergence |
|
|
318 | (1) |
|
|
319 | (1) |
|
17.3 Image Anonymization to Prevent Model Inversion Attack |
|
|
319 | (7) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
17.3.5 Model Architecture |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
17.4 Results and Analysis |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
329 | (2) |
Index |
|
331 | |