You are on page 1of 43

TRAFFIC VIOLATION AUTOMATION USING QR CODE

A Thesis by

Arlalejo, Ramil J.
Bautista, Sunnie P.
Dairo, John Michael P.
Enderez, Lito M.
Villarmia, Locelyn V.

Submitted to the College of Information Technology


Surigao del Sur State University – Main Campus

In Partial Fulfillment
of the Requirements for the Degree of
Bachelor of Science in Computer Science

March 2020
ii

APPROVAL SHEET

This Thesis entitled TRAFFIC VIOLATION AUTOMATION USING QR CODE, prepared and
submitted by Arlalejo, Ramil J., Bautista, Sunnie P., Dairo, John Michael P., Enderez, Lito M.,
Villarmia, Locelyn V., in partial fulfillment of the requirements for the degree Bachelor of Science
in Computer Science is hereby accepted.

Alimboyong, Catherine
Research Paper Adviser

[Name of Chair]
Chair, Defense Panel

[Name of Panel Member] [Name of Panel Member]


Panel Member Panel Member

Accepted and approved for the conferral of the degree Bachelor of Science in Computer Science.

Born Christian A. Isip, DTE


Dean, College of ITE
iii

DEDICATION
iv

ACKNOWLEDGMENTS
v

TABLE OF CONTENTS
APPROVAL SHEET .................................................................................................... ii

DEDICATION ............................................................................................................. iii

ACKNOWLEDGMENTS............................................................................................. iv

LIST OF TABLES ..................................................................................................... vii

ABSTRACT ................................................................................................................ xi

1 INTRODUCTION ................................................................................................ 1

Background of the Study ............................................................................................... 1

Objectives of the Study .................................................................................................. 4

Significance of the Study ............................................................................................... 5

Scope and Delimitations ................................................................................................ 6

2 THEORETICAL FRAMEWORK ......................................................................... 7

Review of Related Literature ......................................................................................... 7

2.1.1 Overview of your Study ........................................................................................ 7

2.1.2 Arduino Applications .............................................Error! Bookmark not defined.

2.1.3 QR Code Applications .......................................................................................... 7

2.1.4 Face Recognition ..................................................Error! Bookmark not defined.

Concept of the Study.................................................................................................... 17

Definition of Terms ....................................................................................................... 17


vi

3 OPERATIONAL FRAMEWORK ....................................................................... 21

3.1. Materials ........................................................................................................................ 21

3.1.1. Software......................................................................................................... 21

3.1.2. Hardware ....................................................................................................... 21

3.1.3. Data ............................................................................................................... 22

3.1.4. Gantt Chart of Activities ................................................................................. 23

3.2. Methods ......................................................................................................................... 23

3.2.1. Data Gathering Procedure ............................................................................. 24

3.2.2. Proposed System Design .............................................................................. 24

4. RESULTS AND DISCUSSION ......................................................................... 25

4.1. System Process and Design ........................................................................................ 25

4.1.1 Modules ............................................................................................................. 25

5. SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS ........................... 26

5.1. Summary ....................................................................................................................... 26

5.2. Conclusions .................................................................................................................. 26

5.3. Recommendations ....................................................................................................... 26

REFERENCES .......................................................................................................... 27

APPENDICES ........................................................................................................... 29

BIONOTE .................................................................................................................. 32
vii

LIST OF TABLES

Table 3-1. Applications ..................................................................................................................... 21

Table 3-2. Extraction & Classification Computer .............................................................................. 21

Table 3-3. Number of Instances and Classes used for Experiment.....Error! Bookmark not defined.

Table 3-4. Data ................................................................................................................................ 23

Table 3-5. Hyper-parameters ..............................................................Error! Bookmark not defined.

Table 4-1. Input Image Specifications for Pre-trained CNN ArchitecturesError! Bookmark not

defined.

Table 4-2. Confusion Matrix ................................................................Error! Bookmark not defined.

Table 4-3. Input Image Specifications (Proposed Novel Architecture) Error! Bookmark not defined.

Table 4-4. Confusion Matrix ................................................................Error! Bookmark not defined.

Table 4-5. Input Image Specifications (Pre-trained AlexNet Model and Novel Architecture) ...... Error!

Bookmark not defined.

Table 4-6. Input Image Specifications (Pre-trained VGG16 Model and Novel Architecture) ...... Error!

