Preface |
|
xi | |
|
1 Land-Use Classification with Integrated Data |
|
|
1 | (36) |
|
|
|
|
|
|
|
2 | (1) |
|
|
3 | (3) |
|
1.2.1 Overview of Land-Use and Land-Cover Information |
|
|
3 | (1) |
|
1.2.2 Geographical Information Systems |
|
|
4 | (1) |
|
1.2.3 GIS-Related Data Types |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (4) |
|
1.4 Implementation Details |
|
|
10 | (15) |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.4.3 Built-Up Area Extraction |
|
|
11 | (1) |
|
1.4.4 Per-Pixel Classification |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
14 | (2) |
|
1.4.7 Object-Based Image Classification |
|
|
16 | (4) |
|
1.4.8 Foursquare Data Preprocessing and Quality Analysis |
|
|
20 | (1) |
|
1.4.9 Integration of Satellite Images with Foursquare Data |
|
|
21 | (1) |
|
1.4.10 Building Block Identification |
|
|
21 | (1) |
|
1.4.11 Overlay of Foursquare Points |
|
|
22 | (1) |
|
1.4.12 Visualization of Land Usage |
|
|
23 | (1) |
|
1.4.13 Common Platform Development |
|
|
23 | (2) |
|
|
25 | (6) |
|
1.5.1 Experimental Evaluation Process |
|
|
25 | (3) |
|
1.5.2 Evaluation of the Classification Using Base Error Matrix |
|
|
28 | (3) |
|
|
31 | (3) |
|
1.6.1 Contribution of the Proposed Approach |
|
|
31 | (1) |
|
1.6.2 Limitations of the Data Sets |
|
|
32 | (1) |
|
1.6.3 Future Research Directions |
|
|
33 | (1) |
|
|
34 | (3) |
|
|
35 | (2) |
|
2 Indian Sign Language Recognition Using Soft Computing Techniques |
|
|
37 | (30) |
|
|
|
|
|
37 | (1) |
|
|
38 | (8) |
|
2.2.1 The Domain of Sign Language |
|
|
39 | (2) |
|
2.2.2 The Data Acquisition Methods |
|
|
41 | (1) |
|
2.2.3 Preprocessing Steps |
|
|
42 | (1) |
|
2.2.3.1 Image Restructuring |
|
|
43 | (1) |
|
2.2.3.2 Skin Color Detection |
|
|
43 | (1) |
|
2.2.4 Methods of Feature Extraction Used in the Experiments |
|
|
44 | (1) |
|
2.2.5 Classification Techniques |
|
|
45 | (1) |
|
2.2.5.1 K-Nearest Neighbor |
|
|
45 | (1) |
|
2.2.5.2 Neural Network Classifier |
|
|
45 | (1) |
|
2.2.5.3 Naive Bayes Classifier |
|
|
46 | (1) |
|
|
46 | (17) |
|
2.3.1 Experiments on ISL Digits |
|
|
46 | (1) |
|
2.3.1.1 Results and Discussions on the First Experiment |
|
|
47 | (2) |
|
2.3.1.2 Results and Discussions on Second Experiment |
|
|
49 | (2) |
|
2.3.2 Experiments on ISL Alphabets |
|
|
51 | (1) |
|
2.3.2.1 Experiments with Single-Handed Alphabet Signs |
|
|
51 | (1) |
|
2.3.2.2 Results of Single-Handed Alphabet Signs |
|
|
52 | (1) |
|
2.3.2.3 Experiments with Double-Handed Alphabet Signs |
|
|
53 | (1) |
|
2.3.2.4 Results on Double-Handed Alphabets |
|
|
54 | (4) |
|
2.3.3 Experiments on ISL Words |
|
|
58 | (1) |
|
2.3.3.1 Results on ISL Word Signs |
|
|
59 | (4) |
|
|
63 | (4) |
|
|
63 | (4) |
|
3 Stored Grain Pest Identification Using an Unmanned Aerial Vehicle (UAV)-Assisted Pest Detection Model |
|
|
67 | (18) |
|
|
|
|
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (2) |
|
3.4 Results and Discussion |
|
|
72 | (5) |
|
|
77 | (8) |
|
|
78 | (7) |
|
4 Object Descriptor for Machine Vision |
|
|
85 | (30) |
|
|
|
|
85 | (2) |
|
|
87 | (2) |
|
4.3 Polygonal Approximation |
|
|
89 | (3) |
|
|
92 | (4) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (3) |
|
|
102 | (13) |
|
|
114 | (1) |
|
5 Flood Disaster Management: Risks, Technologies, and Future Directions |
|
|
115 | (32) |
|
|
|
115 | (9) |
|
|
115 | (1) |
|
5.1.2 Global Flood Risks and Incidents |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (2) |
|
5.1.5 Floods in Australia |
|
|
121 | (2) |
|
5.1.6 Why Floods are a Major Concern |
|
|
123 | (1) |
|
5.2 Existing Disaster Management Systems |
|
|
124 | (5) |
|
|
124 | (1) |
|
5.2.2 Disaster Management Systems Used Around the World |
|
|
124 | (1) |
|
5.2.2.1 Disaster Management Model |
|
|
125 | (1) |
|
5.2.2.2 Disaster Risk Analysis System |
|
|
126 | (1) |
|
