This document summarizes a research paper on key frame extraction of live video based on optimized frame difference using a Cortex-A8 processor. The system is designed to extract key frames from live video streams using the Cortex-A8 as the controller. Key frame extraction is performed based on an optimized frame difference algorithm implemented using OpenCV on the Cortex-A8 board. The extracted key frames are processed, compressed and sent to a monitor client over a wireless network. The paper reviews existing key frame extraction techniques and proposes a method based on optimized frame difference that measures frame similarity through frame difference information to extract key frames.
Key frame extraction for video summarization using motion activity descriptorseSAT Journals
This document presents a method for video summarization using motion activity descriptors. It extracts key frames from videos by comparing motion between consecutive frames using block matching algorithms like diamond search and three step search. These algorithms determine which blocks to compare from consecutive frames to find the closest block match and derive a motion activity descriptor. Frames with high motion descriptors, indicating more difference between frames, are selected as key frames for the video summary. The method was tested on various video categories and showed high precision and summarization for some videos but lower values for others, depending on factors like scene changes, motion detectability, and object/area properties. An effective summary balances high precision with a high summarization factor by selecting frames that best represent the video's
Key frame extraction for video summarization using motion activity descriptorseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Key frame extraction methodology for video annotationIAEME Publication
This document summarizes a research paper that proposes a key frame extraction methodology to facilitate video annotation. The methodology uses edge difference between consecutive video frames to determine if the content has significantly changed. Frames where the edge difference exceeds a threshold are selected as key frames. The algorithm calculates edge differences for all frame pairs in a video. It then computes statistics like mean and standard deviation to determine a threshold. Frames with differences above this threshold are extracted as key frames. The key frames extracted represent important content changes in the video. Extracting key frames reduces processing requirements for video annotation compared to analyzing all frames. The methodology was tested on videos from domains like transportation and performed well at selecting representative frames.
This document compares two video compression techniques: Embedded Zerotree Wavelet (EZW) algorithm and H.264 codec. It finds that H.264 provides higher compression ratios of 60-70% compared to EZW, which achieves lower compression. Frames compressed with H.264 show better visual quality than those compressed with EZW. The document concludes that while EZW achieves good compression performance, H.264 is currently the better technique for video compression applications.
Recognition and tracking moving objects using moving camera in complex scenesIJCSEA Journal
1) The document proposes a method for tracking moving objects in videos captured using a moving camera in complex scenes. It involves video stabilization, key frame extraction, object detection/tracking using Gaussian mixture models and Kalman filters, and object recognition using bag of features.
2) Key frame extraction identifies important frames for processing by computing edge differences between frames and selecting frames above a threshold.
3) Moving objects are detected using background subtraction and Gaussian mixture models, and then tracked across frames using Kalman filters.
4) Object recognition is performed using bag of features, which represents objects as histograms of visual word frequencies to classify objects based on characteristic visual parts.
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
The document discusses two lossless image encryption algorithms: the bit plane crypt algorithm and the edge map crypt algorithm. Both algorithms use a key image of the same size as the original image to encrypt the image. The bit plane algorithm extracts a bit plane from another image to generate the key image. It then performs an XOR operation between the key image and each bit plane of the original image. The edge map algorithm generates the key image by detecting edges in another image and encrypts each bit plane of the original image using an XOR with the edge map. Both algorithms invert the bit plane order and combine them to produce the encrypted image. Simulation results show the original image can be recovered losslessly from the encrypted image using the decryption process for
IRJET - Wavelet based Image Fusion using FPGA for Biomedical ApplicationIRJET Journal
This document describes a wavelet-based image fusion system implemented on an FPGA for biomedical applications. The system takes two input images, applies discrete wavelet transforms to both, then fuses the wavelet coefficients to create a single output image. It uses MATLAB and Xilinx System Generator to simulate the design in Simulink and implement it on a Virtex6 FPGA. The results show that wavelet-based fusion can combine the spatial and spectral information from multiple input images into a higher quality fused output image suitable for medical applications like fusing MRI and CT scans.
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...INFOGAIN PUBLICATION
Locally linear embedding (LLE) is an unsupervised learning algorithm which computes the low dimensional, neighborhood preserving embeddings of high dimensional data. LLE attempts to discover non-linear structure in high dimensional data by exploiting the local symmetries of linear reconstructions. In this paper, video feature extraction is done using modified LLE alongwith adaptive nearest neighbor approach to find the nearest neighbor and the connected components. The proposed feature extraction method is applied to a video. The video feature description gives a new tool for analysis of video.
