A Feature Learning and Object Recognition Framework for Underwater Fish Images with Segmentation
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 3
Abstract
Live fish recognition is one of the most decisive elements of fisheries analysis where the massive amount of data is promptly assimilated .Diverse from wide-ranging scenarios, experiments to underwater image recognition are forwarded by poor image quality, uncontrolled objects and environment, and efforts in obtaining demonstrative illustrations. In addition, most existing feature extraction techniques are caught up from automation due to human observation. Hence, we propose an underwater fish recognition framework that comprises of an entirely unsupervised feature learning procedure and an error-resilient classifier. Object parts are modified based on saliency and slackening cataloging to match objective parts appropriately. A non-rigid typical part is then utilized based on fitness, partition, and refinement measures. For the classifier, an unsupervised clustering methodology yields a binary class order, where every individual node acts as a classifier. The main objective of this process is to appraise the basic beliefs of the efficient processes usually used to analyze type of fish. Experimentations illustrate that the proposed framework attains high accurateness on both public and self-collected underwater fish images with high uncertainty and class imbalance. Also to recover the effectiveness of the progression when related with the other existing process.
Authors and Affiliations
Letcy Fernando O, Rexy J
AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS
The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it ma...
ENCRYPTION BASED INTRUSION DETECTION IN MANET USING AODV ROUTING PROTOCOL
Nowadays, Network is more vulnerable to the security attacks. Especially The effective operation of Mobile Ad-hoc networks (MANETs) compromised by a variety of security attacks depends upon the v...
High Voltage-Boosting Converters Based on Soft-Switched Interleaved Boost Converters
This project objective is to generalize the scheme for new switching interleaved step-up converters that is fit for high power applications and high step-up. In this scheme, high voltage-boosting converters are proposed....
Monitoring Aggression In Adolescents: Chandra Namaskara As A Panacea
Aggression in adolescence is a key point of focus for psychologists, educationists, parents, and teachers. On the other hand, interdisciplinary researches with special reference to yoga and psychology are growing rapidly...
MOBILE ADVERTISING – A STUDY WITH SELECTED SHOPPING CENTERS IN NELLORE, A.P
Mobile advertising is a fresh way of marketing, and it is changing step by step from basic SMS messaging to more interactive and intelligent communication channel, such as MMS and Java based applications. Mobile technolo...