This document summarizes an article from the International Journal of Advanced Research in Computer Engineering & Technology about developing an artificial neural network based clustering method for atmospheric conditions prediction in Indian cities. The method uses Adaptive Resonance Theory (ART) neural networks to form clusters of cities based on their monthly atmospheric condition data (temperature, pressure, humidity). ART networks can self-organize to create stable clusters while learning new patterns. The authors apply city data to an ART network to create clusters representing associations between cities with similar atmospheric conditions. This allows predicting conditions in one city based on patterns from another in the same cluster. The ART-based clustering method shows cities grouped in the same cluster have comparable monthly atmospheric conditions.
Analog signal processing approach for coarse and fine depth estimationsipij
This document discusses an analog signal processing approach for coarse and fine depth estimation using stereo image pairs. It proposes modifications to existing normalized cross correlation (NCC) and sum absolute differences (SAD) stereo correspondence algorithms to reduce computation time. For the NCC algorithm, it suggests using only the diagonal elements of image blocks to compute correlation, reducing computations from 2D to 1D. For hardware implementation, it presents a new imaging architecture with parallel analog and digital systems, where the analog system performs the computationally intensive NCC algorithm on sensor data in real-time to reduce overall processing time compared to digital-only systems. Experimental results show the modified algorithms can achieve faster computation speeds without compromising performance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Weeds detection efficiency through different convolutional neural networks te...IJECEIAES
The preservation of the environment has become a priority and a subject that is receiving more and more attention. This is particularly important in the field of precision agriculture, where pesticide and herbicide use has become more controlled. In this study, we propose to evaluate the ability of the deep learning (DL) and convolutional neural network (CNNs) technology to detect weeds in several types of crops using a perspective and proximity images to enable localized and ultra-localized herbicide spraying in the region of Beni Mellal in Morocco. We studied the detection of weeds through six recent CNN known for their speed and precision, namely, VGGNet (16 and 19), GoogLeNet (Inception V3 and V4) and MobileNet (V1 and V2). The first experiment was performed with the CNNs architectures from scratch and the second experiment with their pre-trained versions. The results showed that Inception V4 achieved the highest precision with a rate of 99.41% and 99.51% on the mixed image sets and for its version from scratch and its pre-trained version respectively, and that MobileNet V2 was the fastest and lightest with its size of 14 MB.
The recent rapid progress in ICT technologies such as smart/intelligent sensor devices, broadband / ubiquitous networks, and Internet of everything (IoT) has advanced the penetration of sensor networks and their applications. The requirements of human daily life, security, energy efficiency, safety, comfort, and ecological, can be achieved with the help of these networks and applications. Traditionally, if we want some information on, for example, environment status, a variety of dedicated sensors is needed. This will increase the number of sensors installed and thus system cost, sensor data traffic loads, and installation difficulty. Therefore, we need to find redundancies in the captured information or interpret the semantics captured by non-dedicated sensors to reduce sensor network overheads. This paper clarifies the feasibility of recognizing human presence in a space by processing information captured by other than dedicated sensors. It proposes a method and implements it as a cost-effective prototype sensor network for a university library. This method processes CO2 concentration, originally designed to check environment status. In the experiment, training data is captured with none, one, or two subjects. The information gain (IG) method is applied to the resulting data, to set thresholds and thus judge the number of people. Human presence (none, one or two people) is accurately recognized from the CO2 concentration data. The experiments clarify that a CO2 sensor in set in a small room to check environment status can recognize the number of humans in the room with more than 70 % accuracy. This eliminates the need for an extra sensor, which reduces sensor network cost.
This document describes using an artificial neural network (ANN) model to optimize the cost of reinforced concrete beams designed according to ACI 318-08 code requirements. The ANN model considers costs of concrete, reinforcement steel, and formwork. A simply supported beam was designed with variable cross-sectional dimensions to demonstrate the model. Computer models were developed using NEURO SHELL-2 software and results were compared to a classical optimization model in Excel using generalized reduced gradient methods, showing good agreement between the two approaches. The document provides details on the ANN model formulation, including design variables, constraints, and objective function to minimize total cost. An example problem is presented to optimize the design of a simply supported beam.