Key frame extraction for video summarization using motion activity descriptorseSAT Journals
This document presents a method for video summarization using motion activity descriptors. It extracts key frames from videos by comparing motion between consecutive frames using block matching algorithms like diamond search and three step search. These algorithms determine which blocks to compare from consecutive frames to find the closest block match and derive a motion activity descriptor. Frames with high motion descriptors, indicating more difference between frames, are selected as key frames for the video summary. The method was tested on various video categories and showed high precision and summarization for some videos but lower values for others, depending on factors like scene changes, motion detectability, and object/area properties. An effective summary balances high precision with a high summarization factor by selecting frames that best represent the video's
Key frame extraction for video summarization using motion activity descriptorseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Key frame extraction methodology for video annotationIAEME Publication
This document summarizes a research paper that proposes a key frame extraction methodology to facilitate video annotation. The methodology uses edge difference between consecutive video frames to determine if the content has significantly changed. Frames where the edge difference exceeds a threshold are selected as key frames. The algorithm calculates edge differences for all frame pairs in a video. It then computes statistics like mean and standard deviation to determine a threshold. Frames with differences above this threshold are extracted as key frames. The key frames extracted represent important content changes in the video. Extracting key frames reduces processing requirements for video annotation compared to analyzing all frames. The methodology was tested on videos from domains like transportation and performed well at selecting representative frames.
This document compares two video compression techniques: Embedded Zerotree Wavelet (EZW) algorithm and H.264 codec. It finds that H.264 provides higher compression ratios of 60-70% compared to EZW, which achieves lower compression. Frames compressed with H.264 show better visual quality than those compressed with EZW. The document concludes that while EZW achieves good compression performance, H.264 is currently the better technique for video compression applications.
Recognition and tracking moving objects using moving camera in complex scenesIJCSEA Journal
1) The document proposes a method for tracking moving objects in videos captured using a moving camera in complex scenes. It involves video stabilization, key frame extraction, object detection/tracking using Gaussian mixture models and Kalman filters, and object recognition using bag of features.
2) Key frame extraction identifies important frames for processing by computing edge differences between frames and selecting frames above a threshold.
3) Moving objects are detected using background subtraction and Gaussian mixture models, and then tracked across frames using Kalman filters.
4) Object recognition is performed using bag of features, which represents objects as histograms of visual word frequencies to classify objects based on characteristic visual parts.
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
The document discusses two lossless image encryption algorithms: the bit plane crypt algorithm and the edge map crypt algorithm. Both algorithms use a key image of the same size as the original image to encrypt the image. The bit plane algorithm extracts a bit plane from another image to generate the key image. It then performs an XOR operation between the key image and each bit plane of the original image. The edge map algorithm generates the key image by detecting edges in another image and encrypts each bit plane of the original image using an XOR with the edge map. Both algorithms invert the bit plane order and combine them to produce the encrypted image. Simulation results show the original image can be recovered losslessly from the encrypted image using the decryption process for
IRJET - Wavelet based Image Fusion using FPGA for Biomedical ApplicationIRJET Journal
This document describes a wavelet-based image fusion system implemented on an FPGA for biomedical applications. The system takes two input images, applies discrete wavelet transforms to both, then fuses the wavelet coefficients to create a single output image. It uses MATLAB and Xilinx System Generator to simulate the design in Simulink and implement it on a Virtex6 FPGA. The results show that wavelet-based fusion can combine the spatial and spectral information from multiple input images into a higher quality fused output image suitable for medical applications like fusing MRI and CT scans.
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...INFOGAIN PUBLICATION
Locally linear embedding (LLE) is an unsupervised learning algorithm which computes the low dimensional, neighborhood preserving embeddings of high dimensional data. LLE attempts to discover non-linear structure in high dimensional data by exploiting the local symmetries of linear reconstructions. In this paper, video feature extraction is done using modified LLE alongwith adaptive nearest neighbor approach to find the nearest neighbor and the connected components. The proposed feature extraction method is applied to a video. The video feature description gives a new tool for analysis of video.
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionIJAEMSJORNAL
In recent years, the modeling of human behaviors and patterns of activity for recognition or detection of special events has attracted considerable research interest. Various methods abounding to build intelligent vision systems aimed at understanding the scene and making correct semantic inferences from the observed dynamics of moving targets. Many systems include detection, storage of video information, and human-computer interfaces. Here we present not only an update that expands previous similar surveys but also a emphasis on contextual abnormal detection of human activity , especially in video surveillance applications. The main purpose of this survey is to identify existing methods extensively, and to characterize the literature in a manner that brings to attention key challenges.
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
In this paper a Z-transform based image authentication technique termed as IAZT has been proposed to
authenticate gray scale images. The technique uses energy efficient and low bandwidth based invisible data
embedding with a minimal computational complexity. Near about half of the bandwidth is required
compared to the traditional Z–transform while transmitting the multimedia contents such as images with
authenticating message through network. This authenticating technique may be used for copyright
protection or ownership verification. Experimental results are computed and compared with the existing
authentication techniques like Li’s method [11], SCDFT [13], Region-Based method [14] and many more
based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal
Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) which shows better performance
in IAZT.
