Tripathi, Mukesh Kumar
Unknown Affiliation

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Notice of Retraction An NFMF-DBiLSTM model for human anomaly detection system in surveillance videos Angadi, Sanjeevkumar; Moorthy, Chellapilla V. K. N. S. N.; Tripathi, Mukesh Kumar; Tingare, Bhagyashree Ashok; Kadam, Sandeep Uddhavrao; Misal, Kapil
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp647-656

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles. We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.-----------------------------------------------------------------------In response to the increasing demand for an intelligent system to avoid abnormal events, many models for detecting and locating anomalous behaviors in surveillance videos have been proposed. Nevertheless, significant flaws of inadequate discriminating ability are present in the majority of these models. A novel newton form and monotonic function based deep bidirectional long short-term memory (NFMF-DBiLSTM) human anomaly recognition system was discussed in this paper to tackle those issues. Initially, videos are transformed into frames; after that, the duplicate frames are removed, and by utilizing the shannon entropy centered contrast limited adaptive histogram equalization (SE-CLAHE) algorithm, the contrast has been elevated. By using the probabilistic matrix factorization kernel density estimation (PMF-KDE) technique, the background is subtracted after estimating only the motion of the object. After this, the silhouette function is performed utilizing the dirac depth silhouette function (DDSF). In addition, clustering is done by sorting and average-based K-means (SA-KM). The features are extracted from the suspected human and are then chosen by utilizing Poisson Eurasian oystercatcher optimization (PEOO). For classifying normal or anomaly, the selected features are subjected directly into the NFMF-DBiLSTM. When contrasted with the prevailing methodologies, the proposed model is found to be more efficient.
Analyzing electroencephalogram signals with machine learning to comprehend online learning media Venu, Vasantha Sandhya; Moorthy, Chellapilla V. K. N. S. N.; Patil, Preeti S.; Kale, Navnath D.; Andhare, Chetan Vikram; Tripathi, Mukesh Kumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1876-1885

Abstract

In E-learning, evaluating students' comprehension of lecture video content is significant. The surge in online platform usage due to the pandemic has been remarkable, but the pressing issue is that learning outcomes still need to match the growth. Addressing this, a scientific system that gauges the comprehensibility of lecture videos becomes crucial for the effective design of future courses. This research paper is based on a cognitive approach utilizing EEG signals to determine student's level of comprehension. The study involves the design, evaluation, and comparison of multiple machines learning models, aiming to contribute to developing an efficient learning system. Fifteen distinct machine learning (ML) classifiers were implemented, among them AdaBoost (ADA), gradient boosting (GBC), extreme gradient boosting (XGboost), extra trees (ET), random forest (RF), light gradient boosting machine (light gum), and decision tree (DT) algorithms standouts. The DT exhibited exceptional performance across metrics such as area under the curve (AUC), accuracy, recall, F1 score, Kappa, precision, and matthews correlation coefficient (MCC). It achieved nearly 1.0 in these metrics while taking a short training time of only 1.7 seconds. This reveals its potential as an efficient classifier for electroencephalography (EEG) datasets and highlights its viability for practical implementation.
High-resolution aerial monitoring using DL for identifying abnormal activity based on visual patterns in drone videos Tripathi, Mukesh Kumar; Moorthy, Chellapilla V. K. N. S. N.; Kadam, Sandeep; Shewale, Chaitali; Shelke, Priya; Futane, Pravin R.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1827-1835

Abstract

Unmanned aerial vehicles (UAVs) and sophisticated deep learning (DL) models have made the application of artificial intelligence (AI) more popular. This has resulted in an increase in the number of attempts to improve high-resolution aerial monitoring using DL for identifying abnormal activity based on visual patterns in drone videos. The study introduces a one-class support vector machine (OC-SVM) oddity locator for low-altitude, limited-scope UAVs used for ethereal video surveillance. The primary goal is to improve UAV-based observation capabilities by identifying areas or things of interest without prior knowledge, hence improving tasks like queue control, vehicle following, and hazardous product identification. The framework makes use of OC-SVM because of its quick and lightweight setup, making it suitable for continuous operation on low-computational UAVs. It empowers the identification of several peculiarities necessary for low-elevation reconnaissance by using textural characteristics to recognise both large-scale and tiny structures. Examine the UAV mosaicking and change location (UMCD) dataset to demonstrate the effectiveness of the framework, which achieves excellent accuracy and outperforms traditional methods by about one fifth in a variety of metrics. The suggested model compares with current methods, demonstrating superior accuracy and performance in recognition of peculiarities. Evaluation metrics include F1-score, review, exactness, and accuracy. The model demonstrates that it always encounters an oddity with a review compromise of up to seven on ten, achieving complete accuracy.
Identification of soluble solid content and total acid content using real-time visual inspection system Moorthy, C. H. V. K. N. S. N.; Tripathi, Mukesh Kumar; Hudagi, Manjunath R.; Hadimani, Lingaraj A.; Chavan, Gayatri Sanjay; Angadi, Sanjeevkumar
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp238-246

Abstract

This paper presents the framework for identifying materials using a fused descriptor-based approach, leverage computer vision techniques. The system is structured into three phases: derivation, extraction, and portrayal. Initially, the system employs K-means gathering techniques for establishing derivation. Following derivation, the system utilizes variety, texture, and shape-based feature extraction methods to extract relevant features from the soluble solid content and total acid content using real-time visual inspection system. A “consolidating” fusion feature is explored in the final phase using classification algorithms like C4.5, support vector machines (SVM), and k-nearest neighbors (KNN). The performance evaluation of the recognition system demonstrates promising results, with accuracy rates of 97.89%, 94.60%, and 90.25% achieved by using C4.5, SVM, and KNN separately. This indicates that the proposed fusion strategy effectively supports accurately recognizing materials using a fused descriptor-based approach.