This document summarizes a proposed method for text-based video retrieval. The method involves:
1) Extracting frames from videos and segmenting text regions within frames.
2) Recognizing characters using optical character recognition (OCR) and extracting color features.
3) Storing the text features and color features in a database.
4) Matching user-inputted text queries to the stored text features to retrieve matching videos. The proposed method aims to improve video indexing and retrieval accuracy compared to visual query methods.
Query clip genre recognition using tree pruning technique for video retrievalIAEME Publication
The document proposes a method for video retrieval based on genre recognition of a query video clip. It extracts regions of interest from frames of the query clip and videos in a database. Features are extracted from these regions and used for matching via Euclidean distance. A tree pruning technique is employed to recognize the genre of the query clip and retrieve similar genre videos from the database. The method segments objects, extracts features, performs matching and genre recognition, and retrieves relevant videos in three or fewer sentences.
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
Inverted File Based Search Technique for Video Copy Retrievalijcsa
A video copy detection system is a content-based search engine focusing on Spatio-temporal features. It
aims to find whether a query video segment is a copy of video from the video database or not based on the
signature of the video. It is hard to find whether a video is a copied video or a similar video since the
features of the content are very similar from one video to the other. The main focus is to detect that the
query video is present in the video database with robustness depending on the content of video and also by
fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted
to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint
Extraction algorithm is employed which extracts a fingerprint through the features from the image content
of video. The images are represented as Temporally Informative Representative Images (TIRI). Then the
next step is to find the presence of copy of a query video in a video database, in which a close match of its
fingerprint in the corresponding fingerprint database is searched using inverted-file-based method.
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...IJERD Editor
This document describes a content-based video retrieval system that extracts features from videos and uses those features to retrieve matching videos from a database. The system first segments videos into frames, applies optical character recognition (OCR) to extract text and automatic speech recognition (ASR) to extract keywords. It then extracts additional low-level visual features like color, texture and edges. All the extracted keywords and features are stored in a database. When a query video is input, the same features are extracted and used to search the database for similar videos. The results are then re-ranked based on the user's past viewing history to personalize the results. The system is evaluated on a database of 15 videos and is able to retrieve matching videos
Video content analysis and retrieval system using video storytelling and inde...IJECEIAES
Videos are used often for communicating ideas, concepts, experience, and situations, because of the significant advances made in video communication technology. The social media platforms enhanced the video usage expeditiously. At, present, recognition of a video is done, using the metadata like video title, video descriptions, and video thumbnails. There are situations like video searcher requires only a video clip on a specific topic from a long video. This paper proposes a novel methodology for the analysis of video content and using video storytelling and indexing techniques for the retrieval of the intended video clip from a long duration video. Video storytelling technique is used for video content analysis and to produce a description of the video. The video description thus created is used for preparation of an index using wormhole algorithm, guarantying the search of a keyword of definite length L, within the minimum worst-case time. This video index can be used by video searching algorithm to retrieve the relevant part of the video by virtue of the frequency of the word in the keyword search of the video index. Instead of downloading and transferring a whole video, the user can download or transfer the specifically necessary video clip. The network constraints associated with the transfer of videos are considerably addressed.
Abstract Recently, Video is becoming a catholic medium for e-learning. As per the popularity of online video information over the World Wide Web (WWW) is mostly dependent on user-assigned tags or specification, which is the system by which we can access such videos. However, this system have limitations for retrieval and frequently we want access to the content (pacify) of the video itself is directly matched against a user’s query except manually assigned tags or specifications. In e-lecturing videos it contains visual and aural medium: slides of presentation and speech. in this system, we are going to retrieve the text from the videos automatically. To abstract visible information, we apply video content analysis to detect slides and optical character recognition to obtain their text. We abstract textual metadata by applying video Optical Character Recognition (OCR) technology on key-frames and Automatic Speech Recognition (ASR) on lecture audio. The ASR and OCR translate and discover slide text line types are accept for keywords abstraction, in which video and fragment-level keywords are abstracted for video searching on the basis of contents. .Key Words: Video fragmentation, Frame Abstraction, video indexing, and etc
A Deterministic Eviction Model for Removing Redundancies in Video Corpus IJECEIAES
The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
Query clip genre recognition using tree pruning technique for video retrievalIAEME Publication
The document proposes a method for video retrieval based on genre recognition of a query video clip. It extracts regions of interest from frames of the query clip and videos in a database. Features are extracted from these regions and used for matching via Euclidean distance. A tree pruning technique is employed to recognize the genre of the query clip and retrieve similar genre videos from the database. The method segments objects, extracts features, performs matching and genre recognition, and retrieves relevant videos in three or fewer sentences.