Automated Traffic sign board classification system is one of the key technologies of Intelligent
Transportation Systems (ITS). Traffic Surveillance System is being more and important with improving
urban scale and increasing number of vehicles. This Paper presents an intelligent sign board
classification method based on blob analysis in traffic surveillance. Processing is done by three main
steps: moving object segmentation, blob analysis, and classifying. A Sign board is modelled as a
rectangular patch and classified via blob analysis. By processing the blob of sign boards, the meaningful
features are extracted. Tracking moving targets is achieved by comparing the extracted features with
training data. After classifying the sign boards the system will intimate to user in the form of alarms,
sound waves. The experimental results show that the proposed system can provide real-time and useful
information for traffic surveillance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Handwritten Decimal Image Compression using Deep Stacked AutoencoderIRJET Journal
This document proposes using a deep stacked autoencoder neural network for compressing handwritten decimal image data. It involves training multiple autoencoders in sequence to form a deep network that can compress the high-dimensional input images into lower-dimensional encoded representations while minimizing information loss. The autoencoders are trained one layer at a time using scaled conjugate gradient descent. Testing on the MNIST handwritten digits dataset showed the deep stacked autoencoder achieved compression by encoding the 400-dimensional input images down to a 25-dimensional representation while maintaining good reconstruction accuracy, as measured by minimizing the mean squared error at each layer.
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...IOSR Journals
This document summarizes the design and analysis of a wideband microstrip patch antenna employing EBG structures and a partial ground plane. Initially, a simple patch antenna was designed as a baseline, then various modifications were made, including cutting an H-slot in the patch, cutting the patch into a star shape, adding EBG structures, and adding a DGS structure. The proposed antenna design uses EBG structures within the patch and a partial ground plane. Simulation results show it resonates at four frequencies between 2.5-12.9 GHz with return losses between -13.96 to -19.0 dB, indicating a wide bandwidth. The antenna also has an omni-directional radiation pattern and gain of 6.33
This document presents Jeevn-Net, a new neural network architecture for brain tumor segmentation and overall survival prediction. Jeevn-Net uses a cascaded U-Net structure with two U-Nets and applies auto-encoder regularization. It takes in MRI scans and outputs a segmented tumor image with extracted features. Random forest regression is then used to predict survival based on these features. The network achieves state-of-the-art performance for brain tumor segmentation and survival prediction.
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
Methods like edge directed interpolation and projection onto convex sets (POCS) that are widely used for image error concealment to produce better image quality are complex in nature and also time consuming. Moreover, those methods are not suitable for real time error concealment where the decoder may not have sufficient computation power or done in online. In this paper, we propose a data-hiding scheme for error concealment of digital image. Edge direction information of a block is extracted in the encoder and is embedded imperceptibly into the host media using quantization index modulation (QIM), thus reduces work load of the decoder. The system performance in term of fidelity and computational load is improved using M-ary data modulation based on near-orthogonal QIM. The decoder extracts the embedded
features (edge information) and those features are then used for recovery of lost data. Experimental results duly support the effectiveness of the proposed scheme.
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...IRJET Journal
This document analyzes the effect of seed length on the performance of an optical interleave division multiple access (IDMA) system using prime inter-leavers. It compares the bit error rate (BER) performance of prime inter-leavers with different seed lengths ranging from 2 to 13 for a fixed number of users and data length. The simulation results show that increasing the seed length from 2 to the maximum single digit prime number 7 decreases the BER significantly, with the optimal BER achieved for a seed length of 7. However, BER increases again for seed lengths in double digits. Similarly for a longer data length, the optimal BER is obtained for a seed length of 7. In conclusion, using prime inter
Our paper on homogeneous motion discovery oriented reference frame for high efficiency video coding talks about the idea of segmenting the current frame into cohesive motion regions made of blocks and then using these regions to form a motion compensated prediction. This prediction when used as an additional reference frame for the current frame, shows encouraging savings in bit rate over standalone HEVC reference coder.
This document proposes a new method for multifocus image fusion that operates based on categorizing image energy levels. It calculates the energy of gradient for input images to identify focused vs. blurred regions. The images are divided into low, mid, and high energy regions using thresholds on the average energy map. Pixels are then selected from the input images for each region using different fusion rules. Experimental results on book, clock, leaf, and wafer images show the proposed method produces clearer fused images without artifacts compared to other spatial and transform domain fusion methods.
The fourier transform for satellite image compressioncsandit
The document presents a new method for compressing satellite images using the Fourier transform and scalar quantization. The method involves taking the Fourier transform of the image, scalar quantizing the amplitude values, and encoding the results with run-length encoding and Huffman coding. Testing on satellite images and Lena showed compression ratios over 65% while maintaining good image quality after reconstruction.