Multi sensor data fusion system for enhanced analysis of deterioration in con...Sayed Abulhasan Quadri
This document proposes a multi-sensor data fusion system to enhance the analysis of concrete deterioration due to alkali-aggregate reaction (AAR). The system uses different sensor types like acoustic, electro-mechanical, optical, and embedded sensors to collect internal and external damage data. Feature extraction and a decentralized Kalman filter are used to fuse the heterogeneous sensor data. An artificial neural network then characterizes and quantifies the damage levels. The study expects to improve accuracy over single sensor systems and establish correlations between surface damage, internal damage, and gel concentration levels causing structural deterioration.
This document summarizes a research paper on changing data rates during handoffs in GSM-ATM networks. It discusses:
1) Wireless ATM networks which combine ATM's support for multimedia services with mobility support for mobile devices. This poses challenges like mobility management and ensuring quality of service during handoffs.
2) Handoff is the process of transferring a mobile terminal's connections from one access point to another during movement. It involves initiation, establishing a new connection, and data flow control to maintain quality of service.
3) The document reviews different handoff types in wireless ATM networks and various handoff protocol approaches like full connection re-routing, route augmentation, and partial connection re-routing
This document discusses the development and management of an information security lifecycle based on standards. It begins by discussing the importance of information security for organizations and describes the key components of information security. It then discusses adopting a standards-based approach to security policy using the British Standard 7799 as a guideline. This involves assessing network assets and risks, designing a security policy, deploying security measures, and ongoing management and support through monitoring and education. The lifecycle approach helps ensure security is addressed systematically from the start of a project through ongoing management.
1) The document discusses VLSI architecture and implementation for 3D neural network based image compression. It proposes developing new hardware architectures optimized for area, power, and speed for implementing 3D neural networks for image compression.
2) A block diagram is presented showing the overall process of image acquisition, preprocessing, compression using a 3D neural network, and encoding for transmission.
3) The proposed 3D neural network architecture uses multiple hidden layers with lower dimensions than the input and output layers to perform the compression and decompression transformations between the image pixels and hidden layer representations.
1. The document describes an application of the unscented Kalman filter (UKF) for state estimation in sonar signal processing.
2. It provides background on linear and nonlinear state estimation techniques, including the Kalman filter, extended Kalman filter, unscented Kalman filter, and particle filter.
3. As an example, it models target tracking using bearing-only measurements, where the target is assumed to move at constant course and velocity. The UKF is used to estimate the target state parameters in the presence of measurement noise.
This paper proposes a wide dynamic range CMOS sensor with gating capabilities for use in night vision and multiple applications. The sensor can detect objects within 15 meters in day or night conditions with centimeter accuracy. It integrates high functionality pixels to extract distance and reflectivity information. This data is modulated into an active optical signal during light propagation, allowing each pixel to act as an individual stopwatch. The system is directly interfaced with vehicle controls to automatically apply the brakes if an object is detected within 10 meters, improving safety. Potential applications include biomedical, industrial, surveillance and more.
This document presents a proposed approach called ICCC (Information Correctness to the Customers in Cloud Data Storage) to provide customers with proof of the correctness of their data stored in the cloud. The ICCC approach aims to minimize storage and computation costs for both customers and cloud storage providers. It involves the customer pre-processing their file by generating and encrypting metadata about random bits of each data block before uploading the file. This metadata is appended to the file. To verify correctness, the customer challenges the cloud storage provider by specifying a data block and bit, and the provider must return the correct metadata bit. This allows verification with minimal access to the entire file and low overhead for both parties.
This document summarizes a research paper on tracking multiple targets using the mean shift algorithm. It begins by stating that multi-target tracking is challenging due to factors like noise, clutter, occlusions, and sudden changes in velocity. The mean shift algorithm is then introduced as a kernel-based tracking method that works by iteratively shifting target locations to their mean shifts. Targets are represented using histograms within elliptical regions. The Bhattacharyya coefficient is used to measure similarity between target models and candidates. Experimental results on a video sequence show the algorithm can accurately track targets under small displacements but performance degrades for large displacements, fast motion, or occlusions. In conclusion, the mean shift algorithm provides a simple method for multi
1) The document discusses a GSM based power meter reading and control system that uses GSM technology to remotely read electricity meters and control home appliances.
2) Current manual meter reading is time-consuming and prone to errors. The proposed system sends daily meter readings via SMS to both users and the electricity department to generate accurate bills.