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
Inverted File Based Search Technique for Video Copy Retrievalijcsa
A video copy detection system is a content-based search engine focusing on Spatio-temporal features. It
aims to find whether a query video segment is a copy of video from the video database or not based on the
signature of the video. It is hard to find whether a video is a copied video or a similar video since the
features of the content are very similar from one video to the other. The main focus is to detect that the
query video is present in the video database with robustness depending on the content of video and also by
fast search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithm are adopted
to achieve robust, fast, efficient and accurate video copy detection. As a first step, the Fingerprint
Extraction algorithm is employed which extracts a fingerprint through the features from the image content
of video. The images are represented as Temporally Informative Representative Images (TIRI). Then the
next step is to find the presence of copy of a query video in a video database, in which a close match of its
fingerprint in the corresponding fingerprint database is searched using inverted-file-based method.
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...IJERD Editor
This document describes a content-based video retrieval system that extracts features from videos and uses those features to retrieve matching videos from a database. The system first segments videos into frames, applies optical character recognition (OCR) to extract text and automatic speech recognition (ASR) to extract keywords. It then extracts additional low-level visual features like color, texture and edges. All the extracted keywords and features are stored in a database. When a query video is input, the same features are extracted and used to search the database for similar videos. The results are then re-ranked based on the user's past viewing history to personalize the results. The system is evaluated on a database of 15 videos and is able to retrieve matching videos
Video content analysis and retrieval system using video storytelling and inde...IJECEIAES
Videos are used often for communicating ideas, concepts, experience, and situations, because of the significant advances made in video communication technology. The social media platforms enhanced the video usage expeditiously. At, present, recognition of a video is done, using the metadata like video title, video descriptions, and video thumbnails. There are situations like video searcher requires only a video clip on a specific topic from a long video. This paper proposes a novel methodology for the analysis of video content and using video storytelling and indexing techniques for the retrieval of the intended video clip from a long duration video. Video storytelling technique is used for video content analysis and to produce a description of the video. The video description thus created is used for preparation of an index using wormhole algorithm, guarantying the search of a keyword of definite length L, within the minimum worst-case time. This video index can be used by video searching algorithm to retrieve the relevant part of the video by virtue of the frequency of the word in the keyword search of the video index. Instead of downloading and transferring a whole video, the user can download or transfer the specifically necessary video clip. The network constraints associated with the transfer of videos are considerably addressed.
Abstract Recently, Video is becoming a catholic medium for e-learning. As per the popularity of online video information over the World Wide Web (WWW) is mostly dependent on user-assigned tags or specification, which is the system by which we can access such videos. However, this system have limitations for retrieval and frequently we want access to the content (pacify) of the video itself is directly matched against a user’s query except manually assigned tags or specifications. In e-lecturing videos it contains visual and aural medium: slides of presentation and speech. in this system, we are going to retrieve the text from the videos automatically. To abstract visible information, we apply video content analysis to detect slides and optical character recognition to obtain their text. We abstract textual metadata by applying video Optical Character Recognition (OCR) technology on key-frames and Automatic Speech Recognition (ASR) on lecture audio. The ASR and OCR translate and discover slide text line types are accept for keywords abstraction, in which video and fragment-level keywords are abstracted for video searching on the basis of contents. .Key Words: Video fragmentation, Frame Abstraction, video indexing, and etc
A Deterministic Eviction Model for Removing Redundancies in Video Corpus IJECEIAES
The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
The document proposes a reversible image data hiding scheme that operates in an encrypted domain. It embeds data through public key modulation without needing access to the secret encryption key. It uses a support vector machine classifier at the decoder to jointly decode the embedded message and reconstruct the original image by distinguishing encrypted from non-encrypted image patches. Experimental results on 100 test images validate that the proposed approach provides higher embedding capacity while perfectly reconstructing the original image and embedded message.
This document proposes a method for video copy detection using segmentation, MPEG-7 descriptors, and graph-based sequence matching. It extracts key frames from videos, extracts features from the frames using descriptors like CEDD, FCTH, SCD, EHD and CLD, and stores them in a database. When a query video is input, its features are extracted and compared to the database to detect if it matches any videos already in the database. Graph-based sequence matching is also used to find the optimal matching between video sequences despite transformations like changed frame rates or ordering. The method is shown to perform better than previous techniques at detecting copied videos through transformations.
Mtech Second progresspresentation ON VIDEO SUMMARIZATIONNEERAJ BAGHEL
This document presents a second progress report on video summarization research. It provides an outline of topics covered, including an introduction to video summarization, a literature review summarizing 5 papers on the topic, identified research gaps, challenges, the problem statement of finding key frames based on extracted text, overview of relevant datasets and tools used, and conclusions. The literature review analyzes the objectives, methods, strengths and limitations of the summarized papers.