Bookmark not defined.

Table 4-7. Input Image Specifications (Pre-trained GoogLeNet Model and Novel Architecture) Error!

Bookmark not defined.


viii

Table 4-8. Input Image Specifications (Pre-trained ResNet-50 Model and Novel Architecture) . Error!

Bookmark not defined.

Table 4-9. Confusion Matrix ................................................................Error! Bookmark not defined.

Table 4-10. Comparative Improvement ...............................................Error! Bookmark not defined.

LIST OF FIGURES

Figure 2-1. Artificial Neural Network Architecture ...............................Error! Bookmark not defined.

Figure 2-2. Pre-trained LeNet5 Architecture .................................................................................... 15

Figure 2-3. Pre-trained AlexNet Architecture ................................................................................... 16

Figure 2-4. Pre-trained VGG Architecture ........................................................................................ 16

Figure 2-5. Pre-trained GoogLeNet Architecture ............................................................................. 17

Figure 2-6. Pre-trained SqueezeNet Architecture ...............................Error! Bookmark not defined.

Figure 2-7. Pre-trained T-CNN Architecture........................................Error! Bookmark not defined.

Figure 2-8. Pre-trained R-CNN Architecture .......................................Error! Bookmark not defined.

Figure 2-9. Pre-trained Fast R-CNN Architecture ...............................Error! Bookmark not defined.

Figure 2-10. Pre-trained Faster R-CNN ..............................................Error! Bookmark not defined.


ix

Figure 2-11. General steps applied for Image-based classification processError! Bookmark not

defined.

Figure 2-12. Literature Map ................................................................Error! Bookmark not defined.

Figure 2-13. Conceptual Framework of the Study............................................................................ 17

Figure 3-1 Sample images from Kaggle dataset .............................................................................. 22

Figure 3-2. Flow of Implementation ................................................................................................. 23

Figure 3-3 Matlab Code for Image Resizing .......................................Error! Bookmark not defined.

Figure 3-4. Image Resize....................................................................Error! Bookmark not defined.

Figure 3-5. Histogram Equalization .....................................................Error! Bookmark not defined.

Figure 3-6. Image Rotate ....................................................................Error! Bookmark not defined.

Figure 3-7. Color Space Conversion ...................................................Error! Bookmark not defined.

Figure 3-8. (a) Sample of original plant images and (b) Sample of augmented plant images .......... 24

Figure 3-9. Pre-trained AlexNet Architecture ......................................Error! Bookmark not defined.

Figure 3-10. Pre-trained VGG16 Architecture .....................................Error! Bookmark not defined.

Figure 3-11. Pre-trained GoogLeNet Architecture...............................Error! Bookmark not defined.

Figure 3-12. Pre-trained ResNet-50 Architecture ................................Error! Bookmark not defined.


x

Figure 3-13. Proposed CNN Architecture ...........................................Error! Bookmark not defined.

Figure 4-1 Screenshots during Model Training ................................................................................ 25

Figure 4-2 Performance of Pre-trained CNN Architectures .................Error! Bookmark not defined.

Figure 4-3 Screenshots during Model Training ...................................Error! Bookmark not defined.

Figure 4-4. Performance Result of Proposed Novel Architecture .......Error! Bookmark not defined.

Figure 4-5. Sample of Incorrectly Classified .......................................Error! Bookmark not defined.

Figure 4-6 Sample of Correctly Classified Images ..............................Error! Bookmark not defined.

Figure 4-7. Performance Results of Pre-trained AlexNet vs Proposed Novel Architecture ........ Error!

Bookmark not defined.

Figure 4-8. Performance Results of Pre-trained VGG16 vs Proposed Novel Architecture ......... Error!

Bookmark not defined.

Figure 4-9. Performance Results of Pre-trained GoogLeNet vs Proposed Novel Architecture .. Error!

Bookmark not defined.

Figure 4-10. Performance Results of Pre-trained ResNet-50 vs Proposed Novel Architecture.. Error!

Bookmark not defined.


xi

ABSTRACT
1

1 INTRODUCTION

Background of the Study

Road traffic accidents are one amongst the “biggest killers” across the world, according to

the first Global status report on road safety, World Health Organization (WHO).1 more than 1.25

million people die each year on the roads and most of these deaths are occurring in low and

middle income countries. According to global status report on road safety 2015, road traffic

accident is a development issue for low and middle income countries as it lose approximately 3%

of Gross Domestic Product (GDP). Traffic Control and Management System is important

nowadays so as to have a safer and much reliable system.