3) It also allows remote control of appliances to reduce unnecessary power consumption and save energy by monitoring power usage and controlling loads that exceed predefined limits.
This document summarizes the current state of middleware and operating systems used in wireless sensor networks (WSNs). It discusses the need for middleware to facilitate application development on resource-constrained sensor nodes. It categorizes existing middleware approaches and describes desirable middleware characteristics. It also discusses sensor node hardware, including different sensor platforms and their properties. Challenges in designing operating systems for WSNs given limitations in memory, power, and other resources are outlined. Finally, desirable features for sensor node operating systems are presented.
A Time Series ANN Approach for Weather Forecastingijctcm
Weather forecasting is most challenging problem around the world. There are various reason because of its experimented values in meteorology, but it is also a typical unbiased time series forecasting problem in scientific research. A lots of methods proposed by various scientists. The motive behind research is to predict more accurate. This paper contribute the same using artificial neural network (ANN) and simulated in MATLAB to predict two important weather parameters i.e. maximum and minimum temperature. The model has been trained using past 60 years of real data collected from(1901-1960) and tested over 40 years to forecast maximum and minimum temperature. The results based on mean square error function (MSE) confirm, this model which is based on multilayer perceptron has the potential to successful application to weather forecasting
Optimal artificial neural network configurations for hourly solar irradiation...IJECEIAES
Solar energy is widely used in order to generate clean electric energy. However, due to its intermittent nature, this resource is only inserted in a limited way within the electrical networks. To increase the share of solar energy in the energy balance and allow better management of its production, it is necessary to know precisely the available solar potential at a fine time step to take into account all these stochastic variations. In this paper, a comparison between different artificial neural network (ANN) configurations is elaborated to estimate the hourly solar irradiation. An investigation of the optimal neurons and layers is investigated. To this end, feedforward neural network, cascade forward neural network and fitting neural network have been applied for this purpose. In this context, we have used different meteorological parameters to estimate the hourly global solar irirradiation in the region of Laghouat, Algeria. The validation process shows that choosing the cascade forward neural network two inputs gives an R2 value equal to 97.24% and an normalized root mean square error (NRMSE) equals to 0.1678 compared to the results of three inputs, which gives an R2 value equaled to 95.54% and an NRMSE equals to 0.2252. The comparison between different existing methods in literature show the goodness of the proposed models.
Applications of Artificial Neural Networks in Civil EngineeringPramey Zode
An artificial brain-like network based on certain mathematical algorithms developed using a numerical computing environment is called as an ‘Artificial Neural Network (ANN)’. Many civil engineering problems which need understanding of physical processes are found to be time consuming and inaccurate to evaluate using conventional approaches. In this regard, many ANNs have been seen as a reliable and practical alternative to solve such problems. Literature review reveals that ANNs have already being used in solving numerous civil engineering problems. This study explains some cases where ANNs have been used and its future scope is also discussed.
Application Of Artificial Neural Networks In Civil EngineeringJanelle Martinez
The document is a seminar report on applications of artificial neural networks in civil engineering. It discusses the structure and basic components of biological and artificial neurons. It also describes the basic steps to design an artificial neural network, including arranging neurons in layers, deciding connections between layers and neurons, and determining connection weights through training. Finally, it covers several learning techniques used to train neural networks, including backpropagation, radial basis functions, and reinforcement learning.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Chapter 5 applications of neural networksPunit Saini
Neural networks are being used experimentally in several medical applications, including modeling the cardiovascular system and diagnosing medical conditions. They can be used to detect diseases by learning from examples without needing a specific algorithm. Neural networks are also being explored for applications like implementing electronic noses for telemedicine. Researchers are working to build artificial brains more cheaply using field programmable gate arrays (FPGAs) on commercial boards, which could enable evolving millions of neural network modules at electronic speeds. Genetic algorithms are also being combined with neural networks to help optimize their structure and performance for tasks like object recognition.
Analysis of intelligent system design by neuro adaptive controliaemedu
This document summarizes the analysis of intelligent system design using neuro-adaptive control methods. It discusses using neural networks for system identification through series-parallel and parallel models. It also discusses supervised control using a neural network trained by an expert operator, inverse control using a neural network trained on the inverse system model, and neuro-adaptive control using two neural networks - one for system identification and one for control. Neuro-adaptive control allows handling nonlinear system behavior without linear approximations.
