scholarly journals A review of feature extraction and classification algorithms for image RSVP-based BCI

Author(s):  
Zhengwei Wang ◽  
Graham Healy ◽  
Alan F. Smeaton ◽  
Tomas E. Ward
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Ruhul Amin Hazarika ◽  
Arnab Kumar Maji ◽  
Samarendra Nath Sur ◽  
Babu Sena Paul ◽  
Debdatta Kandar

Author(s):  
Sarmad Mahar ◽  
Sahar Zafar ◽  
Kamran Nishat

Headnotes are the precise explanation and summary of legal points in an issued judgment. Law journals hire experienced lawyers to write these headnotes. These headnotes help the reader quickly determine the issue discussed in the case. Headnotes comprise two parts. The first part comprises the topic discussed in the judgment, and the second part contains a summary of that judgment. In this thesis, we design, develop and evaluate headnote prediction using machine learning, without involving human involvement. We divided this task into a two steps process. In the first step, we predict law points used in the judgment by using text classification algorithms. The second step generates a summary of the judgment using text summarization techniques. To achieve this task, we created a Databank by extracting data from different law sources in Pakistan. We labelled training data generated based on Pakistan law websites. We tested different feature extraction methods on judiciary data to improve our system. Using these feature extraction methods, we developed a dictionary of terminology for ease of reference and utility. Our approach achieves 65% accuracy by using Linear Support Vector Classification with tri-gram and without stemmer. Using active learning our system can continuously improve the accuracy with the increased labelled examples provided by the users of the system.


2017 ◽  
Vol 9 (3) ◽  
pp. 58-72 ◽  
Author(s):  
Guangyu Wang ◽  
Xiaotian Wu ◽  
WeiQi Yan

The security issue of currency has attracted awareness from the public. De-spite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them in market without being detected. By reviewing related work in currency security, the focus of this paper is on conducting a comparative study of feature extraction and classification algorithms of currency notes authentication. We extract various computational features from the dataset consisting of US dollar (USD), Chinese Yuan (CNY) and New Zealand Dollar (NZD) and apply the classification algorithms to currency identification. Our contributions are to find and implement various algorithms from the existing literatures and choose the best approaches for use.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hima Bindu Valiveti ◽  
Anil Kumar B. ◽  
Lakshmi Chaitanya Duggineni ◽  
Swetha Namburu ◽  
Swaraja Kuraparthi

Purpose Road accidents, an inadvertent mishap can be detected automatically and alerts sent instantly with the collaboration of image processing techniques and on-road video surveillance systems. However, to rely exclusively on visual information especially under adverse conditions like night times, dark areas and unfavourable weather conditions such as snowfall, rain, and fog which result in faint visibility lead to incertitude. The main goal of the proposed work is certainty of accident occurrence. Design/methodology/approach The authors of this work propose a method for detecting road accidents by analyzing audio signals to identify hazardous situations such as tire skidding and car crashes. The motive of this project is to build a simple and complete audio event detection system using signal feature extraction methods to improve its detection accuracy. The experimental analysis is carried out on a publicly available real time data-set consisting of audio samples like car crashes and tire skidding. The Temporal features of the recorded audio signal like Energy Volume Zero Crossing Rate 28ZCR2529 and the Spectral features like Spectral Centroid Spectral Spread Spectral Roll of factor Spectral Flux the Psychoacoustic features Energy Sub Bands ratio and Gammatonegram are computed. The extracted features are pre-processed and trained and tested using Support Vector Machine (SVM) and K-nearest neighborhood (KNN) classification algorithms for exact prediction of the accident occurrence for various SNR ranges. The combination of Gammatonegram with Temporal and Spectral features of the validates to be superior compared to the existing detection techniques. Findings Temporal, Spectral, Psychoacoustic features, gammetonegram of the recorded audio signal are extracted. A High level vector is generated based on centroid and the extracted features are classified with the help of machine learning algorithms like SVM, KNN and DT. The audio samples collected have varied SNR ranges and the accuracy of the classification algorithms is thoroughly tested. Practical implications Denoising of the audio samples for perfect feature extraction was a tedious chore. Originality/value The existing literature cites extraction of Temporal and Spectral features and then the application of classification algorithms. For perfect classification, the authors have chosen to construct a high level vector from all the four extracted Temporal, Spectral, Psycho acoustic and Gammetonegram features. The classification algorithms are employed on samples collected at varied SNR ranges.


2018 ◽  
pp. 252-269
Author(s):  
Guangyu Wang ◽  
Xiaotian Wu ◽  
WeiQi Yan

The security issue of currency has attracted awareness from the public. De-spite the development of applying various anti-counterfeit methods on currency notes, cheaters are able to produce illegal copies and circulate them in market without being detected. By reviewing related work in currency security, the focus of this paper is on conducting a comparative study of feature extraction and classification algorithms of currency notes authentication. We extract various computational features from the dataset consisting of US dollar (USD), Chinese Yuan (CNY) and New Zealand Dollar (NZD) and apply the classification algorithms to currency identification. Our contributions are to find and implement various algorithms from the existing literatures and choose the best approaches for use.


2019 ◽  
Vol 21 (Supplement_4) ◽  
pp. iv5-iv5
Author(s):  
Taha Lilo ◽  
Camilo Morais ◽  
Kate Ashton ◽  
Ana Pardilho ◽  
Timothy Dawson ◽  
...  

Abstract Introduction Meningioma recurrence remains a clinical dilemma. This has a significant clinical and huge financial implication. Hence, the search for predictors for meningioma recurrence has become an increasingly urgent research topic in recent years. Objective Using spectrochemical analytical methods such as attenuated total reflection Fourier-transform infrared (ATR-FTIR) and Raman spectroscopy, our primary objective is to compare the spectral fingerprint signature of WHO grade I meningioma vs. WHO grade I meningioma that recurred. Secondary objectives compare WHO grade I meningioma vs. WHO grade II meningioma and WHO grade II meningioma vs. WHO grade I meningioma recurrence. Materials and Methods Our selection criteria included convexity meningioma only restricted to Simpson grade I & II only and WHO grade I & grade II only with a minimum 5 years follow up. We obtained tissue from tumour blocks retrieved from the tissue bank. These were sectioned onto slides and de-waxed prior to ATR-FTIR or Raman spectrochemical analysis. Derived spectral datasets were then explored for discriminating features using computational algorithms in the IRootLab toolbox within MATLAB; this allowed for classification and feature extraction. Results After analysing the data using various classification algorithms with cross-validation to avoid over-fitting of the spectral data, we can readily and blindly segregate those meningioma samples that recurred from those that did not recur in the follow-up timeframe. The forward feature extraction classification algorithms generated results that exhibited excellent sensitivity and specificity, especially with spectra obtained following ATR-FTIR spectroscopy. Our secondary objectives remain to be fully developed.


Sign in / Sign up

Export Citation Format

Share Document