Traffic in Metro Manila, based on the Global Satisfaction (Waze et al., 2015), is the "worst

traffic on Southeast Asia". Based on the 2015 Census of population by the Philippine Statistics

Authority, the highly urbanized cities of Metro Manila were listed as being some of the densest

cities in the world. However the existing system needs manual monitoring of traffic rule violation

and proposed system includes tracing vehicles automatically without manual help

Additionally, based on police data, speeding ranks second in the top causes of road

crashes, while wrong overtaking is third. Tanseco (2017) said that there were 32,369 reported road

crashes in the country last year. However, both the Philippines National Police (PNP) and

the Department of Transportation (DOTr) claimed that the figures being released by government

authorities is roughly only 15% of the total number. The two agencies decried the lack of a

systematic data-gathering method that can track all the vehicular accidents in the country (Ilagan

et al., 2017).
2

Nevertheless, the existing designs of Traffic Signs Response (TSR) still do not provide

perfect solutions to make driving as safe as it was aspired. In most of the current TSR techniques,

the detection and recognition performance is negatively affected by the many issues. For example,

the traffic sign itself may be subject to deterioration and vandalism. Other factors affect the quality

of the sign images. Such factors include weather conditions, e.g. sunny, shady, rainy or foggy, as

well as locations, e.g. freeways, highways, boulevards, city streets, or country roads (Salahat et

al., 2015).

Due to having a high technological innovation, most of the things we are doing are

automated. Like computers are doing a lot of works, it seems like soon enough it will replace us

from tedious labor works. And in terms of traffic violation system, the plate number of certain

vehicle should be manually inputted in the system. Recently, the machine labor and manual labor

are combined here to create a working vehicle violation system using QR code for fast gathering of

information about the vehicle’s current situation particularly violations. Consequently, to monitor

the vehicle manually is still a very difficult task.

QR code is the type of matrix barcode which was first designed for the automotive industry

by Denso Wave in Japan. It is also a two-dimensional barcodes that contain alphanumeric text and

often feature URL (Uniform Resource Locator). The QR Code system has become admired

outside the automotive industry due to its fast readability and greater storage capacity compared to

standard Universal Product Code (UPC) barcodes. While the technology of mobile phones is

constantly emerging, especially in the area of mobile internet access, QR codes seem to be an

adequate tool to quickly and efficiently converse URLs to users. QR code being so versatile
3

because of its structural flexibility that it leads to so many diverse field for research such as

increasing data capacity, security applications such as different kinds of watermarking and

steganography as well. Some experiments have also been done for better recognition of the QR

code image that includes scratch removal techniques. The existing system is tedious and time

consuming, it requires stopping the vehicle, collecting the owner information, checking his license

and collecting (Chaudhary et. al, 2017).

Many accidents happened due to infringement of traffic rules, driving the vehicle without

proper license. The authorities unsupportive of verifying the identity of every driver on a road and

whether the person driving a vehicle is licensed or not. Hence, defiance of traffic rules has

become more common (Ganesh et.al, 2017). And due to traffic congestion and increasing number

of users on road, it is difficult to identify every vehicle uniquely (Apurva et. al, 2017).

Chorgade et. al, (2018) and Umarani et. al, (2017) developed a system where the database of

users is stored on central database of the Regional Transportation Office (RTO) system. The

administrator can register the new users for service by verifying all documents. Administrator can

also view and manage the database of user as well as traffic police. The lost vehicle database is

also registered by the administrator. The registered user can retrieve the driving license in the form

of QR code. The traffic police can login to the android application and scan the QR code of the

user from his mobile application and the driving license will be fetched from the server. If the traffic

police want to check the driver’s vehicle documents, Registration Certificate (RC) book, insurance

then he/she have to insert the vehicle number of the driver then all the documents are viewed

here. Also, after inserting the vehicle number it will show that whether the vehicle is registered for
4

lost vehicle case or not. Traffic police can apply the ticket if the driver has violated some rules and

the amount of the ticket will be debited from his account. The traffic police can see the history of

fine individual driver. The overall database is updated to the central database server.