Simulation based Performance Analysis of Histogram Shifting Method on Various...ijtsrd
In this paper we have simulated and analyzed histogram shifting method on different types of cover images. Secret image which is used to hide in cover image is called payload. We have analyzed this algorithm in MATLAB simulation tool. This analysis is performed to find out the performance of this method on different types of cover images. We have analyzed this to find out how much accuracy can we get when extracting payload from cover image. We have computed peak signal to noise ratio, mean square error. Garima Sharma | Vipra Bohara | Laxmi Narayan Balai"Simulation based Performance Analysis of Histogram Shifting Method on Various Cover Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14139.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/14139/simulation-based-performance-analysis-of-histogram-shifting-method-on-various-cover-images/garima-sharma
Multimedia Content Understanding: Bringing Context to ContentBenoit HUET
There is a digital revolution happening right before our eyes, the way we communicate is rapidly changing dues to rapid technological advances. Pencil and paper communication is drastically reducing and being replaced with newer communication medium ranging from emails to sms/mms and other instant messaging services. Information/news used to be broadcasted only through official and dedicated channels such as television, radio or newspapers. The technology available today allows every single one of us to be individual information broadcasters whether through text, image or video using our personal connected mobile device. In effect, the current trend shows that video will soon become the most important media on the Internet. While the amount of multimedia content continuously increases there is still progress to be done for automatically understanding multimedia documents in order to provide means to index, search and browse them more effectively. The objectives of this chapter are three-fold. First, we will motivate multimedia content modeling research in the current technological context. Secondly, a broad state of the art will provide the reader with a brief overview of the methodological trends of the field. Thirdly, a bird eye view of the various research themes I have supervised and/or conducted will be presented and will expose how contextual information has become an important additional source of information for multimedia content understanding.
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
The International Journal of Computer Science and Information Security (IJCSIS) is a publication venue for novel research in computer science and information security. This issue from December 2010 contains 5 research papers. The first paper proposes a 128-bit chaotic hash function that uses the logistic map and MD5/SHA-1 hashes. The second paper discusses constructing an ontology for representing human emotions in videos to improve video retrieval. The third paper proposes an intelligent memory controller for H.264 encoders to reduce external memory access. The fourth paper investigates the impact of fragmentation on query performance in distributed databases. The fifth paper examines the effect of guard intervals in a proposed MIMO-OFDM system for wireless communication.
Overview of Video Concept Detection using (CNN) Convolutional Neural NetworkIRJET Journal
This document provides an overview of using convolutional neural networks (CNNs) for video concept detection. It discusses how CNNs can be used to extract features from keyframes of video shots for classification. CNNs pretrained on ImageNet are used to extract 4096-dimensional feature vectors from each keyframe. These features are then input to classifiers like support vector machines to predict the presence of semantic concepts in the video shots, based on a previously trained model. The proposed method aims to develop a high-performance video concept detection system using deep CNNs.
This document describes a wearable AI device that uses computer vision and speech synthesis to help blind individuals. The device uses a Raspberry Pi with a camera to perform three main functions: facial recognition using convolutional neural networks and linear discriminant analysis, optical character recognition (OCR) to convert text to speech using a text-to-speech system, and object detection. The facial recognition and text are conveyed to the blind user through a speaker. The system is designed to be portable and help blind people identify faces, read text, and detect objects to assist them in daily life.
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
This document proposes an optimized security method for transmitting images over networks that combines watermarking, steganography, and embedding another image within the host image. The method works by first watermarking the host image in both its image and text form to obscure it. Then another image is embedded within the watermarked host image as a carrier, providing another layer of security. This combined output image is then transmitted to the receiver, who can extract both the original host image and watermark text using extraction techniques. The goal of this optimized approach is to provide stronger security and resistance to unauthorized access during transmission compared to prior individual techniques.
This document summarizes a research paper that proposes a method to enhance security in a video copy detection system using content-based fingerprinting. The paper discusses how existing video fingerprinting systems are not robust against content-changing attacks like changing the background of a video. To address this, the paper proposes using an interest point matching algorithm to extract fingerprints. The interest point matching algorithm detects interest points in video frames using the Harris corner detection method. It then constructs correspondences between interest points to form fingerprints. The fingerprints extracted with this method are claimed to be more robust against content-changing attacks compared to existing fingerprinting methods. The proposed algorithm is tested on videos with distortions and is found to have high detection rates and low false positive rates.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
Content Modelling for Human Action Detection via Multidimensional ApproachCSCJournals
Video content analysis is an active research domain due to the availability and the increment of audiovisual data in the digital format. There is a need to automatically extracting video content for efficient access, understanding, browsing and retrieval of videos. To obtain the information that is of interest and to provide better entertainment, tools are needed to help users extract relevant content and to effectively navigate through the large amount of available video information. Existing methods do not seem to attempt to model and estimate the semantic content of the video. Detecting and interpreting human presence, actions and activities is one of the most valuable functions in this proposed framework. The general objectives of this research are to analyze and process the audio-video streams to a robust audiovisual action recognition system by integrating, structuring and accessing multimodal information via multidimensional retrieval and extraction model. The proposed technique characterizes the action scenes by integrating cues obtained from both the audio and video tracks. Information is combined based on visual features (motion, edge, and visual characteristics of objects), audio features and video for recognizing action. This model uses HMM and GMM to provide a framework for fusing these features and to represent the multidimensional structure of the framework. The action-related visual cues are obtained by computing the spatiotemporal dynamic activity from the video shots and by abstracting specific visual events. Simultaneously, the audio features are analyzed by locating and compute several sound effects of action events that embedded in the video. Finally, these audio and visual cues are combined to identify the action scenes. Compared with using single source of either visual or audio track alone, such combined audiovisual information provides more reliable performance and allows us to understand the story content of movies in more detail. To compare the usefulness of the proposed framework, several experiments were conducted and the results were obtained by using visual features only (77.89% for precision; 72.10% for recall), audio features only (62.52% for precision; 48.93% for recall) and combined audiovisual (90.35% for precision; 90.65% for recall).