Analysis of intelligent system design by neuro adaptive control no restrictioniaemedu
This document discusses using neuro-adaptive control to analyze the design of intelligent systems. It begins by introducing the topic and noting that conventional adaptive control techniques assume explicit system models or dynamic structures based on linear models, which may not be valid for complex nonlinear systems. Neural networks and other intelligent control approaches that do not require explicit mathematical modeling are presented as alternatives. The paper then focuses on using time-delay neural networks for system identification and control of nonlinear dynamic systems. Various neural network architectures and learning algorithms for system modeling and control are described.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document contains two papers. The first paper summarizes a study that designed a prototype smoke detection device for a student dormitory at Klabat University using a microcontroller, MQ-7 and UV-Tron sensors, buzzer, and SMS gateway to detect cigarette smoke and notify users. The second paper proposes a wireless sensor network design for environmental monitoring applications to measure temperature, humidity, CO2, and other factors.
This document describes a preprocessing expert system for mining association rules from alarm data in telecommunication networks. The system addresses several issues with directly mining the original alarm data, including time non-synchronization of alarms and the need to assign different weights to alarm attributes. The proposed system uses a time window technique to convert original alarms into transactions and a neural network to classify alarms into different levels according to their characteristics, in order to mine weighted association rules. Simulation results demonstrate the effectiveness of the preprocessing expert system in analyzing alarm correlation for fault diagnosis.
This document describes a preprocessing expert system for mining association rules from alarm data in telecommunication networks. The system addresses several issues with directly mining the original alarm data, including time non-synchronization of alarms and the need to assign different weights to different alarm attributes. The proposed system uses a time window technique to convert original alarms into transactions and a neural network technique to classify alarms into different levels based on their characteristics, in order to mine weighted association rules. Simulation results and a real-world application demonstrate the effectiveness of the preprocessing expert system.
The accurate prediction of solar irradiation has been
a leading problem for better energy scheduling approach.
Hence in this paper, an Artificial neural network based solar
irradiance is proposed for five days duration the data is
obtained from National Renewable Energy Laboratory, USA
and the simulation were performed using MATLAB 2013. It
was found that the neural model was able to predict the solar
irradiance with a mean square error of 0.0355.
Predict the Average Temperatures of Baghdad City by Used Artificial Neural Ne...IJERA Editor
This paper utilizes artificial neural networks (ANN) technique to improve temperature forecast performance of
Baghdad city. Our study based on Feed Forward Backpropagation Artificial Neural Networks (BPANN)
algorithm of which trained and tested by used a real world daily average temperatures of Bagdad city for ten
years past for months of January and July. Aimed at providing forecasts in a schedule, for all Days of the month
to help the meteorologist to foresee future weather temperature accurately and easily. Forecasts by ANN model
has been compared with the actual results and the realistic output (with IMOS). The results has been Compared
to the practical temperature prediction results, and shows that the BPANN forecasts have accuracy that gave
reasonably very good result and can be considered as a good method for temperature predicting..
IRJET- Agricultural Crop Yield Prediction using Deep Learning ApproachIRJET Journal
This document discusses using artificial neural networks to predict agricultural crop yields. It begins with an abstract that outlines using ANNs to predict crop yield given various input parameters like soil pH, nitrogen levels, temperature, rainfall, etc. It then provides an introduction on the importance of accurate crop yield prediction. The next sections discuss literature on previous ANN crop yield prediction models, the proposed ANN approach including network architecture and activation functions, the design process, and conclusions. The key points are that ANNs can accurately predict crop yields given various climatic and soil inputs, and providing farmers with these predictions could help maximize profits and minimize losses.
IRJET - Intelligent Weather Forecasting using Machine Learning TechniquesIRJET Journal
This document discusses using machine learning techniques to forecast weather intelligently. It proposes using multi-target regression and recurrent neural network (RNN) models trained on historical weather data from Bangalore to predict future weather conditions like temperature, humidity, and precipitation. The data is first preprocessed before being fed to the models. The models are evaluated to accurately predict weather in the short term to help people like farmers and commuters without relying on expensive equipment.