Internet on the smart-phones has also increased (Chorgade et. al, 2018). Therefore,

considering the future the reach of smart-phones, use of QR code in the vehicle monitoring

application has been proposed by a number of researchers. Thus, it reduces the efforts of the

traffic police and the public users. Likewise, use of QR code is helpful for quick reaction to

emergency situations such as accidents.

This study is all about a mobile application that can be used in traffic automation. It aims to

ease the workload on both traffic enforcers and traffic administrators. With this the traffic and the

process of writing violations would be assume to quicken by a little bit.

Objectives of the Study

This study aims to develop a Traffic Violation Automation App Using QR code and applies

the new approach to improve the vehicle violation management in our society.

Specifically, this study sought to:

1. Reduce time in searching desired information about the vehicle.

2. Provide easy access to inputting violation to the database.

3. Lessen the work of traffic officer.

4. Responsively shows the information about the vehicle.

5. Shows the drivers recent violations if ever there is one.


5

Significance of the Study

The development of traffic violation automation using QR code opens an opportunity for

other researchers to compare the manual way of tracking the traffic violations to the automated or

intelligent traffic violation systems. Specifically, this study would prove beneficial to the following

entities:

Land Transportation Office. The outcome of this work will served as a tool of automation

for the office’s traffic administrator to quicken up the listing and billing of violations.

Drivers. The shorter time of getting the violation listed the better for the drivers for it will

lessen the traffic as the car can then move out after the violation is listed.

Traffic Enforcer. The quicken automation process of listing the violation aids the enforcers

to avoid being dehydrated by the sun or getting sun burn.

Traffic Administrators. The automation of sending the violations directly to the office
database avoids corruption from the officers. And the hassle of manually encoding the violations
from the tickets is taken away.

Future Researchers. The results reported in this work offers future researchers’

perspective on the possibility to develop a classification model using deep learning algorithm.

Exceeding overflowing possibilities in the tasked of making the traffic violation listing automatic that

can puddle a pool of ideas for future studies.


6

Scope and Delimitations

This scholarly work focused on the development of Traffic Violation Automation App Using

QR Code that can be used to lessen the ticketing hassle of the traffic officer for it will be done in a

mobile device instead. It also provides a useful feature in documentation as it can also attach a

picture to become an evidence for the said offense. And searching the information of the vehicle

will be easy with the help of the application that scans QR code using internet. This study will be

implemented and tested in coordination with the Land Transportation Office in Tandag City,

Surigao del Sur.

.
7

2 THEORETICAL FRAMEWORK

Review of Related Literature

2.1.1 Overview of your Study

Traffic Violation Automation using QR code is an innovative approach which aims to

lessen the tedious work of traffic enforcers.

2.1.2 QR Code Applications

A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary,

and kanji) to efficiently store data; extensions may also be used (Beulah et al., 2018).

Foreign

Chorghade et al., (2018) proposed a system in which the work of traffic police and driver

(user) is simplified. This technology enabled the traffic police to be more effective in controlling

repeat violators of traffic rules. Traffic Police had the database of registration numbers as well as

the history of driving license holders. When a traffic policeman would enter the details of any

vehicle caught violating traffic rules, it would give the complete details of that particular vehicle

including the name and address of owner and the make, model and other details of the vehicle.

Not only this, the details of the driving license holder would also be available. Therefore, enhanced

penalties would be imposed for repetition of violation of traffic rules. Also, the Radio Frequency

Identification (RFID) tag is used to identify the vehicle independently.


8

Foreign

Priya et al., (2016) states that according to road user’s safety and to have a comfortable

travel a system is designed so as to meet and satisfy all those present constraints. This system is

designed with low power consuming devices. The information is transmitted and received using

active RFID tag and reader. Usage of active RFID device added up an advantage to this system so

that it can have a better coverage area. Along with verifying necessary documents speed is also

monitored and warns the user to have a safe drive. We did three simulation experiments with the

help of proteus software. This result helps to attain a feasible solution for traffic system design. In

figure 2.1.2 the fourth case of the simulation is shown and it is ENGINE DISCONNECTED. In our

project if the user tries to disconnect the engine from the motor the Liquid Crystal Display (LCD)

will be in the off condition and so the vehicle is caught by the police officer and then in the figure

2.1.2 we have shown the condition engine disconnected when the switch connection is removed

the case engine disconnected is displayed in LCD.


