The document discusses energy disaggregation, which is the task of taking a whole-home energy signal and separating it into its component appliances. It describes using sparse coding techniques like non-negative sparse coding and discriminative disaggregation to find basis functions and activation coefficients to model each appliance's energy usage and disaggregate a new whole-home signal without providing the individual appliance signals. The goal is to estimate the activation coefficients to separate out the energy used by each appliance.
Random Chaotic Number Generation based Clustered Image EncryptionAM Publications
Image encryption process is one of secure communication techniques to get confidentiality and authority of reading data. Encryption techniques should be improved with technological progress to overcome the security problems like the existence of penetration of the network. This paper develop an image encryption technique by encrypt the clusters of image using the generated keys from propose a modified of standard map. In decryption process, a recover image can be obtained by reverse the encryption process and utilize adding instead of clustering. Exploratory results check and demonstrate that the proposed procedure is secure and quick.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
Research on information and communication technologies have been developed rapidly since it can be applied easily to several areas like computer science, medical science, economics, environments, engineering, among other. Applications of soft set theory, especially in information systems have been found paramount importance. Recently, Mukherjee and Das defined some new operations in fuzzy soft multi set theory and show that the De-Morgan’s type of results hold in fuzzy soft multi set theory with respect to these newly defined operations. In this paper, we extend their work and study some more basic properties of their defined operations. Also, we define some basic supporting tools in information system also application of fuzzy soft multi sets in information system are presented and discussed. Here we define the notion of fuzzy multi-valued information system in fuzzy soft multi set theory and show that every fuzzy soft multi set is a fuzzy multi valued information system.
Heuristic Algorithm for Finding Sensitivity Analysis in Interval Solid Transp...AM Publications
This paper develops a heuristic algorithm for finding the ranges of cost in the interval solid transportation
problem such that optimal basis is invariant. The procedure of the proposed approach is illustrated by numerical
example.
A fusion of soft expert set and matrix modelseSAT Journals
Abstract
The purpose of this paper is to define different types of matrices in the light of soft expert sets. We then propose a decision making
model based on soft expert set.
Keywords: Soft set, soft expert set, Soft Expert matrix.
KR12 Semantic Index and TBox optimisation with respect to dependenciesMariano Rodriguez-Muro
KR'12 Presentation of two techniques for efficient reasoning and query answering in DL-Lite (OWL 2 QL).
First, Semantic Index, a technique to store triples (ABoxes) in a way that already encodes all the entailments of the ontology (RDFS or OWL 2 QL) in the backend, allowing for reasoning without exponential rewritings or forward chaining. The technique can easily be used to construct very efficient triple stores with inference support.
Second, a TBox optimisation technique that allows to obtain simpler TBoxes when the triples (ABoxes) satisfy a set of constraints.
Log Analytics in Datacenter with Apache Spark and Machine LearningPiotr Tylenda
Presented during DataMass Summit 2017.
http://summit2017.datamass.io/
https://www.youtube.com/watch?v=eGJfhHPdhuo
Data center workloads produce a significant amount of log data which has to be analyzed in order to discover any potential issues. We present an automated text mining approach for workload monitoring and data analytics, which is a combination of machine learning and big data processing. This session provides an overview of a data pipeline based on key components such as Apache Kafka, Apache Spark and generalized version of k-means algorithm.
Random Chaotic Number Generation based Clustered Image EncryptionAM Publications
Image encryption process is one of secure communication techniques to get confidentiality and authority of reading data. Encryption techniques should be improved with technological progress to overcome the security problems like the existence of penetration of the network. This paper develop an image encryption technique by encrypt the clusters of image using the generated keys from propose a modified of standard map. In decryption process, a recover image can be obtained by reverse the encryption process and utilize adding instead of clustering. Exploratory results check and demonstrate that the proposed procedure is secure and quick.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
Research on information and communication technologies have been developed rapidly since it can be applied easily to several areas like computer science, medical science, economics, environments, engineering, among other. Applications of soft set theory, especially in information systems have been found paramount importance. Recently, Mukherjee and Das defined some new operations in fuzzy soft multi set theory and show that the De-Morgan’s type of results hold in fuzzy soft multi set theory with respect to these newly defined operations. In this paper, we extend their work and study some more basic properties of their defined operations. Also, we define some basic supporting tools in information system also application of fuzzy soft multi sets in information system are presented and discussed. Here we define the notion of fuzzy multi-valued information system in fuzzy soft multi set theory and show that every fuzzy soft multi set is a fuzzy multi valued information system.
Heuristic Algorithm for Finding Sensitivity Analysis in Interval Solid Transp...AM Publications
This paper develops a heuristic algorithm for finding the ranges of cost in the interval solid transportation
problem such that optimal basis is invariant. The procedure of the proposed approach is illustrated by numerical
example.