Multidimensional approach in cbmmirs full paper v4.0Albaar Rubhasy
This document proposes a multidimensional approach for content-based multimedia information retrieval systems. The approach indexes different types of multimedia collections (e.g. video, images, web pages) using various feature representations (text, color, texture, etc.). It includes three main components: a collection manager to store multimedia documents, an indexer to extract features and generate indexes, and a query processor to handle searches. The goal is to improve relevance by indexing documents in many feature spaces so more complete documents are ranked higher. Key challenges include choosing optimal feature extraction techniques and developing robust multimedia concept detection methods.
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET Journal
This document discusses human action detection in stored videos using support vector machines. It describes the major steps in activity detection as feature detection, feature description, video representation, and classification. It explains that supervised learning uses labeled training samples to build models for normal and abnormal behavior detection, but it is limited by the need for sufficient training data for less defined events. Unsupervised learning builds models of normal behavior but classifies any samples not fitting a model as abnormal. The document reviews various approaches to human activity detection and outlines challenges, such as dealing with limited or low-quality video data.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
IRJET- Object Detection in an Image using Convolutional Neural NetworkIRJET Journal
This document summarizes a research paper on object detection in images using convolutional neural networks. The paper proposes using the ImageAI Python library along with a region-based convolutional neural network model to perform object detection. The methodology loads a pre-trained model, imports the ImageAI detection class, detects objects in an input image, and prints the detected objects and probabilities. The system can accurately detect objects like faces and vehicles from images and has applications in security and traffic monitoring. However, training the neural network requires a large dataset and takes a long time.
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
This document presents a method for securing high capacity data hiding using combined data hiding techniques. The method encrypts a message using transposition cipher cryptography, applies a password, and then hides the encrypted message in an image using least significant bit steganography. Experimental results on hiding messages in various images found peak signal-to-noise ratios remained above 30 decibels, indicating hidden data did not noticeably degrade image quality. Statistical analysis of image parameters before and after hiding data also showed little difference, making the hidden message difficult to detect. The combination of encryption, password protection, and steganography provides three layers of security to better protect sizable messages.
El documento presenta las opiniones de Luis Manuel sobre el futuro de la informática y cómo influirán las nuevas tecnologías en la vida cotidiana. Luis Manuel cree que la informática seguirá mejorando rápidamente y que todo será manejado a través de pantallas táctiles conectadas a Internet. Aunque estas tecnologías serán útiles, también cree que podrían aislar a las personas y reducir la comunicación directa.
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
The document proposes a reversible image data hiding scheme that operates in an encrypted domain. It embeds data through public key modulation without needing access to the secret encryption key. It uses a support vector machine classifier at the decoder to jointly decode the embedded message and reconstruct the original image by distinguishing encrypted from non-encrypted image patches. Experimental results on 100 test images validate that the proposed approach provides higher embedding capacity while perfectly reconstructing the original image and embedded message.
This document proposes a method for video copy detection using segmentation, MPEG-7 descriptors, and graph-based sequence matching. It extracts key frames from videos, extracts features from the frames using descriptors like CEDD, FCTH, SCD, EHD and CLD, and stores them in a database. When a query video is input, its features are extracted and compared to the database to detect if it matches any videos already in the database. Graph-based sequence matching is also used to find the optimal matching between video sequences despite transformations like changed frame rates or ordering. The method is shown to perform better than previous techniques at detecting copied videos through transformations.
Mtech Second progresspresentation ON VIDEO SUMMARIZATIONNEERAJ BAGHEL
This document presents a second progress report on video summarization research. It provides an outline of topics covered, including an introduction to video summarization, a literature review summarizing 5 papers on the topic, identified research gaps, challenges, the problem statement of finding key frames based on extracted text, overview of relevant datasets and tools used, and conclusions. The literature review analyzes the objectives, methods, strengths and limitations of the summarized papers.
Simulation based Performance Analysis of Histogram Shifting Method on Various...ijtsrd
In this paper we have simulated and analyzed histogram shifting method on different types of cover images. Secret image which is used to hide in cover image is called payload. We have analyzed this algorithm in MATLAB simulation tool. This analysis is performed to find out the performance of this method on different types of cover images. We have analyzed this to find out how much accuracy can we get when extracting payload from cover image. We have computed peak signal to noise ratio, mean square error. Garima Sharma | Vipra Bohara | Laxmi Narayan Balai"Simulation based Performance Analysis of Histogram Shifting Method on Various Cover Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14139.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/14139/simulation-based-performance-analysis-of-histogram-shifting-method-on-various-cover-images/garima-sharma
Multimedia Content Understanding: Bringing Context to ContentBenoit HUET
There is a digital revolution happening right before our eyes, the way we communicate is rapidly changing dues to rapid technological advances. Pencil and paper communication is drastically reducing and being replaced with newer communication medium ranging from emails to sms/mms and other instant messaging services. Information/news used to be broadcasted only through official and dedicated channels such as television, radio or newspapers. The technology available today allows every single one of us to be individual information broadcasters whether through text, image or video using our personal connected mobile device. In effect, the current trend shows that video will soon become the most important media on the Internet. While the amount of multimedia content continuously increases there is still progress to be done for automatically understanding multimedia documents in order to provide means to index, search and browse them more effectively. The objectives of this chapter are three-fold. First, we will motivate multimedia content modeling research in the current technological context. Secondly, a broad state of the art will provide the reader with a brief overview of the methodological trends of the field. Thirdly, a bird eye view of the various research themes I have supervised and/or conducted will be presented and will expose how contextual information has become an important additional source of information for multimedia content understanding.