9

Figure 2-1-2

Foreign

Salahat et al., (2015) proposed a paper; a novel traffic signs recognition system that can

perform simultaneous traffic sign detection, tracking and recognition is presented. The proposed
10

approach utilizes intensity images and the depth images, in parallel, to robustly detect and track

traffic signs on real-time. Additionally, the new quick-response traffic signs recognition system,

which utilizes QR- code plates as a supplement to the conventional traffic signs, is proposed,

inheriting the many advantages of the QR-codes, and introducing the QR-TSR systems.

Foreign
New QR-TSR system flowchart

Nandurkar et al., (2018) developed a system in this Smart Vehicle Investigation System as

per the requirements we developed this System. In existing system manually work was done that

work is over come in this system. Due to these System work had become easier user does not

need to carry documents along with him/her by using smartphone and for searching the unique

identity and retrieve all the documents and information related to the driver.
11

Foreign

Bansod et al., (2017) implement the proposed system using QR scanner, eliminates the

time taken in the challan issuing system and also it would remove black money transaction which

is present in current challan issuing system. Traffic violation can be controlled in a better way. It

will increase the efficiency of traffic police and with the current police strength, traffic can be

controlled. It will also help in curbing the corruption; which we feel is the major issue of our country.

It will reduce traffic offences drastically. With the increasing usage of smart phones and wireless

network infrastructures, passengers are getting acquainted with obtaining information about

timetables, bus arrival time and etc. by means of mobile phones. QR code was created as an

information container forming of two-dimensional by Toyota subsidiary, Denso Wave in 1994. Data

is encoded in QR optically readable format using QR code generators. So, QR code can be

captured and decoded by smart phones. It is capable of handling up to several hundred times

more information than the traditional bar codes unlike conventional bar codes are only capable of

storing twenty digits, according to different versions of QR code.


12

Conceptual Flow of Project

Encryption and Decryption


Foreign

Krishnan et al., (2016) in the existing system there is no digital technology, rather the

entire process of validating the credentials of the vehicle is done manually by verifying the hard

copy of the documents. So the vehicle user will have to carry the hard copy of the documents

wherever he/she goes. The existing system is a time consuming process, causes traffic

congestion, provides lack of transparency and lack of simplification. In the proposed system,

creating an android application, where all the necessary details of a vehicle are coordinated and

stored by the user. By using QR-Code scanning various details of a vehicle and enter them into

this application. This work aims at creating a user-friendly application, therefore the bulk of the

processes are being performed by the admin of the whole application. Security of the application is
13

ensured along with providing authentication for the inspecting authority. This work uses four

servers and correspondingly four databases, J2EE for webpage creation and maintenance, and

two android based applications. The work can be divided into the following modules.

Foreign

Hemadre et al., (2016) developed a system to recognize the QR code that is placed on the

windshield of the car. Usually this system use the license plate that is been recognized, but for the

more secure and errorless recognition the proposed working is on QR code detection. This QR

code is generated from the license plate. QR code is two-dimensional barcode which is developed

from the basics of one-dimensional barcode. It uses bit stream concept. QR code consists of

compressed information of the license plate. Fetched QR code is preprocessed and decrypted to

get code hidden in the QR code.


14

2.1.3 Android Application

Ankam et al., (2018) says that in existing system, traffic management and traffic control

system are totally working on road traffic, employee attendances etc. This system can work

manually also. The design of the application plays a critical role in performance and scalability.

This system is intended to be continuously improved by the expansion of system capabilities. The

system primarily consists of three parts: a mobile operation APP working on the Android system to

collect information; a data warehouse placed in the police department for data storage; and an

efficient and stable data analysis center running in the backend. The mobile operation APP is

based on the Android system and can support versions 4.0 and higher. It is designed to collect

officer data for work performance evaluation and can upload the data to the data warehouse

continuously.
15

Figure 21. Block Diagram of Proposed System

Cite one or two Studies here using Face Recognition

Figure 2-1. [insert here the framework of the study/architecture]


16

Another study on Face Recognition

Figure 2-2. [insert here the framework of the study/architecture]

Another Study on Attendance System using QR Code with Face Recognition

Figure 2-3. [insert here the framework of the study/architecture]

More on Face Recognition


17

Figure 2-4. [insert here the framework of the study/architecture]

Concept of the Study

The paradigm for the study is given in the figure below…….