The document presents research on using artificial neural networks (ANNs) to model and predict the shear capacity of reinforced concrete deep beams. A database of 270 experimental deep beam tests was used to develop and validate an ANN model. The model takes in 9 input parameters that affect shear capacity and outputs the predicted shear capacity. The model was trained using 170 beams and validated on separate sets of 50 beams. Results showed the ANN model predictions had the lowest average error and variation compared to predictions from 5 national design codes.
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
This document describes a design of a Gabor filter for noise reduction in images of betel vine leaves to aid in disease segmentation. A Gabor filter is designed using Verilog HDL and implemented on a CADENCE platform. The filter takes pixel inputs from images that have undergone preprocessing like Sobel edge detection and segmentation. It convolves the pixels with stored filter coefficients to reduce noise and segment the diseased areas. The proposed Gabor filter achieves noiseless segmentation with increased speed and reduced delays compared to existing methods. It utilizes fewer resources with minimal warnings. The system could be enhanced further with 2D/3D processing and neural network training.
1. The document proposes an efficient algorithm to retrieve videos from a database using a video clip as a query.
2. Key features like color, texture, edges and motion are extracted from video shots and clusters are created using these features to reduce search time complexity.
3. When a query video is given, its features are used to search the closest cluster. Then sequential matching of additional features and shot lengths is done to find the most similar matching videos from the database.
This document discusses acoustic echo cancellation (AEC) systems using artificial neural network algorithms. It begins with background on AEC and issues with nonlinear echo paths. It then presents an AEC system using an artificial neural network combined with an adaptive filter model to address nonlinear environments. Simulation results on Matlab demonstrate that the proposed neural network approach combined with a Laguerre filter achieves lower error and higher echo return loss than adaptive filter-only methods, showing it effectively reduces echo signals in linear and nonlinear systems. The paper concludes the combined neural network-filter algorithm is a promising approach for acoustic echo cancellation.
A Video Processing based System for Counting VehiclesIRJET Journal
This document describes a video processing system for counting vehicles. The system processes video frames using discrete wavelet transform (DWT) features and a neural network. In the first phase, vehicle images are extracted from videos and used to train a backpropagation neural network to detect vehicles based on DWT features. In the testing phase, video frames are extracted and the DWT features of frames showing the detection point are input to the neural network to detect vehicles. The system was tested on videos and achieved satisfactory counting accuracy ranging from 97.9-100%. The system provides an effective way to count vehicles for applications like traffic analysis.
Este documento contiene información sobre diferentes aspectos del lenguaje en la región de Cúcuta, Colombia. Explica que el lenguaje se refiere a cualquier sistema de comunicación estructurado y que existen contextos naturales y artificiales. Luego describe que en el norte de Santander se hablaban lenguas chibchas y caribes nativas. Finalmente, detalla algunas características del lenguaje actual en Cúcuta, incluyendo influencias del español venezolano y varios dichos y frases típicos.
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
Secure IoT Systems Monitor Framework using Probabilistic Image EncryptionIJAEMSJORNAL
In recent years, the modeling of human behaviors and patterns of activity for recognition or detection of special events has attracted considerable research interest. Various methods abounding to build intelligent vision systems aimed at understanding the scene and making correct semantic inferences from the observed dynamics of moving targets. Many systems include detection, storage of video information, and human-computer interfaces. Here we present not only an update that expands previous similar surveys but also a emphasis on contextual abnormal detection of human activity , especially in video surveillance applications. The main purpose of this survey is to identify existing methods extensively, and to characterize the literature in a manner that brings to attention key challenges.
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
In this paper a Z-transform based image authentication technique termed as IAZT has been proposed to
authenticate gray scale images. The technique uses energy efficient and low bandwidth based invisible data
embedding with a minimal computational complexity. Near about half of the bandwidth is required
compared to the traditional Z–transform while transmitting the multimedia contents such as images with
authenticating message through network. This authenticating technique may be used for copyright
protection or ownership verification. Experimental results are computed and compared with the existing
authentication techniques like Li’s method [11], SCDFT [13], Region-Based method [14] and many more
based on Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Image Fidelity (IF), Universal
Quality Image (UQI) and Structural Similarity Index Measurement (SSIM) which shows better performance
in IAZT.