A fusion of soft expert set and matrix modelseSAT Journals
Abstract
The purpose of this paper is to define different types of matrices in the light of soft expert sets. We then propose a decision making
model based on soft expert set.
Keywords: Soft set, soft expert set, Soft Expert matrix.
KR12 Semantic Index and TBox optimisation with respect to dependenciesMariano Rodriguez-Muro
KR'12 Presentation of two techniques for efficient reasoning and query answering in DL-Lite (OWL 2 QL).
First, Semantic Index, a technique to store triples (ABoxes) in a way that already encodes all the entailments of the ontology (RDFS or OWL 2 QL) in the backend, allowing for reasoning without exponential rewritings or forward chaining. The technique can easily be used to construct very efficient triple stores with inference support.
Second, a TBox optimisation technique that allows to obtain simpler TBoxes when the triples (ABoxes) satisfy a set of constraints.
Log Analytics in Datacenter with Apache Spark and Machine LearningPiotr Tylenda
Presented during DataMass Summit 2017.
http://summit2017.datamass.io/
https://www.youtube.com/watch?v=eGJfhHPdhuo
Data center workloads produce a significant amount of log data which has to be analyzed in order to discover any potential issues. We present an automated text mining approach for workload monitoring and data analytics, which is a combination of machine learning and big data processing. This session provides an overview of a data pipeline based on key components such as Apache Kafka, Apache Spark and generalized version of k-means algorithm.
COMBINED ECONOMIC AND EMISSION DISPATCH WITH AND WITHOUT CONSIDERING TRANSMIS...cscpconf
This paper gives a complete idea about the Combined Economic and Emission Dispatch(CEED) in different load demand. This paper shows CEED of a six generator system by
neglecting the transmission loss first, and after that CEED of the same system considering transmission loss. Here we solve the CEED problem with the help of Mat-Lab software. The
results are graphically represented here, like generation cost v/s load demands; load shared byeach generator in different load demand and transmission loss v/s load demands.
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
By exploiting the received power change in a communication link produced by the presence of a human body in an otherwise empty room, this work evaluates indoor free device localization methods in the 28 GHz band using machine learning techniques. For this objective, a database is built using results from ray tracing simulations of a system comprised of 4 receivers and up to 2 transmitters, while a person is standing within the room. Transmitters are equipped with uniform linear arrays that switch their main beams sequentially at 21 angles, whereas the receivers operate with omnidirectional antennas. Statistical localization error reduction of at least 16% over a global-based classification technique can be obtained through the combination of two independent classifiers using one transmitter and a reduction of at least 19% for 2 transmitters. An additional improvement is achieved by combining each independent classifier with a regression algorithm. Results also suggest that the number of examples per class and size of the blocks (strips) in which the study area is partitioned play a role in the localization error.
Enhancing Partition Crossover with Articulation Points Analysisjfrchicanog
This is the presentation of the paper entitled "Enhancing Partition Crossover with Articulation Points Analysis" at the ECOM track in gECCO 2018 (Kyoto). This paper was awarded with a "Best Paper Award"
This paper analyses the optimal power system planning with DGs used as real and reactive power compensator. Recently planning of DG placement reactive power compensation are the major problems in distribution system. As the requirement in the power is more the DG placement becomes important. When planned to make the DG placement, cost analysis becomes as a major concern. And if the DGs operate as reactive power compensator it is most helpful in power quality maintenance. So, this paper deals with the optimal power system planning with renewable DGs which can be used as a reactive power compensators. The problem is formulated and solved using popular meta-heuristic techniques called cuckoo search algorithm (CSA) and particle swarm optimization (PSO). the comparative results are presented.
Intelligent Automatic Extraction of Canine Cataract Object with Dynamic Contr...IJECEIAES
Canine cataract is developed with aging and can cause the blindness or surgical treatment if not treated timely. Since the pet owner do not have professional knowledge nor professional equipment, there is a growing need of providing pre-diagnosis software that can extract cataract-suspicious regions from simple photographs taken by cellular phones for the sake of preventive public health. In this paper, we propose a software that is highly successful for that purpose. The proposed software uses dynamic control of FCM clusters in quantification and trapezoid membership function in fuzzy stretching in order to enhance the intensity contrast from such rough photograph input. Through experiment, the proposed system demonstrates sufficiently enough accuracy in extraction (successful in 42 out of 45 cases) with better quality comparing with previous attempt.
The main challenge of concurrent software verification has always been in achieving modularity, i.e., the ability to divide and conquer the correctness proofs with the goal of scaling the verification effort. Types are a formal method well-known for its ability to modularize programs, and in the case of dependent types, the ability to modularize and scale complex mathematical proofs.