Figure 2-5. Conceptual Framework of the Study

Insert here the discussion of the conceptual framework…..

Definition of Terms

World Health Organization (WHO) It is a specialized agency of the United Nations that is

concerned with international public health.

Gross Domestic Product (GDP) It is the monetary value of all finished goods and services

made within a country during a specific period.

Census It is an official count or survey of a population, typically


18

recording various details of individuals.

Overtaking It is a term to catch up with and pass while traveling in the

same direction.

Traffic Sign Recognition (TSR) It is a technology by which a vehicle is able to recognize

the traffic signs put on the road e.g. "speed limit" or

"children" or "turn ahead".

Deterioration It is a process of becoming progressively worse.

Automated It is operated by largely automatic equipment.

Tedious It is too long, slow, or dull; tiresome or monotonous.

Machine Labor It is a practice of substituting technology for human labor

to perform specific tasks or jobs.

Manual Labor It is physical work done by people, most especially in

contrast to that done by machines.

QR code It is a machine-readable code consisting of an array of

black and white squares, typically used for storing URLs

or other information for reading by the camera on a

smartphone.

Uniform Resource Locator (URL) It is an address that shows where a particular page can

be found on the World Wide Web.

UPC Barcodes It is consists of 12 numeric digits that are uniquely

assigned to each trade item.

Data Capacity It is referred to the amount of data (information) that can


19

be stored in a tag.

Infringement of Traffic Rules It is an offence against this Act or the Regulations by a

person driving a motor vehicle.

Database It is a data structure that stores organized information.

Android Application It is a software application running on the Android

platform.

Mobile Application It is mostly common referred to as an app, is a type of

application software designed to run on a mobile device,

such as a smartphone or tablet computer.

Android System It is a mobile operating system based on a modified

version of the Linux kernel and other open

source software, designed primarily

for touchscreen mobile devices such

as smartphones and tablets.

Innovative It is a new way of approaches or method.

Puddle a pool It is a small pool, such as one that forms on a sidewalk

after a rain shower.

Scalability It is the property of a system to handle a growing amount

of work by adding resources to the system.

Backend

Binary

Kanji
20

RFID

Safe drive

Proteus

Liquid Crystal Display (LCD)


21

3 OPERATIONAL FRAMEWORK

3.1. Materials

3.1.1. Software

The software used in the study is shown Table 3-1.

Table 3-1. Applications


Name Purpose License

[name of software] served as the primary integrated development environment for system

development or simulation and also served as the main programming language.

3.1.2. Hardware

The minimum computer specifications for executing the simulation of the model are listed

in Table 3-2. A laptop with these specifications were used in the study.

Table 3-2. Classification Computer


Part Specification
Operating System Windows 10 Home Edition 64 bit
Processor 2.8 GHz Intel i7-479090 GPU
Video Card NVIDIA GeForce GTX 1050 Video RAM
Hard Disk Drive 500GB SSD System 1TB SSHD Data
Memory 20 GB RAM
Network 1Gbps 1-port
Keyboard Generic USB
Mouse Generic USB
22

3.1.3. Data

Write in paragraph the data or information gathered…..

Figure 3-1 [insert figure if applicable]

.
23

Table 3-3. Data


Data Purpose Number of Data

3.1.4. Gantt Chart of Activities

Insert the Gantt Chart here…..

3.2. Methods

The general approach used in this study is shown in Figure 3-2. Also discuss the flow of

the implementation in a form of a paragraph.

Figure 3-2. Flow of Implementation


24

3.2.1. Data Gathering Procedure

[discuss the process how you collect and gather the data, write in a form of a

paragraph]

3.2.2. Proposed System Design

Discuss and insert the design of your system……

Figure 3-3. System Design


25

4. RESULTS AND DISCUSSION

4.1. System Process and Design

5.1.1 Modules

Figure 4-1 Screenshots during System Designing


26

5. SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS

5.1. Summary

5.2. Conclusions

Based on the findings derived from this study, the following conclusions were drawn:

1.

2.

3.

5.3. Recommendations

Based on the findings of the study, the following recommendations are made:

1.

2.

3.