5.2.2.3 Geographic Information System |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
5.2.2.6 Satellite Imaging |
|
|
127 | (1) |
|
5.2.2.7 Global Positioning System for Imaging |
|
|
128 | (1) |
|
5.2.3 Gaps in Current Disaster Management Technology |
|
|
128 | (1) |
|
5.3 Advancements in Disaster Management Technologies |
|
|
129 | (8) |
|
|
129 | (1) |
|
5.3.2 AI and Machine Learning for Disaster Management |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
5.3.3 Recent Research in Disaster Management |
|
|
132 | (5) |
|
|
137 | (1) |
|
|
137 | (10) |
|
5.4.1 Image Acquisition Through UAV |
|
|
138 | (1) |
|
|
138 | (1) |
|
5.4.3 Landmarks Detection |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
5.4.4.2 Flood Detection Using Machine Learning |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
143 | (4) |
|
6 Temporal Color Analysis of Avocado Dip for Quality Control |
|
|
147 | (12) |
|
|
Micloth Lopez del Castillo-Lozano |
|
|
|
|
|
147 | (1) |
|
6.2 Materials and Methods |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
6.5.1 First Experimental Design |
|
|
150 | (1) |
|
6.5.2 Second Experimental Design |
|
|
151 | (1) |
|
6.6 Results and Discussion |
|
|
151 | (5) |
|
6.6.1 First Experimental Design (RGB Color Space) |
|
|
151 | (1) |
|
6.6.2 Second Experimental Design (L*a*b* Color Space) |
|
|
152 | (4) |
|
|
156 | (3) |
|
|
156 | (3) |
|
7 Image and Video Processing for Defect Detection in Key Infrastructure |
|
|
159 | (20) |
|
|
|
160 | (1) |
|
7.2 Reasons for Defective Roads and Bridges |
|
|
161 | (1) |
|
7.3 Image Processing for Defect Detection |
|
|
162 | (7) |
|
|
162 | (1) |
|
7.3.2 Morphological Operators |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
7.3.5 Water Puddles Detection |
|
|
166 | (1) |
|
7.3.6 Pavement Distress Detection |
|
|
167 | (2) |
|
7.4 Image-Based Defect Detection Methods |
|
|
169 | (3) |
|
7.4.1 Thresholding Techniques |
|
|
170 | (1) |
|
7.4.2 Edge Detection Techniques |
|
|
170 | (1) |
|
7.4.3 Wavelet Transform Techniques |
|
|
171 | (1) |
|
7.4.4 Texture Analysis Techniques |
|
|
171 | (1) |
|
7.4.5 Machine Learning Techniques |
|
|
172 | (1) |
|
7.5 Factors Affecting the Performance |
|
|
172 | (1) |
|
7.5.1 Lighting Variations |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
7.6 Achievements and Issues |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (5) |
|
|
175 | (4) |
|
8 Methodology for the Detection of Asymptomatic Diabetic Retinopathy |
|
|
179 | (18) |
|
|
|
|
180 | (1) |
|
8.2 Key Steps of Computer-Aided Diagnostic Methods |
|
|
181 | (2) |
|
8.3 DR Screening and Grading Methods |
|
|
183 | (5) |
|
8.4 Key Observations from Literature Review |
|
|
188 | (1) |
|
8.5 Design of Experimental Methodology |
|
|
189 | (3) |
|
|
192 | (5) |
|
|
193 | (4) |
|
9 Offline Handwritten Numeral Recognition Using Convolution Neural Network |
|
|
197 | (16) |
|
|
|
|
|
198 | (1) |
|
|
199 | (2) |
|
9.3 Data Set Used for Simulation |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (3) |
|
9.6 Conclusion and Future Work |
|
|
207 | (6) |
|
|
209 | (4) |
|
10 A Review on Phishing--Machine Vision and Learning Approaches |
|
|
213 | (11) |
|
|
|
|
|
213 | (1) |
|
|
214 | (3) |
|
10.2.1 Content-Based Approaches |
|
|
214 | (1) |
|
10.2.2 Heuristics-Based Approaches |
|
|
215 | (1) |
|
10.2.3 Blacklist-Based Approaches |
|
|
215 | (1) |
|
10.2.4 Whitelist-Based Approaches |
|
|
216 | (1) |
|
10.2.5 CANTINA-Based Approaches |
|
|
216 | (1) |
|
10.2.6 Image-Based Approaches |
|
|
216 | (1) |
|
10.3 Role of Data Mining in Antiphishing |
|
|
217 | (7) |
|
10.3.1 Phishing Detection |
|
|
219 | (1) |
|
10.3.2 Phishing Prevention |
|
|
220 | (2) |
|
10.3.3 Training and Education |
|
|
222 | (1) |
|
10.3.4 Phishing Recovery and Avoidance |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
Acknowledgments |
|
224 | (1) |
References |
|
224 | (7) |
Index |
|
231 | |