Book of abstract volume 8 no 9 ijcsis december 2010Oladokun Sulaiman
The International Journal of Computer Science and Information Security (IJCSIS) is a publication venue for novel research in computer science and information security. This issue from December 2010 contains 5 research papers. The first paper proposes a 128-bit chaotic hash function that uses the logistic map and MD5/SHA-1 hashes. The second paper discusses constructing an ontology for representing human emotions in videos to improve video retrieval. The third paper proposes an intelligent memory controller for H.264 encoders to reduce external memory access. The fourth paper investigates the impact of fragmentation on query performance in distributed databases. The fifth paper examines the effect of guard intervals in a proposed MIMO-OFDM system for wireless communication.
Overview of Video Concept Detection using (CNN) Convolutional Neural NetworkIRJET Journal
This document provides an overview of using convolutional neural networks (CNNs) for video concept detection. It discusses how CNNs can be used to extract features from keyframes of video shots for classification. CNNs pretrained on ImageNet are used to extract 4096-dimensional feature vectors from each keyframe. These features are then input to classifiers like support vector machines to predict the presence of semantic concepts in the video shots, based on a previously trained model. The proposed method aims to develop a high-performance video concept detection system using deep CNNs.
This document describes a wearable AI device that uses computer vision and speech synthesis to help blind individuals. The device uses a Raspberry Pi with a camera to perform three main functions: facial recognition using convolutional neural networks and linear discriminant analysis, optical character recognition (OCR) to convert text to speech using a text-to-speech system, and object detection. The facial recognition and text are conveyed to the blind user through a speaker. The system is designed to be portable and help blind people identify faces, read text, and detect objects to assist them in daily life.
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
This document proposes an optimized security method for transmitting images over networks that combines watermarking, steganography, and embedding another image within the host image. The method works by first watermarking the host image in both its image and text form to obscure it. Then another image is embedded within the watermarked host image as a carrier, providing another layer of security. This combined output image is then transmitted to the receiver, who can extract both the original host image and watermark text using extraction techniques. The goal of this optimized approach is to provide stronger security and resistance to unauthorized access during transmission compared to prior individual techniques.
This document summarizes a research paper that proposes a method to enhance security in a video copy detection system using content-based fingerprinting. The paper discusses how existing video fingerprinting systems are not robust against content-changing attacks like changing the background of a video. To address this, the paper proposes using an interest point matching algorithm to extract fingerprints. The interest point matching algorithm detects interest points in video frames using the Harris corner detection method. It then constructs correspondences between interest points to form fingerprints. The fingerprints extracted with this method are claimed to be more robust against content-changing attacks compared to existing fingerprinting methods. The proposed algorithm is tested on videos with distortions and is found to have high detection rates and low false positive rates.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
Content Modelling for Human Action Detection via Multidimensional ApproachCSCJournals
Video content analysis is an active research domain due to the availability and the increment of audiovisual data in the digital format. There is a need to automatically extracting video content for efficient access, understanding, browsing and retrieval of videos. To obtain the information that is of interest and to provide better entertainment, tools are needed to help users extract relevant content and to effectively navigate through the large amount of available video information. Existing methods do not seem to attempt to model and estimate the semantic content of the video. Detecting and interpreting human presence, actions and activities is one of the most valuable functions in this proposed framework. The general objectives of this research are to analyze and process the audio-video streams to a robust audiovisual action recognition system by integrating, structuring and accessing multimodal information via multidimensional retrieval and extraction model. The proposed technique characterizes the action scenes by integrating cues obtained from both the audio and video tracks. Information is combined based on visual features (motion, edge, and visual characteristics of objects), audio features and video for recognizing action. This model uses HMM and GMM to provide a framework for fusing these features and to represent the multidimensional structure of the framework. The action-related visual cues are obtained by computing the spatiotemporal dynamic activity from the video shots and by abstracting specific visual events. Simultaneously, the audio features are analyzed by locating and compute several sound effects of action events that embedded in the video. Finally, these audio and visual cues are combined to identify the action scenes. Compared with using single source of either visual or audio track alone, such combined audiovisual information provides more reliable performance and allows us to understand the story content of movies in more detail. To compare the usefulness of the proposed framework, several experiments were conducted and the results were obtained by using visual features only (77.89% for precision; 72.10% for recall), audio features only (62.52% for precision; 48.93% for recall) and combined audiovisual (90.35% for precision; 90.65% for recall).