4.
27

REFERENCES

Agana, N. A. (2017). A Deep Learning Based Approach for Long-Term Drought Prediction.

Andrearczyk, V., & Whelan, P. F. (2016). Using filter banks in Convolutional Neural Networks for
texture classification. Pattern Recognition Letters, 84, 63–69.
https://doi.org/10.1016/j.patrec.2016.08.016

Andrearczyk, V., Whelan, P. F., & Sep, C. V. (2016). Using Filter Banks in Convolutional Neural
Networks for Texture Classification. https://doi.org/10.1016/j.patrec.2016.08.016

Arel, I., Rose, D. C., & Karnowski, T. P. (2010). Deep Machine Learning - A New Frontier in
Artificial Intelligence Research. IEEE Computational Intelligence Magazine, 5(4), 13–18.
https://doi.org/10.1109/MCI.2010.938364

Onvolutions, D. I. C. (2016). M -s c a d c.

Pool, J., & Dally, W. J. (2017). Learning both Weights and Connections for Efficient Neural
Networks, 1–9.

Ren, S., He, K., & Girshick, R. (2017). Faster R-CNN : Towards Real-Time Object Detection with
Region Proposal Networks, 1–9.

Sakr, C., Kim, Y., & Shanbhag, N. (2017). Analytical Guarantees on Numerical Precision of Deep
Neural Networks.

Sakr, G. E., Mokbel, M., Darwich, A., & Hadi, A. (2016). Comparing Deep Learning And Support
Vector Machines for Autonomous Waste Sorting.

Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85–
117.

Shahiri, A. M., Husain, W., & Rashid, N. A. (2015). A Review on Predicting Student’s Performance
Using Data Mining Techniques. Procedia Computer Science, 72, 414–422.
https://doi.org/10.1016/j.procs.2015.12.157

Shallu, & Mehra, R. (2018). Breast cancer histology images classification: Training from scratch or
transfer learning? ICT Express, 4(4), 247–254. https://doi.org/10.1016/j.icte.2018.10.007

Shan, Z., Zhao, X., Chen, Z., & Mao, M. (2016). Plant Recognition Based on Multi-Feature and
Locality Preserving Projections Fusion Algorithm Zhi-lei SHAN, Xi-lin ZHAO*, Zhuo CHEN
and Man-man MAO, (Cmee).

Taigman, Y., Ranzato, M. A., Aviv, T., & Park, M. (2018). DeepFace : Closing the Gap to Human-
28

Level Performance in Face Verification.

Wang, J., Yan, K., Guo, K., Yu, J., Sui, L., Yao, S., … Wang, Y. (2016). Real-time pedestrian
detection and tracking on customized hardware. In Proceedings of the 14th ACM/IEEE
Symposium on Embedded Systems for Real-Time Multimedia (p. 1).

Yap, K. S., Wong, S. Y., & Tiong, S. K. (2013). Compressing and Improving Fuzzy Rules Using
Genetic Algorithm and Its Application to Fault Detection.

Zak, S. H. (2003). Systems and Control ˙.

Zhang, H., Zheng, X., & Tian, J. (2016). Virtual Network Mapping based on the Prediction of
Support Vector Machine. https://doi.org/10.1109/ITME.2016.192

Zhang, M.-L., & Zhou, Z.-H. (2014). A Review on Multi-Label Learning Algorithms. IEEE
Transactions on Knowledge and Data Engineering, 26(8), 1819–1837.
https://doi.org/10.1109/TKDE.2013.39
29

APPENDICES

Appendix A: Confusion Matrix during Model Testing and Validation (Simulation 1)


30

Appendix B: Confusion Matrix during Model Testing and Validation (Simulation 2)


31

Appendix C: Confusion Matrices during Model Testing and Validation (Simulation 3)


32

BIONOTE

CATHERINE ROY ALIMBOYONG, is an Assistant Professor II at

the Surigao del Sur State University - Main Campus, Tandag City,

Surigao del Sur. She joined the academe in 2007 at the said

university.

She is a member of the Institute of Electronics and Electrical

Engineers (IEEE) and the Philippine Society of Information

Technology Educators (PSITE). Her research interests include data mining and machine learning

and she has had paper presentations in several international conferences. She also has several

publications in the said areas.

The author may be reached at catherinealimboyong@gmail.com.

You might also like