Automated Traffic sign board classification system is one of the key technologies of Intelligent
Transportation Systems (ITS). Traffic Surveillance System is being more and important with improving
urban scale and increasing number of vehicles. This Paper presents an intelligent sign board
classification method based on blob analysis in traffic surveillance. Processing is done by three main
steps: moving object segmentation, blob analysis, and classifying. A Sign board is modelled as a
rectangular patch and classified via blob analysis. By processing the blob of sign boards, the meaningful
features are extracted. Tracking moving targets is achieved by comparing the extracted features with
training data. After classifying the sign boards the system will intimate to user in the form of alarms,
sound waves. The experimental results show that the proposed system can provide real-time and useful
information for traffic surveillance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Handwritten Decimal Image Compression using Deep Stacked AutoencoderIRJET Journal
This document proposes using a deep stacked autoencoder neural network for compressing handwritten decimal image data. It involves training multiple autoencoders in sequence to form a deep network that can compress the high-dimensional input images into lower-dimensional encoded representations while minimizing information loss. The autoencoders are trained one layer at a time using scaled conjugate gradient descent. Testing on the MNIST handwritten digits dataset showed the deep stacked autoencoder achieved compression by encoding the 400-dimensional input images down to a 25-dimensional representation while maintaining good reconstruction accuracy, as measured by minimizing the mean squared error at each layer.
Design and Analysis of Wideband Microstip Patch Antenna Employing EBG and Par...IOSR Journals
This document summarizes the design and analysis of a wideband microstrip patch antenna employing EBG structures and a partial ground plane. Initially, a simple patch antenna was designed as a baseline, then various modifications were made, including cutting an H-slot in the patch, cutting the patch into a star shape, adding EBG structures, and adding a DGS structure. The proposed antenna design uses EBG structures within the patch and a partial ground plane. Simulation results show it resonates at four frequencies between 2.5-12.9 GHz with return losses between -13.96 to -19.0 dB, indicating a wide bandwidth. The antenna also has an omni-directional radiation pattern and gain of 6.33
This document presents Jeevn-Net, a new neural network architecture for brain tumor segmentation and overall survival prediction. Jeevn-Net uses a cascaded U-Net structure with two U-Nets and applies auto-encoder regularization. It takes in MRI scans and outputs a segmented tumor image with extracted features. Random forest regression is then used to predict survival based on these features. The network achieves state-of-the-art performance for brain tumor segmentation and survival prediction.
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
Methods like edge directed interpolation and projection onto convex sets (POCS) that are widely used for image error concealment to produce better image quality are complex in nature and also time consuming. Moreover, those methods are not suitable for real time error concealment where the decoder may not have sufficient computation power or done in online. In this paper, we propose a data-hiding scheme for error concealment of digital image. Edge direction information of a block is extracted in the encoder and is embedded imperceptibly into the host media using quantization index modulation (QIM), thus reduces work load of the decoder. The system performance in term of fidelity and computational load is improved using M-ary data modulation based on near-orthogonal QIM. The decoder extracts the embedded
features (edge information) and those features are then used for recovery of lost data. Experimental results duly support the effectiveness of the proposed scheme.
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...IRJET Journal
This document analyzes the effect of seed length on the performance of an optical interleave division multiple access (IDMA) system using prime inter-leavers. It compares the bit error rate (BER) performance of prime inter-leavers with different seed lengths ranging from 2 to 13 for a fixed number of users and data length. The simulation results show that increasing the seed length from 2 to the maximum single digit prime number 7 decreases the BER significantly, with the optimal BER achieved for a seed length of 7. However, BER increases again for seed lengths in double digits. Similarly for a longer data length, the optimal BER is obtained for a seed length of 7. In conclusion, using prime inter
Our paper on homogeneous motion discovery oriented reference frame for high efficiency video coding talks about the idea of segmenting the current frame into cohesive motion regions made of blocks and then using these regions to form a motion compensated prediction. This prediction when used as an additional reference frame for the current frame, shows encouraging savings in bit rate over standalone HEVC reference coder.
This document proposes a new method for multifocus image fusion that operates based on categorizing image energy levels. It calculates the energy of gradient for input images to identify focused vs. blurred regions. The images are divided into low, mid, and high energy regions using thresholds on the average energy map. Pixels are then selected from the input images for each region using different fusion rules. Experimental results on book, clock, leaf, and wafer images show the proposed method produces clearer fused images without artifacts compared to other spatial and transform domain fusion methods.
The fourier transform for satellite image compressioncsandit
The document presents a new method for compressing satellite images using the Fourier transform and scalar quantization. The method involves taking the Fourier transform of the image, scalar quantizing the amplitude values, and encoding the results with run-length encoding and Huffman coding. Testing on satellite images and Lena showed compression ratios over 65% while maintaining good image quality after reconstruction.
The document presents research on using artificial neural networks (ANNs) to model and predict the shear capacity of reinforced concrete deep beams. A database of 270 experimental deep beam tests was used to develop and validate an ANN model. The model takes in 9 input parameters that affect shear capacity and outputs the predicted shear capacity. The model was trained using 170 beams and validated on separate sets of 50 beams. Results showed the ANN model predictions had the lowest average error and variation compared to predictions from 5 national design codes.