Efficiency of recurrent neural networks for seasonal trended time series mode...IJECEIAES
Seasonal time series with trends are the most common data sets used in forecasting. This work focuses on the automatic processing of a
non-pre-processed time series by studying the efficiency of recurrent neural networks (RNN), in particular both long short-term memory (LSTM), and bidirectional long short-term memory (Bi-LSTM) extensions, for modelling seasonal time series with trend. For this purpose, we are interested in the learning stability of the established systems using the mean average percentage error (MAPE) as a measure. Both simulated and real data were examined, and we have found a positive correlation between the signal period and the system input vector length for stable and relatively efficient learning. We also examined the white noise impact on the learning performance.
This paper introduces the Artifi cial Neural Networks (ANN) function to model probabilistic dependencies, in supervised classification tasks for discrimination between earthquakes and explosions problems. ANNs are regarded as the discriminating tools to classify the natural seismic events (earthquakes) from the artifi cial ones (Man-made explosions) based on the seismic signals recorded at regional distances. The bulk of our novel is to improve the obtained numerical results using this advance technique. The ANNs, by testing the different types of seismic features, showed the potential application of this method to discriminate the classes. During the above study, we found out that the Neural Networks have been used in a fully innovative manner in this work. Here the ARMA coefficients filters detects
the type of the source whenever a natural or artificial source changes the nature of the background noise of the seismograms. During the above study, we found out that this algorithm is sometimes capable to alarm the further natural seismological events just a little before the onset.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
This document provides a comparative study of two-way finite automata and Turing machines. Some key points:
- Two-way finite automata are similar to read-only Turing machines in that they have a finite tape that can be read in both directions, but cannot write to the tape.
- Turing machines have an infinite tape that can be read from and written to, allowing them to recognize recursively enumerable languages.
- Both models are examined in their ability to accept the regular language L={anbm|m,n>0}.
- The time complexity of a two-way finite automaton for this language is O(n2) due to making two passes over the
This document analyzes and compares the performance of the AODV and DSDV routing protocols in a vehicular ad hoc network (VANET) simulation. Simulations were conducted using NS-2, SUMO, and MOVE simulators for a grid map scenario with varying numbers of nodes. The results show that AODV performed better than DSDV in terms of throughput and packet delivery fraction, while DSDV had lower end-to-end delays. However, neither protocol was found to be fully suitable for the highly dynamic VANET environment. The document concludes that further work is needed to develop improved routing protocols optimized for VANETs.
This document discusses the digital circuit layout problem and approaches to solving it using graph partitioning techniques. It begins by introducing the digital circuit layout problem and how it has become more complex with increasing circuit sizes. It then discusses how the problem can be decomposed into subproblems using graph partitioning to assign geometric coordinates to circuit components. The document reviews several traditional approaches to solve the problem, such as the Kernighan-Lin algorithm, and discusses their limitations for larger circuit sizes. It also discusses more recent approaches using evolutionary algorithms and concludes by analyzing the contributions of various approaches.
This document summarizes various data mining techniques that have been used for intrusion detection systems. It first describes the architecture of a data mining-based IDS, including sensors to collect data, detectors to evaluate the data using detection models, a data warehouse for storage, and a model generator. It then discusses supervised and unsupervised learning approaches that have been applied, including neural networks, support vector machines, K-means clustering, and self-organizing maps. Finally, it reviews several related works applying these techniques and compares their results, finding that combinations of approaches can improve detection rates while reducing false alarms.
This document provides an overview of speech recognition systems and recent progress in the field. It discusses different types of speech recognition including isolated word, connected word, continuous speech, and spontaneous speech. Various techniques used in speech recognition are also summarized, such as simulated evolutionary computation, artificial neural networks, fuzzy logic, Kalman filters, and Hidden Markov Models. The document reviews several papers published between 2004-2012 that studied speech recognition methods including using dynamic spectral subband centroids, Kalman filters, biomimetic computing techniques, noise estimation, and modulation filtering. It concludes that Hidden Markov Models combined with MFCC features provide good recognition results for large vocabulary, speaker-independent, continuous speech recognition.
This document discusses integrating two assembly lines, Line A and Line B, based on lean line design concepts to reduce space and operators. It analyzes the current state of the lines using tools like takt time analysis and MTM/UAS studies. Improvements are identified to eliminate waste, including methods improvements, workplace rearrangement, ergonomic changes, and outsourcing. Paper kaizen is conducted and work elements are retimed. The goal is to integrate the lines to better utilize space and manpower while meeting manufacturing standards.