Multidimensional approach in cbmmirs full paper v4.0Albaar Rubhasy
This document proposes a multidimensional approach for content-based multimedia information retrieval systems. The approach indexes different types of multimedia collections (e.g. video, images, web pages) using various feature representations (text, color, texture, etc.). It includes three main components: a collection manager to store multimedia documents, an indexer to extract features and generate indexes, and a query processor to handle searches. The goal is to improve relevance by indexing documents in many feature spaces so more complete documents are ranked higher. Key challenges include choosing optimal feature extraction techniques and developing robust multimedia concept detection methods.
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET Journal
This document discusses human action detection in stored videos using support vector machines. It describes the major steps in activity detection as feature detection, feature description, video representation, and classification. It explains that supervised learning uses labeled training samples to build models for normal and abnormal behavior detection, but it is limited by the need for sufficient training data for less defined events. Unsupervised learning builds models of normal behavior but classifies any samples not fitting a model as abnormal. The document reviews various approaches to human activity detection and outlines challenges, such as dealing with limited or low-quality video data.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
IRJET- Object Detection in an Image using Convolutional Neural NetworkIRJET Journal
This document summarizes a research paper on object detection in images using convolutional neural networks. The paper proposes using the ImageAI Python library along with a region-based convolutional neural network model to perform object detection. The methodology loads a pre-trained model, imports the ImageAI detection class, detects objects in an input image, and prints the detected objects and probabilities. The system can accurately detect objects like faces and vehicles from images and has applications in security and traffic monitoring. However, training the neural network requires a large dataset and takes a long time.
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
This document presents a method for securing high capacity data hiding using combined data hiding techniques. The method encrypts a message using transposition cipher cryptography, applies a password, and then hides the encrypted message in an image using least significant bit steganography. Experimental results on hiding messages in various images found peak signal-to-noise ratios remained above 30 decibels, indicating hidden data did not noticeably degrade image quality. Statistical analysis of image parameters before and after hiding data also showed little difference, making the hidden message difficult to detect. The combination of encryption, password protection, and steganography provides three layers of security to better protect sizable messages.
El documento presenta las opiniones de Luis Manuel sobre el futuro de la informática y cómo influirán las nuevas tecnologías en la vida cotidiana. Luis Manuel cree que la informática seguirá mejorando rápidamente y que todo será manejado a través de pantallas táctiles conectadas a Internet. Aunque estas tecnologías serán útiles, también cree que podrían aislar a las personas y reducir la comunicación directa.
Slideshare es una plataforma para compartir presentaciones. Los usuarios pueden subir sus presentaciones y otros documentos, ver el trabajo de otros usuarios, y encontrar recursos para sus clases. La plataforma también permite agregar videos y audio a las presentaciones.
In recent years, the web and internet industry has seen the significant growth and advancements in technologies. Open Source Technologies along with its features and benefits have brought the revolution for providing Web Solutions which are Robust, Secure, Scalable and moreover Cost Effective.
El documento discute los efectos de los medios de comunicación y los videojuegos en la socialización de los niños. Señala que los padres juegan un papel importante en enseñar a los niños a observar críticamente los mensajes de los medios. También explora los posibles efectos negativos de los videojuegos en la salud, comportamiento y desarrollo de los niños, pero también reconoce que pueden mejorar algunas habilidades. Concluye que los padres deben supervisar el tiempo que los niños pasan jugando video
Sarah Balogun worked on a prelim task with Ying Ho, Prince, and Owen. They split roles with Sarah operating the camera, Ying Ho calling shots, and Prince and Owen acting. They created a storyboard and script to guide their filming. While they had some issues with time management and repeating shots, they worked well as a team to complete the task. Sarah learned about teamwork, time management, camera techniques, and organization through this experience.
The survey analyzed the target audience for a new media product. It found that 75% of respondents were 16-20 years old, suggesting a student audience. Respondents were equally male and female. Most preferred indie and rock music and disliked pop and dance. When watching music videos, most aimed to be entertained and see their favorite artists. For alternative rock videos specifically, abstract concepts, shots of the artist, and disordered storylines were most important. Respondents preferred nature, woodland and industrial locations and liked videos that challenge stereotypes.
O documento descreve uma situação difícil onde o caminho é estreito e risca, requerendo concentração. Poucos itens são listados, incluindo um snorkel, bicicletas, cor marrom, índios e um personagem chamado Zé Grelhador.
El documento discute cómo la informática afectará la vida cotidiana en el futuro. Predice que el formato digital se volverá más importante con el tiempo y que eventualmente reemplazará al formato físico. Además, argumenta que la tecnología se aplicará cada vez más en campos profesionales y de ocio, como la educación y los negocios, y que muchas tareas requerirán una conexión a Internet. Sin embargo, reconoce que el acceso a la tecnología podría ser un problema para algunas personas.