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
This document describes a design of a Gabor filter for noise reduction in images of betel vine leaves to aid in disease segmentation. A Gabor filter is designed using Verilog HDL and implemented on a CADENCE platform. The filter takes pixel inputs from images that have undergone preprocessing like Sobel edge detection and segmentation. It convolves the pixels with stored filter coefficients to reduce noise and segment the diseased areas. The proposed Gabor filter achieves noiseless segmentation with increased speed and reduced delays compared to existing methods. It utilizes fewer resources with minimal warnings. The system could be enhanced further with 2D/3D processing and neural network training.
1. The document proposes an efficient algorithm to retrieve videos from a database using a video clip as a query.
2. Key features like color, texture, edges and motion are extracted from video shots and clusters are created using these features to reduce search time complexity.
3. When a query video is given, its features are used to search the closest cluster. Then sequential matching of additional features and shot lengths is done to find the most similar matching videos from the database.
This document discusses acoustic echo cancellation (AEC) systems using artificial neural network algorithms. It begins with background on AEC and issues with nonlinear echo paths. It then presents an AEC system using an artificial neural network combined with an adaptive filter model to address nonlinear environments. Simulation results on Matlab demonstrate that the proposed neural network approach combined with a Laguerre filter achieves lower error and higher echo return loss than adaptive filter-only methods, showing it effectively reduces echo signals in linear and nonlinear systems. The paper concludes the combined neural network-filter algorithm is a promising approach for acoustic echo cancellation.
A Video Processing based System for Counting VehiclesIRJET Journal
This document describes a video processing system for counting vehicles. The system processes video frames using discrete wavelet transform (DWT) features and a neural network. In the first phase, vehicle images are extracted from videos and used to train a backpropagation neural network to detect vehicles based on DWT features. In the testing phase, video frames are extracted and the DWT features of frames showing the detection point are input to the neural network to detect vehicles. The system was tested on videos and achieved satisfactory counting accuracy ranging from 97.9-100%. The system provides an effective way to count vehicles for applications like traffic analysis.
Este documento contiene información sobre diferentes aspectos del lenguaje en la región de Cúcuta, Colombia. Explica que el lenguaje se refiere a cualquier sistema de comunicación estructurado y que existen contextos naturales y artificiales. Luego describe que en el norte de Santander se hablaban lenguas chibchas y caribes nativas. Finalmente, detalla algunas características del lenguaje actual en Cúcuta, incluyendo influencias del español venezolano y varios dichos y frases típicos.
The document summarizes a study that proposes a solution method for the generalized fuzzy assignment problem (FGAP) with restrictions on both job costs and person costs, which are represented as trapezoidal fuzzy numbers. The FGAP model aims to minimize the total cost of assigning jobs to persons, subject to constraints on maximum job costs and maximum person costs based on qualifications. The study presents two solution methods - one using modified extremum difference method and fuzzy MODI method, and the other transforming the problem into a linear programming problem and solving in LINGO. A numerical example applying the methods to a sample FGAP is provided.
This document summarizes research on phase-locked loops (PLLs) for synchronizing the output of grid-connected inverters with the grid voltage. It describes the basic PLL structure and various techniques that have been proposed, including methods based on synchronous reference frames, parameter estimation, selective harmonics elimination, and operation under distorted grid conditions. The document focuses on PLLs for single-phase systems and evaluates different approaches based on their performance, simplicity, and ability to handle variations in frequency, phase, amplitude and harmonics.
This document describes an FPGA-based design and implementation of an orthogonal frequency division multiplexing (OFDM) transceiver module using VHDL. The key components developed include a serial-to-parallel converter, 4-QAM modulator, 64-point IFFT using a radix-4 butterfly structure, FFT, 4-QAM demodulator, and parallel-to-serial converter. The design utilizes CORDIC algorithms instead of multipliers to improve resource usage. The OFDM transceiver core was implemented and tested on a Xilinx Spartan-3AN FPGA using a loopback configuration.
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
Video indexing using shot boundary detection approach and search tracksIAEME Publication
This document summarizes a research paper that proposes a video indexing and retrieval method using shot boundary detection and audio track detection. It first extracts keypoints from divided frames to create a new frame sequence. Support vector machines are then used to match keypoints between frames to detect different types of shot transitions. Audio energy is also analyzed to detect sound tracks. The method aims to reduce computational costs by removing non-boundary frames and representing transition frames as thumbnails. It was tested on CCTV and film videos.