This document summarizes research on the exposure of microwaves from cellular networks. It describes how microwaves interact with biological systems and discusses measurement techniques and safety standards regarding microwave exposure. While some studies have alleged health hazards from microwaves, independent reviews by health organizations have found no evidence that exposure to microwaves below international safety limits causes harm. The document concludes that with precautions like limiting exposure time and using phones with lower SAR ratings, microwaves from cell phones pose minimal health risks.
This document summarizes a research paper that examines the effect of feature reduction in sentiment analysis of online reviews. It uses principle component analysis to reduce the number of features (product attributes) from a dataset of 500 camera reviews labeled as positive or negative. Two models are developed - one using the original set of 95 product attributes, and one using the reduced set. Support vector machines and naive Bayes classifiers are applied to both models and their performance is evaluated to determine if classification accuracy can be maintained while using fewer features. The results show it is possible to achieve similar accuracy levels with less features, improving computational efficiency.
This document provides a review of multispectral palm image fusion techniques. It begins with an introduction to biometrics and palm print identification. Different palm print images capture different spectral information about the palm. The document then reviews several pixel-level fusion methods for combining multispectral palm images, finding that Curvelet transform performs best at preserving discriminative patterns. It also discusses hardware for capturing multispectral palm images and the process of region of interest extraction and localization. Common fusion methods like wavelet transform and Curvelet transform are also summarized.
This document describes a vehicle theft detection system that uses radio frequency identification (RFID) technology. The system involves embedding an RFID chip in each vehicle that continuously transmits a unique identification signal. When a vehicle is stolen, the owner reports it to the police, who upload the vehicle's information to a central database. Police vehicles are equipped with RFID receivers. If a stolen vehicle passes within range of a receiver, the receiver detects the vehicle's ID signal and displays its details on a tablet. This allows police to quickly identify and recover stolen vehicles. The system aims to make it difficult for thieves to hide a vehicle's identity and allows vehicles to be tracked globally wherever the detection system is implemented.
This document discusses and compares two techniques for image denoising using wavelet transforms: Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT. Both techniques decompose an image corrupted by noise using filter banks, apply thresholding to the wavelet coefficients, and reconstruct the image. The Double-Density Dual-Tree Complex DWT yields better denoising results than the Dual-Tree Complex DWT as it produces more directional wavelets and is less sensitive to shifts and noise variance. Experimental results on test images demonstrate that the Double-Density method achieves higher peak signal-to-noise ratios, especially at higher noise levels.
This document compares the k-means and grid density clustering algorithms. It summarizes that grid density clustering determines dense grids based on the densities of neighboring grids, and is able to handle different shaped clusters in multi-density environments. The grid density algorithm does not require distance computation and is not dependent on the number of clusters being known in advance like k-means. The document concludes that grid density clustering is better than k-means clustering as it can handle noise and outliers, find arbitrary shaped clusters, and has lower time complexity.
This document proposes a method for detecting, localizing, and extracting text from videos with complex backgrounds. It involves three main steps:
1. Text detection uses corner metric and Laplacian filtering techniques independently to detect text regions. Corner metric identifies regions with high curvature, while Laplacian filtering highlights intensity discontinuities. The results are combined through multiplication to reduce noise.
2. Text localization then determines the accurate boundaries of detected text strings.
3. Text binarization filters background pixels to extract text pixels for recognition. Thresholding techniques are used to convert localized text regions to binary images.
The method exploits different text properties to detect text using corner metric and Laplacian filtering. Combining the results improves
This document describes the design and implementation of a low power 16-bit arithmetic logic unit (ALU) using clock gating techniques. A variable block length carry skip adder is used in the arithmetic unit to reduce power consumption and improve performance. The ALU uses a clock gating circuit to selectively clock only the active arithmetic or logic unit, reducing dynamic power dissipation from unnecessary clock charging/discharging. The ALU was simulated in VHDL and synthesized for a Xilinx Spartan 3E FPGA, achieving a maximum frequency of 65.19MHz at 1.98mW power dissipation, demonstrating improved performance over a conventional ALU design.
This document describes using particle swarm optimization (PSO) and genetic algorithms (GA) to tune the parameters of a proportional-integral-derivative (PID) controller for an automatic voltage regulator (AVR) system. PSO and GA are used to minimize the objective function by adjusting the PID parameters to achieve optimal step response with minimal overshoot, settling time, and rise time. The results show that PSO provides high-quality solutions within a shorter calculation time than other stochastic methods.