UAS is partnering with The Developing Child Centre to offer Occupational Therapy after school. Please preview the information in this powerpoint for further information about TDCC and their involvement at UAS
Enxugue até 6 kg em 14 dias com a dieta antibarrigaNoma do Brasil
Este menu de 14 dias fornece cerca de 1000 calorias por dia e inclui alimentos que ajudam a eliminar gordura abdominal, melhorar a digestão e reduzir inchaço. A dieta se concentra em produtos ricos em fibras, diuréticos e monoinsaturados como o azeite de oliva.
This document describes how researchers used optical tweezers to stretch and measure the elasticity of DNA strands. Optical tweezers use refracted and reflected laser light to apply tiny forces (piconewtons) to manipulate microscopic objects like DNA. The researchers attached one end of a DNA strand to a bead trapped by the tweezers and the other end to a movable stage. By varying the stage position and measuring the counteracting force from the tweezers, they could determine how much force was required to stretch the DNA and analyze its mechanical properties.
This document provides a converter for temperature units and lists the conversions between Celsius, Reamur, Fahrenheit, and Kelvin scales. It allows the user to convert temperatures between any two of these four common temperature scales.
Query clip genre recognition using tree pruning technique for video retrievalIAEME Publication
The document proposes a method for video retrieval based on genre recognition of a query video clip. It extracts regions of interest from frames of the query clip and videos in a database based on motion detection. Features are extracted from these regions and used for matching to recognize the genre. A tree pruning technique is employed to identify the genre of the query clip and retrieve similar genre videos from the database. The method segments objects, recognizes them, and uses tree pruning for genre recognition and retrieval. It was evaluated on a dataset containing sports, movies, and news genres and showed effectiveness in genre recognition and retrieval.
Review on content based video lecture retrievaleSAT Journals
Abstract Recent advances in multimedia technologies allow the capture and storage of video data with relatively inexpensive computers. Furthermore, the new possibilities offered by the information highways have made a large amount of video data publicly available. However, without appropriate search techniques all these data are hardly usable. Users are not satisfied with the video retrieval systems that provide analogue VCR functionality. For example, a user analyses a soccer video will ask for specific events such as goals. Content-based search and retrieval of video data becomes a challenging and important problem. Therefore, the need for tools that can be manipulate the video content in the same way as traditional databases manage numeric and textual data is significant. Therefore, a more efficient method for video retrieval in WWW or within large lecture video archives is urgently needed. This project presents an approach for automated video indexing and video search in large lecture video archives. First of all, we apply automatic video segmentation and key-frame detection to offer a visual guideline for the video content navigation. Subsequently, we extract textual metadata by applying video Optical Character Recognition (OCR) technology on key-frames and Automatic Speech Recognition on lecture audio tracks. Keywords—Feature extraction, video annotation, video browsing, video retrieval, video structure analysis
Content based video retrieval using discrete cosine transformnooriasukmaningtyas
A content based video retrieval (CBVR) framework is built in this paper.
One of the essential features of video retrieval process and CBVR is a color
value. The discrete cosine transform (DCT) is used to extract a query video
features to compare with the video features stored in our database. Average
result of 0.6475 was obtained by using the DCT after implementing it to the
database we created and collected, and on all categories. This technique was
applied on our database of video, check 100 database videos, 5 videos in
Keywords: each category.
Action event retrieval from cricket video using audio energy feature for even...IAEME Publication
This document summarizes a research paper that proposes an audio-based approach for retrieving action events from cricket videos. The approach detects action events by measuring abnormal increases in audio energy levels during batsman strokes and crowd cheers. The researchers extract audio features like MFCC coefficients and calculate audio energy values from cricket video soundtracks. Peaks in energy levels are detected to find action clips corresponding to strokes and cheers. The experiments analyze cricket videos and show the method can efficiently retrieve action events using only audio analysis of crowd noise and bat impacts.
Action event retrieval from cricket video using audio energy feature for eventIAEME Publication
This document summarizes a research paper that proposes an audio-based approach for retrieving action events from cricket videos. The approach detects action events by measuring abnormal increases in audio energy levels during batsman strokes and crowd cheers. The researchers extract audio features like MFCC coefficients and calculate audio energy values from cricket video soundtracks. Peaks in energy levels are identified using adaptive thresholding to detect strokes and cheers. Video frames around detected audio peaks are retrieved as highlights of the action event. The method was tested on a dataset of cricket videos and results showed it can efficiently retrieve events like strokes and crowd reactions.
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...IJDKP
Content based retrieval has an advantage of higher prediction accuracy as compared to tagging based approach. However, the complexity in its representation and classification approach, results in lower processing accuracy and computation overhead. The correlative nature of the feature data are un-explored in the conventional modeling, where all the data features are taken as a set of feature values to give a decision. The recurrent feature class attribute is observed for the feature regrouping in action model prediction. In this paper a co-relative information, bounding grouping approach is suggested for action model prediction in CBMR application. The co-relative recurrent feature mapping results in faster retrieval process as compared to the conventional retrieval system.