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
This document summarizes a research paper that proposes a new video steganography technique. The technique encrypts a secret message using RSA before embedding it in pre-determined pixel locations of video frames. Edge detection is used to find control points for cubic spline interpolation, which dynamically determine the pixel locations. The secret bits are embedded in the least significant bits and real parts of the Fast Fourier Transform of pixel values. Experimental results show the technique maintains high video quality with minimal degradation, as measured by average PSNR and MSE values. The technique aims to increase security by hiding the locations and parameters used to extract the secret message.
Coronary heart disease is a disease with the highest mortality rates in the world. This makes the development of the diagnostic system as a very interesting topic in the field of biomedical informatics, aiming to detect whether a heart is normal or not. In the literature there are diagnostic system models by combining dimension reduction and data mining techniques. Unfortunately, there are no review papers that discuss and analyze the themes to date. This study reviews articles within the period 2009-2016, with a focus on dimension reduction methods and data mining techniques, validated using a dataset of UCI repository. Methods of dimension reduction use feature selection and feature extraction techniques, while data mining techniques include classification, prediction, clustering, and association rules.
Key frame extraction is an essential technique in the computer vision field. The extracted key frames should brief the salient events with an excellent feasibility, great efficiency, and with a high-level of robustness. Thus, it is not an easy problem to solve because it is attributed to many visual features. This paper intends to solve this problem by investigating the relationship between these features detection and the accuracy of key frames extraction techniques using TRIZ. An improved algorithm for key frame extraction was then proposed based on an accumulative optical flow with a self-adaptive threshold (AOF_ST) as recommended in TRIZ inventive principles. Several video shots including original and forgery videos with complex conditions are used to verify the experimental results. The comparison of our results with the-state-of-the-art algorithms results showed that the proposed extraction algorithm can accurately brief the videos and generated a meaningful compact count number of key frames. On top of that, our proposed algorithm achieves 124.4 and 31.4 for best and worst case in KTH dataset extracted key frames in terms of compression rate, while the-state-of-the-art algorithms achieved 8.90 in the best case.
IRJET- Storage Optimization of Video Surveillance from CCTV CameraIRJET Journal
This document proposes a method to optimize storage space occupied by CCTV video footage. It divides video sequences into frames and compares adjacent frames using MSE (mean squared error) to identify redundant frames. Redundant frames with an MSE below a threshold are deleted. This reduces the number of frames stored while maintaining video quality. The proposed method is tested on a sample 20 minute, 110MB video and reduces its size by 30.91% to 76MB and duration to 7 minutes by removing redundant frames. This storage optimization technique is useful for managing the large amounts of data generated daily by CCTV cameras.
The document summarizes a research paper that proposes a method to summarize parking surveillance footage. The method first pre-processes the raw footage to extract only frames containing vehicles. These frames are then classified using a CNN model to detect vehicles and recognize license plates. The classified objects and license plate numbers are used to generate a textual summary of the vehicles in the footage, making it easier for users to review large amounts of surveillance video. The paper discusses related work on video summarization techniques and provides details of the proposed methodology, which includes preprocessing footage, extracting features from frames containing vehicles, using CNNs for object detection and license plate recognition, and generating a summarized video and text report.
The surveillance systems are expected to record the videos in 24/7 and obviously it requires a huge storage space. Even though the hard disks are cheaper today, the number of CCTV cameras is also vertically increasing in order to boost up security. The video compression techniques is the only better option to reduce required the storage space; however, the existing video compression techniques are not adequate at all for the modern digital surveillance system monitoring as they require huge video streams. In this paper, a novel video compression technique is presented with a critical analysis of the experimental results.
Efficient video compression using EZWTIJERA Editor
In this article, wavelet based lossy video compression algorithm is presented. The motion estimation and compensation, being an important part in the compression, is based on segment movements. The proposed work is based on wavelet transform algorithm Embedded Zeroed WaveletTransform (EZWT). Based on the results of peak signal to noise ratio (PSNR), mean squared error (MSE), different videos are analyzed. Maintaining the PSNR to acceptable limits the proposed EZWT algorithm achieves very good compression ratios making the technique more efficient than the 2-Discrete Cosine Transform (DCT) in the H.264/AVC codec. The method is being suitable for low bit rate video showing highest compression ratio and very good PSNR of more than 30dB.
Video Key-Frame Extraction using Unsupervised Clustering and Mutual ComparisonCSCJournals
The document presents a novel method for extracting key frames from videos using unsupervised clustering and mutual comparison. It assigns weights of 70% to color (HSV histogram) and 30% to texture (GLCM) when computing frame similarity for clustering. It then performs mutual comparison of extracted key frames to remove near duplicates, improving accuracy. The algorithm is computationally simple and able to detect unique key frames, improving concept detection performance as validated on open databases.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
This document proposes power efficient sum of absolute difference (SAD) algorithms for video compression. It describes:
1. Developing low power 1-bit full adder architectures including a proposed design using NAND, AND, and OR gates that improves power over existing designs.