This document discusses implementing trust negotiations in multisession transactions. It proposes a framework that supports voluntary and unexpected interruptions, allowing negotiating parties to complete negotiations despite temporary unavailability of resources. The Trust-x protocol addresses issues related to validity, temporary loss of data, and extended unavailability of one negotiator. It allows a peer to suspend an ongoing negotiation and resume it with another authenticated peer. Negotiation portions and intermediate states can be safely and privately passed among peers to guarantee stability for continued suspended negotiations. An ontology is also proposed to provide formal specification of concepts and relationships, which is essential in complex web service environments for sharing credential information needed to establish trust.
This document discusses and compares various nature-inspired optimization algorithms for resolving the mixed pixel problem in remote sensing imagery, including Biogeography-Based Optimization (BBO), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO). It provides an overview of each algorithm, explaining key concepts like migration and mutation in BBO. The document aims to prove that BBO is the best algorithm for resolving the mixed pixel problem by comparing it to other evolutionary algorithms. It also includes figures illustrating concepts like the species model and habitat in BBO.
This document discusses principal component analysis (PCA) for face recognition. It begins with an introduction to face recognition and PCA. PCA works by calculating eigenvectors from a set of face images, which represent the principal components that account for the most variance in the image data. These eigenvectors are called "eigenfaces" and can be used to reconstruct the face images. The document then discusses how the system is implemented, including preparing a face database, normalizing the training images, calculating the eigenfaces/principal components, projecting the face images into this reduced space, and recognizing faces by calculating distances between projected test images and training images.
This document summarizes research on using wireless sensor networks to detect mobile targets. It discusses two optimization problems: 1) maximizing the exposure of the least exposed path within a sensor budget, and 2) minimizing sensor installation costs while ensuring all paths have exposure above a threshold. It proposes using tabu search heuristics to provide near-optimal solutions. The research also addresses extending the models to consider wireless connectivity, heterogeneous sensors, and intrusion detection using a game theory approach. Experimental results show the proposed mobile replica detection scheme can rapidly detect replicas with no false positives or negatives.
COVID-19 and the Level of Cloud Computing Adoption: A Study of Sri Lankan Inf...AimanAthambawa1
The study’s main objective is to analyse the level of cloud computing adoption and usage during COVID-19 in Sri
Lanka, especially in Information Technology (IT) organisations. Using senior IT employees, this study investigates
what extent their organisation adopts with cloud computing, the level of cloud computing usage, current use of
cloud service model, usage of cloud deployment model, preferred cloud service providers and reasons for adopting
and not adopting cloud computing. The study also describes why cloud computing is a solution for new normal
situations and the cloud-enabled services used during and after the COVID-19 pandemic. The finding suggests
that 87.7% of the organisations currently use cloud-enabled services, whereas 12.3% do not and intend to adopt.
Considering the benefits, cloud computing is the solution post COVID-19 pandemic to run the business way
forward.
kk vathada _digital transformation frameworks_2024.pdfKIRAN KV
I'm excited to share my latest presentation on digital transformation frameworks from industry leaders like PwC, Cognizant, Gartner, McKinsey, Capgemini, MIT, and DXO. These frameworks are crucial for driving innovation and success in today's digital age. Whether you're a consultant, director, or head of digital transformation, these insights are tailored to help you lead your organization to new heights.
🔍 Featured Frameworks:
PwC's Framework: Grounded in Industry 4.0 with a focus on data and analytics, and digitizing product and service offerings.
Cognizant's Framework: Enhancing customer experience, incorporating new pricing models, and leveraging customer insights.
Gartner's Framework: Emphasizing shared understanding, leadership, and support teams for digital excellence.
McKinsey's 4D Framework: Discover, Design, Deliver, and De-risk to navigate digital change effectively.
Capgemini's Framework: Focus on customer experience, operational excellence, and business model innovation.
MIT’s Framework: Customer experience, operational processes, business models, digital capabilities, and leadership culture.
DXO's Framework: Business model innovation, digital customer experience, and digital organization & process transformation.
This PDF delves into the aspects of information security from a forensic perspective, focusing on privacy leaks. It provides insights into the methods and tools used in forensic investigations to uncover and mitigate privacy breaches in mobile and cloud environments.
