<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     caa a22        4500</leader>
  <controlfield tag="001">606229000</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20210128101206.0</controlfield>
  <controlfield tag="007">cr unu---uuuuu</controlfield>
  <controlfield tag="008">210128e20150801xx      s     000 0 eng  </controlfield>
  <datafield tag="024" ind1="7" ind2="0">
   <subfield code="a">10.1007/s10796-013-9481-2</subfield>
   <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(NATIONALLICENCE)springer-10.1007/s10796-013-9481-2</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Emam</subfield>
   <subfield code="D">Ahmed</subfield>
   <subfield code="u">Information Systems Department, College of Computer and Information Systems, King Saud University, Riyadh, Saudi Arabia</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Intelligent drowsy eye detection using image mining</subfield>
   <subfield code="h">[Elektronische Daten]</subfield>
   <subfield code="c">[Ahmed Emam]</subfield>
  </datafield>
  <datafield tag="520" ind1="3" ind2=" ">
   <subfield code="a">Cell phones, MP4 players, and GPS all distract drivers, forcing them to divide their attention to what is happening outside and what is happening inside the vehicle. Preventing drivers from falling asleep at the wheel and drifting off on the road is an increasingly hard task but a solution can be achieved with today's technology: by capturing driver's eye gaze and thus the level of their exhaustion, the potential for safer roads is real. Today, image mining systems can automatically extract important information from an image dataset which can then be used to classify images and image relationship that been applied in different areas. The basic challenge in image mining research area is to determine how image level pixel representation in an original image can be used and constructed to then identify meaningful information or form relationships. In this research Intelligent Drowsy Eye Detection, using an Image Mining (IDEDIM) system is proposed. The proposed architecture would use different feature extraction techniques and three data mining classification techniques to aid with accurate information collection. Two thousand left and right eye images were used to test the developed system by Discrete Wavelet Transform (DWT), Statistical features, and Local binary pattern (LBP) feature extraction techniques. The extracted features were used as input for Decisions Tree C5.0, K Nearest Neighbor (KNN), and the Support Vector Machine (SVM) Classifier. After several experimental sets, the C5.0 and KNN classifier were performing better than SVM classifier. Based on the results, we recommend the inclusion of LBP and DWT in conjunction with C5.0 with KNN as a classification technique. To validate the achieved results, Receiver Operating Characteristic (ROC) curve is used to compare among the proposed classifiers. The proposed system can be integrated with the existing subsystem into real time Drowsy Detection System to achieve excellent accuracy and performance.</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
   <subfield code="a">Springer Science+Business Media New York, 2014</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Image mining</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Eye image mining</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Feature extraction</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Classification</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Decisions Tree C5.0</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">K Nearest Neighbor (KNN)</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Support Vector Machine (SVM)</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="t">Information Systems Frontiers</subfield>
   <subfield code="d">Springer US; http://www.springer-ny.com</subfield>
   <subfield code="g">17/4(2015-08-01), 947-960</subfield>
   <subfield code="x">1387-3326</subfield>
   <subfield code="q">17:4&lt;947</subfield>
   <subfield code="1">2015</subfield>
   <subfield code="2">17</subfield>
   <subfield code="o">10796</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://doi.org/10.1007/s10796-013-9481-2</subfield>
   <subfield code="q">text/html</subfield>
   <subfield code="z">Onlinezugriff via DOI</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK010053</subfield>
   <subfield code="b">XK010053</subfield>
   <subfield code="c">XK010000</subfield>
  </datafield>
  <datafield tag="900" ind1=" " ind2="7">
   <subfield code="a">Metadata rights reserved</subfield>
   <subfield code="b">Springer special CC-BY-NC licence</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="908" ind1=" " ind2=" ">
   <subfield code="D">1</subfield>
   <subfield code="a">research-article</subfield>
   <subfield code="2">jats</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="F">NATIONALLICENCE</subfield>
   <subfield code="b">NL-springer</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://doi.org/10.1007/s10796-013-9481-2</subfield>
   <subfield code="q">text/html</subfield>
   <subfield code="z">Onlinezugriff via DOI</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">100</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Emam</subfield>
   <subfield code="D">Ahmed</subfield>
   <subfield code="u">Information Systems Department, College of Computer and Information Systems, King Saud University, Riyadh, Saudi Arabia</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">773</subfield>
   <subfield code="E">0-</subfield>
   <subfield code="t">Information Systems Frontiers</subfield>
   <subfield code="d">Springer US; http://www.springer-ny.com</subfield>
   <subfield code="g">17/4(2015-08-01), 947-960</subfield>
   <subfield code="x">1387-3326</subfield>
   <subfield code="q">17:4&lt;947</subfield>
   <subfield code="1">2015</subfield>
   <subfield code="2">17</subfield>
   <subfield code="o">10796</subfield>
  </datafield>
 </record>
</collection>