In this talk I will present our recent work towards reconciling dependent types with shared memory concurrency, with the goal of achieving modular proofs for the latter. Applying the type-theoretic paradigm to concurrency has lead us to view separation logic as a type theory of state, and has motivated novel abstractions for expressing concurrency proofs based on the algebraic structure of a resource and on structure-preserving functions (i.e., morphisms) between resources.
In order to provide the design guidance for a multiple stage refrigerator for hosting a quantum computing device targeting for unmanned transportation platform. We provides a modeling analysis based on a preliminary single stage test data, by using Brain Storm Optimization algorithm.
COMBINED ECONOMIC AND EMISSION DISPATCH WITH AND WITHOUT CONSIDERING TRANSMIS...cscpconf
This paper gives a complete idea about the Combined Economic and Emission Dispatch(CEED) in different load demand. This paper shows CEED of a six generator system by
neglecting the transmission loss first, and after that CEED of the same system considering transmission loss. Here we solve the CEED problem with the help of Mat-Lab software. The
results are graphically represented here, like generation cost v/s load demands; load shared byeach generator in different load demand and transmission loss v/s load demands.
⭐⭐⭐⭐⭐ Device Free Indoor Localization in the 28 GHz band based on machine lea...Victor Asanza
By exploiting the received power change in a communication link produced by the presence of a human body in an otherwise empty room, this work evaluates indoor free device localization methods in the 28 GHz band using machine learning techniques. For this objective, a database is built using results from ray tracing simulations of a system comprised of 4 receivers and up to 2 transmitters, while a person is standing within the room. Transmitters are equipped with uniform linear arrays that switch their main beams sequentially at 21 angles, whereas the receivers operate with omnidirectional antennas. Statistical localization error reduction of at least 16% over a global-based classification technique can be obtained through the combination of two independent classifiers using one transmitter and a reduction of at least 19% for 2 transmitters. An additional improvement is achieved by combining each independent classifier with a regression algorithm. Results also suggest that the number of examples per class and size of the blocks (strips) in which the study area is partitioned play a role in the localization error.
Enhancing Partition Crossover with Articulation Points Analysisjfrchicanog
This is the presentation of the paper entitled "Enhancing Partition Crossover with Articulation Points Analysis" at the ECOM track in gECCO 2018 (Kyoto). This paper was awarded with a "Best Paper Award"
This paper analyses the optimal power system planning with DGs used as real and reactive power compensator. Recently planning of DG placement reactive power compensation are the major problems in distribution system. As the requirement in the power is more the DG placement becomes important. When planned to make the DG placement, cost analysis becomes as a major concern. And if the DGs operate as reactive power compensator it is most helpful in power quality maintenance. So, this paper deals with the optimal power system planning with renewable DGs which can be used as a reactive power compensators. The problem is formulated and solved using popular meta-heuristic techniques called cuckoo search algorithm (CSA) and particle swarm optimization (PSO). the comparative results are presented.
Intelligent Automatic Extraction of Canine Cataract Object with Dynamic Contr...IJECEIAES
Canine cataract is developed with aging and can cause the blindness or surgical treatment if not treated timely. Since the pet owner do not have professional knowledge nor professional equipment, there is a growing need of providing pre-diagnosis software that can extract cataract-suspicious regions from simple photographs taken by cellular phones for the sake of preventive public health. In this paper, we propose a software that is highly successful for that purpose. The proposed software uses dynamic control of FCM clusters in quantification and trapezoid membership function in fuzzy stretching in order to enhance the intensity contrast from such rough photograph input. Through experiment, the proposed system demonstrates sufficiently enough accuracy in extraction (successful in 42 out of 45 cases) with better quality comparing with previous attempt.
The main challenge of concurrent software verification has always been in achieving modularity, i.e., the ability to divide and conquer the correctness proofs with the goal of scaling the verification effort. Types are a formal method well-known for its ability to modularize programs, and in the case of dependent types, the ability to modularize and scale complex mathematical proofs.
In this talk I will present our recent work towards reconciling dependent types with shared memory concurrency, with the goal of achieving modular proofs for the latter. Applying the type-theoretic paradigm to concurrency has lead us to view separation logic as a type theory of state, and has motivated novel abstractions for expressing concurrency proofs based on the algebraic structure of a resource and on structure-preserving functions (i.e., morphisms) between resources.
In order to provide the design guidance for a multiple stage refrigerator for hosting a quantum computing device targeting for unmanned transportation platform. We provides a modeling analysis based on a preliminary single stage test data, by using Brain Storm Optimization algorithm.