2. Implementing 4x4 and 8x8 SAD architectures using the proposed low power full adder, ripple carry adders, and carry save adders.
3. Synthesizing the SAD designs in a 180nm technology and finding the proposed 4x4 SAD improves total power by 61% compared to an existing design.
VISUAL ATTENTION BASED KEYFRAMES EXTRACTION AND VIDEO SUMMARIZATIONcscpconf
Recent developments in digital video and drastic increase of internet use have increased the
amount of people searching and watching videos online. In order to make the search of the
videos easy, Summary of the video may be provided along with each video. The video summary
provided thus should be effective so that the user would come to know the content of the video
without having to watch it fully. The summary produced should consists of the key frames that
effectively express the content and context of the video. This work suggests a method to extract
key frames which express most of the information in the video. This is achieved by quantifying
Visual attention each frame commands. Visual attention of each frame is quantified using a
descriptor called Attention quantifier. This quantification of visual attention is based on the
human attention mechanism that indicates color conspicuousness and the motion involved seek
more attention. So based on the color conspicuousness and the motion involved each frame is
given a Attention parameter. Based on the attention quantifier value the key frames are extracted and are summarized adaptively. This framework suggests a method to produces meaningful video summary.
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
This document summarizes information hiding methods for compressed video, specifically focusing on the H.264 video compression standard. It first discusses the general framework of information hiding and data representation schemes. It then identifies possible venues for information hiding within the H.264 coding structure, such as the prediction process, transformation, quantization, and entropy coding. The document reviews related information hiding methods for each venue and presents applications. It also provides a timeline of information hiding method development and compares methods based on factors like payload, video quality, and complexity. Finally, it presents perspectives on current trends and opportunities in information hiding for compressed video.
Video Compression Using Block By Block Basis Salience DetectionIRJET Journal
This document presents a method for video compression using block-by-block salience detection. It aims to reduce noticeable coding artifacts in non-region of interest (ROI) parts of video frames by optimizing the saliency-related Lagrange parameter possibly on a block-by-block basis. The proposed method detects ROI using a visual saliency model and encodes ROI blocks with higher quality than non-ROI blocks. It then separates each frame into blocks and uses a conjugate gradient algorithm to iteratively update weight coefficients and minimize a cost function, compressing each block losslessly based on its saliency. An experiment found the proposed method improved visual quality over other perceptual video coding methods according to metrics like eye-tracking weighted PSNR and
Human Action Recognition using Contour History Images and Neural Networks Cla...IRJET Journal
This document proposes a new method for human action recognition using contour history images extracted from silhouettes, tracking of the body's center movement, and the relative dimensions of the bounding box containing each contour history image. Features are extracted and reduced using three different methods: dividing the contour history images into rectangles, a shallow autoencoder neural network, and a deep autoencoder neural network. The reduced features are classified using a neural network classifier. The proposed method achieved a recognition rate of 98.9% on a standard human action dataset, demonstrating its potential for real-time human action recognition applications.
Video Compression Algorithm Based on Frame Difference Approaches ijsc
The huge usage of digital multimedia via communications, wireless communications, Internet, Intranet and cellular mobile leads to incurable growth of data flow through these Media. The researchers go deep in developing efficient techniques in these fields such as compression of data, image and video. Recently, video compression techniques and their applications in many areas (educational, agriculture, medical …) cause this field to be one of the most interested fields. Wavelet transform is an efficient method that can be used to perform an efficient compression technique. This work deals with the developing of an efficient video compression approach based on frames difference approaches that concentrated on the calculation of frame near distance (difference between frames). The
selection of the meaningful frame depends on many factors such as compression performance, frame details, frame size and near distance between frames. Three different approaches are applied for removing the lowest frame difference. In this paper, many videos are tested to insure the efficiency of this technique, in addition a good performance results has been obtained.
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...TELKOMNIKA JOURNAL
Video summarization used for a different application like video object recognition and classification. In video processing, numerous frames containing similar information, this leads to time consumption and slow processing speed and complexity. By using key frames reducing the amount of memory needed for video data processing and complexity greatly. In this paper key frame extraction of Arabic isolated word using discrete wavelet transform (DWT) with modified threshold factor is proposed with different bases. The results for different wavelet basis db, sym and coif show the best result for numbers of key frames at the threshold factor value (0.75).
This document discusses video quality analysis for H.264 based on the human visual system. It proposes an improved video quality assessment method that adds color comparison to structural similarity measurement. The method separates similarity measurement into four comparisons: luminance, contrast, structure, and color. Experimental results on video sets with two distortion types show the proposed method's quality scores are more consistent with visual quality than classical methods. It also discusses the H.264 video coding standard and provides examples of encoding and decoding experimental results.
Background differencing algorithm for moving object detection using system ge...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).