Fire image detection based on clustering data mining techniques

被引:0
|
作者
Harkat, H. [1 ,2 ]
Nascimento, J. [1 ,3 ]
Bernardino, A. [4 ]
Ahmed, H. Farhana Thariq [5 ]
机构
[1] Inst Telecomunicacoes, Ave Rovisco Pais 1, P-1049001 Lisbon, Portugal
[2] NOVA Univ Lisbon, Ctr Technol & Syst CTS Uninova, P-2829516 Monte De Caparica, Portugal
[3] IPL, Inst Super Engn Lisboa, Lisbon, Portugal
[4] Univ Lisbon, Inst Syst & Robot, Inst Super Tecn, Lisbon, Portugal
[5] Vellore Inst Technol, Sch Comp Sci & Engn, Chennai 600127, Tamil Nadu, India
关键词
forest fire; feature engineering; ranking methods; clustering techniques; metrics; FEATURE-SELECTION; MUTUAL INFORMATION; FRAMEWORK;
D O I
10.1117/12.2636268
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The number of forest fires is growing exponentially with globalization negative impacts and industry evolution. The firefighters are unable to attend fire sources in the desired elapse time. Hence a huge number of forests are destroyed yearly. The statics demonstrate horrible prediction in a time interval of less than ten years. Necessary action and evolution plans must be established to save the globe from an invasive destruction due to the disappear of green areas and consequent disequilibrating ecosystem effects. The obvious idea is to take advantage of current evolution in informatic systems and robotic field, to develop a distance controllable device to scan areas classified as high risk in the vulnerable season (hot season). The first step is to design a machine learning accurate approach to detect fire area on pictures acquired by probable drone or intelligent systems, responsible of the scanning task. Through literature, several approaches were developed treating pictures that are more with afront view of the flames. Training a machine learning algorithm with such pictures with huge areas of flames is feasible. Nonetheless, treating aerial images is not a very easy approach. A deep analysis of the chosen feature engineering technique and machine learning model is required. The current paper accesses the performance of wavelet-based feature extraction technique within different traditional clustering techniques and ranking methods. The results were accessed using different metrics, to show the effectiveness of the approach, namely sensitivity specificity, precision, recall, f-measure, and g-mean.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Study of remote sensing image classification based on spatial data mining techniques
    Di, Kaichang
    Li, Deren
    Li, Deyi
    Wuhan Cehui Keji Daxue Xuebao/Journal of Wuhan Technical University of Surveying and Mapping, 2000, 25 (01): : 42 - 48
  • [32] Combined data mining techniques based patient data outlier detection for healthcare safety
    Gebremeskel, Gebeyehu Belay
    Yi, Chai
    He, Zhongshi
    Haile, Dawit
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2016, 9 (01) : 42 - 68
  • [33] USING VISUAL DATA MINING TECHNIQUES IN CLUSTERING ANALYSIS AND AN APPLICATION
    Vatansever, Metin
    Buyuklu, Ali Hakan
    SIGMA JOURNAL OF ENGINEERING AND NATURAL SCIENCES-SIGMA MUHENDISLIK VE FEN BILIMLERI DERGISI, 2009, 27 (02): : 83 - 104
  • [34] Data Mining for Predicting Customer Satisfaction Using Clustering Techniques
    Purwandari, Kartika
    Sigalingging, Join W. C.
    Fhadli, Muhammad
    Arizky, Shinta Nur
    Pardamean, Bens
    PROCEEDINGS OF 2020 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND TECHNOLOGY (ICIMTECH), 2020, : 223 - 227
  • [35] COMPARATIVE PERFORMANCE ANALYSIS OF CLUSTERING TECHNIQUES IN EDUCATIONAL DATA MINING
    DeFreitas, Kyle
    Bernard, Margaret
    IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 10 (02): : 65 - 78
  • [36] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [37] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [38] A Comparison of Data Mining Techniques for Intrusion Detection
    Naidu, R. China Appala
    Avadhani, P. S.
    2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44
  • [39] Data mining techniques for detection of sleep arousals
    Shmiel, Oren
    Shmiel, Tomer
    Dagan, Yaron
    Teicher, Mina
    JOURNAL OF NEUROSCIENCE METHODS, 2009, 179 (02) : 331 - 337
  • [40] Outlier Detection: Applications and Techniques in Data Mining
    Bansal, Rashi
    Gaur, Nishant
    Singh, Shailendra Narayan
    2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 373 - 377