Intel Unveils Core Ultra 200V Lunar chip .pdfTech Guru
Intel has made a significant breakthrough in the world of processors with the introduction of its Core Ultra 200V mobile processor series, codenamed Lunar Lake. This innovative processor marks a fundamental shift in the way Intel creates processors, with a high degree of aggregation, including memory-on-package (MoP). The Core Ultra 300 MX series is designed to power thin-and-light devices that are capable of handling the latest AI applications, including Microsoft's Copilot+ experiences.
Choosing the Best Outlook OST to PST Converter: Key Features and Considerationswebbyacad software
When looking for a good software utility to convert Outlook OST files to PST format, it is important to find one that is easy to use and has useful features. WebbyAcad OST to PST Converter Tool is a great choice because it is simple to use for anyone, whether you are tech-savvy or not. It can smoothly change your files to PST while keeping all your data safe and secure. Plus, it can handle large amounts of data and convert multiple files at once, which can save you a lot of time. It even comes with 24*7 technical support assistance and a free trial, so you can try it out before making a decision. Whether you need to recover, move, or back up your data, Webbyacad OST to PST Converter is a reliable option that gives you all the support you need to manage your Outlook data effectively.
The History of Embeddings & Multimodal EmbeddingsZilliz
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
Latest Tech Trends Series 2024 By EY IndiaEYIndia1
Stay ahead of the curve with our comprehensive Tech Trends Series! Explore the latest technology trends shaping the world today, from the 2024 Tech Trends report and top emerging technologies to their impact on business technology trends. This series delves into the most significant technological advancements, giving you insights into both established and emerging tech trends that will revolutionize various industries.
Discovery Series - Zero to Hero - Task Mining Session 1DianaGray10
This session is focused on providing you with an introduction to task mining. We will go over different types of task mining and provide you with a real-world demo on each type of task mining in detail.
The Zaitechno Handheld Raman Spectrometer is a powerful and portable tool for rapid, non-destructive chemical analysis. It utilizes Raman spectroscopy, a technique that analyzes the vibrational fingerprint of molecules to identify their chemical composition. This handheld instrument allows for on-site analysis of materials, making it ideal for a variety of applications, including:
Material identification: Identify unknown materials, minerals, and contaminants.
Quality control: Ensure the quality and consistency of raw materials and finished products.
Pharmaceutical analysis: Verify the identity and purity of pharmaceutical compounds.
Food safety testing: Detect contaminants and adulterants in food products.
Field analysis: Analyze materials in the field, such as during environmental monitoring or forensic investigations.
The Zaitechno Handheld Raman Spectrometer is easy to use and features a user-friendly interface. It is compact and lightweight, making it ideal for field applications. With its rapid analysis capabilities, the Zaitechno Handheld Raman Spectrometer can help you improve efficiency and productivity in your research or quality control workflows.
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingDianaGray10
The power of Snowflake analytics enables CRM systems to improve operational efficiency, while gaining deeper insights into closed/won opportunities.
In this webinar, learn how infusing Snowflake into your CRM can quickly provide analysis for sales wins by region, product, customer segmentation, customer lifecycle—and more!
Using prebuilt connectors, we’ll show how workflows using Snowflake, Salesforce, and Zendesk tickets can significantly impact future sales.
Demystifying Neural Networks And Building Cybersecurity ApplicationsPriyanka Aash
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, ANNs have a rich history and a complex structure that enables them to learn and make decisions. This blog aims to unravel the mysteries of neural networks, explore their mathematical foundations, and demonstrate their practical applications, particularly in building robust malware detection systems using Convolutional Neural Networks (CNNs).
Finetuning GenAI For Hacking and DefendingPriyanka Aash
Generative AI, particularly through the lens of large language models (LLMs), represents a transformative leap in artificial intelligence. With advancements that have fundamentally altered our approach to AI, understanding and leveraging these technologies is crucial for innovators and practitioners alike. This comprehensive exploration delves into the intricacies of GenAI, from its foundational principles and historical evolution to its practical applications in security and beyond.
Challenges and Strategies of Digital Transformation.pptxwisdomfishlee
In an era where digital innovation is ubiquitous, executives from various corporations frequently seek insights into the tangible benefits that digital transformation can offer. This document outlines a comprehensive framework that elucidates the concept of digital transformation, highlighting its multifaceted dimensions and the pivotal roles it plays in enhancing business competitiveness.