Similar to energy disaggregation with sparse coding (20)
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Online blood donation management system project.pdfKamal Acharya
Blood Donation Management System is a web database application that enables the public to make online session reservation, to view nationwide blood donation events online and at the same time provides centralized donor and blood stock database. This application is developed
by using ASP.NET technology from Visual Studio with the MySQL 5.0 as the database management system. The methodology used to develop this system as a whole is Object Oriented Analysis and Design; whilst, the database for BDMS is developed by following the steps in Database Life Cycle. The targeted users for this application are the public who is eligible to donate blood ,'system moderator, administrator from National Blood Center and the staffs who are working in the blood banks of the participating hospitals. The main objective of the development of this application is to overcome the problems that exist in the current system, which are the lack of facilities for online session reservation and online advertising on the nationwide blood donation events, and also decentralized donor and blood stock database. Besides, extra features in the system such as security protection by using password, generating reports, reminders of blood stock shortage and workflow tracking can even enhance the efficiency of the management in the blood banks. The final result of this project is the development of web database application, which is the BDMS.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
This document is by explosives industry in which document discussed manufacturing process and flow charts details by nitric acid and sulfuric acid and tetra benzene and step by step details of explosive industry explosives industry is produced raw materials and manufacture it by manufacturing process
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Online resume builder management system project report.pdfKamal Acharya
This project aims at the Introduction to app Service Management.
This software is designed keeping in mind the user’s efficiency & ease of handling and maintenance , as and secured system over centralized data handling and providing with the features to get the complete study and control over the business.
The report depicts the basics logic used for software development long with the Activity diagrams so that logics may be apprehended without difficulty.
For detailed information, screen layouts, provided along with this report can be viewed.
Although this report is prepared with considering the results required these may be across since the project is subjected to future enhancements as per the need of organizations.
Q.1 A single plate clutch with both sides of the plate effective is required to transmit 25 kW at 1600 r.p.m. The outer diameter of the plate is limited to 300 mm and the intensity of pressure between the plates not to exceed 0.07N / m * m ^ 2 Assuming uniform wear and coefficient of friction 0.3, find the inner diameter of the plates and the axial force necessary to engage the clutch.
Q.2 A multiple disc clutch has radial width of the friction material as 1/5th of the maximum radius. The coefficient of friction is 0.25. Find the total number of discs required to transmit 60 kW at 3000 r.p.m. The maximum diameter of the clutch is 250 mm and the axial force is limited to 600 N. Also find the mean unit pressure on each contact surface.
Q.3 A cone clutch is to be designed to transmit 7.5 kW at 900 r.p.m. The cone has a face angle of 12°. The width of the face is half of the mean radius and the normal pressure between the contact faces is not to exceed 0.09 N/mm². Assuming uniform wear and the coefficient of friction between the contact faces as 0.2, find the main dimensions of the clutch and the axial force required to engage the clutch.
Q.4 A cone clutch is mounted on a shaft which transmits power at 225 r.p.m. The small diameter of the cone is 230 mm, the cone face is 50 mm and the cone face makes an angle of 15 deg with the horizontal. Determine the axial force necessary to engage the clutch to transmit 4.5 kW if the coefficient of friction of the contact surfaces is 0.25. What is the maximum pressure on the contact surfaces assuming uniform wear?
Q.5 A soft surface cone clutch transmits a torque of 200 N-m at 1250 r.p.m. The larger diameter of the clutch is 350 mm. The cone pitch angle is 7.5 deg and the face width is 65 mm. If the coefficient of friction is 0.2. find:
1. the axial force required to transmit the torque:
2. the axial force required to engage the clutch;
3. the average normal pressure on the contact surfaces when the maximum torque is being transmitted; and
4. the maximum normal pressure assuming uniform wear.
Q.6 A single block brake, as shown in Fig. 1. has the drum diameter 250 mm. The angle of contact is 90° and the coefficient of friction between the drum and the lining is 0.35. If the torque transmitted by the brake is 70 N-m, find the force P required to operate the brake. Q.7 The layout and dimensions of a double shoe brake is shown in Fig. 2. The diameter of the
brake drum is 300 mm and the contact angle for each shoe is 90°. If the coefficient of friction for the brake lining and the drum is 0.4, find the spring force necessary to transmit a torque of 30 N-m. Also determine the width of the brake shoes, if the bearing pressure on the lining material is not to exceed 0.28N / m * m ^ 2
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Toll tax management system project report..pdfKamal Acharya
Toll Tax Management System is a web based application that can provide all the information related to toll plazas and the passenger checks in and pays the amount, then he/she will be provided by a receipt. With this receipt he/she can leave the toll booth without waiting for any verification call.
The information would also cover registration of staff, toll plaza collection, toll plaza collection entry for vehicles, date wise report entry, Vehicle passes and passes reports b/w dates.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.