RECURRENT FEATURE GROUPING AND CLASSIFICATION MODEL FOR ACTION MODEL PREDICTI...IJDKP
Content based retrieval has an advantage of higher prediction accuracy as compared to tagging based approach. However, the complexity in its representation and classification approach, results in lower processing accuracy and computation overhead. The correlative nature of the feature data are un-explored in the conventional modeling, where all the data features are taken as a set of feature values to give a decision. The recurrent feature class attribute is observed for the feature regrouping in action model prediction. In this paper a co-relative information, bounding grouping approach is suggested for action model prediction in CBMR application. The co-relative recurrent feature mapping results in faster retrieval process as compared to the conventional retrieval system.
This document presents an approach for automated indexing and content-based retrieval of lecture videos. It extracts textual metadata from slides using optical character recognition and spoken text from audio using automatic speech recognition. Keywords are extracted from the OCR and ASR results and used to create search indices. Video segments are identified by detecting transitions between unique lecture slides. The approach aims to enable efficient search and retrieval of specific video clips from large lecture video archives.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
System analysis and design for multimedia retrieval systemsijma
Due to the extensive use of information technology and the recent developments in multimedia systems, the
amount of multimedia data available to users has increased exponentially. Video is an example of
multimedia data as it contains several kinds of data such as text, image, meta-data, visual and audio.
Content based video retrieval is an approach for facilitating the searching and browsing of large
multimedia collections over WWW. In order to create an effective video retrieval system, visual perception
must be taken into account. We conjectured that a technique which employs multiple features for indexing
and retrieval would be more effective in the discrimination and search tasks of videos. In order to validate
this, content based indexing and retrieval systems were implemented using color histogram, Texture feature
(GLCM), edge density and motion..
An Stepped Forward Security System for Multimedia Content Material for Cloud ...IRJET Journal
The document discusses a proposed system for securing multimedia content on cloud infrastructures. The system uses a two-level approach: 1) generating signatures for 3D videos to robustly represent them with little storage, and 2) a distributed matching engine for scalably storing and matching signatures of original and query objects. The system was tested on over 11,000 3D videos and 1 million images, achieving high accuracy and scalability when deployed on Amazon cloud resources.
Key frame extraction methodology for video annotationIAEME Publication
This document summarizes a research paper that proposes a key frame extraction methodology to facilitate video annotation. The methodology uses edge difference between consecutive video frames to determine if the content has significantly changed. Frames where the edge difference exceeds a threshold are selected as key frames. The algorithm calculates edge differences for all frame pairs in a video. It then computes statistics like mean and standard deviation to determine a threshold. Frames with differences above this threshold are extracted as key frames. The key frames extracted represent important content changes in the video. Extracting key frames reduces processing requirements for video annotation compared to analyzing all frames. The methodology was tested on videos from domains like transportation and performed well at selecting representative frames.
The advents in this technological era have resulted into enormous pool of information. This information is
stored at multiple places globally, in multiple formats. This article highlights a methodology for extracting
the video lectures delivered by experts in the domain of Computer Science by using Generalized Gamma
Mixture Model. The feature extraction is based on the DCT transformations. In order to propose the model,
the data set is pooled from the YouTube video lectures in the domain of Computer Science. The outputs
generated are evaluated using Precision and Recall.
The ubiquitous and connected nature of camera loaded mobile devices has greatly estimated the value and importance of visual information they capture. Today, sending videos from camera phones uploaded by unknown users is relevant on news networks, and banking customers expect to be able to deposit checks using mobile devices. In this paper we represent Movee, a system that addresses the fundamental question of whether the visual stream exchange by a user has been captured live on a mobile device, and has not been tampered with by an adversary. Movee leverages the mobile device motion sensors and the inherent user movements during the shooting of the video. Movee exploits the observation that the movement of the scene recorded on the video stream should be related to the movement of the device simultaneously captured by the accelerometer. the last decade e-lecturing has become more and more popular. We model the distribution of correlation of temporal noise residue in a forged video as a Gaussian mixture model (GMM). We propose a twostep scheme to estimate the model parameters. Consequently, a Bayesian classifier is used to find the optimal threshold value based on the estimated parameters. Cyrus Deboo | Shubham Kshatriya | Rajat Bhat"Video Liveness Verification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12772.pdf http://www.ijtsrd.com/computer-science/other/12772/video-liveness-verification/cyrus-deboo
IRJET - Applications of Image and Video Deduplication: A SurveyIRJET Journal
This document discusses applications of image and video deduplication techniques. It begins by providing background on the growth of multimedia data and need for deduplication to reduce redundant data. It then describes key aspects of image and video deduplication, including extracting fingerprints from images and frames to identify duplicates. The document reviews several studies on image and video deduplication applications, such as identifying near-duplicate images on social media, detecting spoofed face images, verifying image copy detection, and eliminating near-duplicates from visual sensor networks. Overall, the document surveys various real-world implementations of image and video deduplication.
Video Data Visualization System : Semantic Classification and Personalization ijcga
We present in this paper an intelligent video data visualization tool, based on semantic classification, for
retrieving and exploring a large scale corpus of videos. Our work is based on semantic classification
resulting from semantic analysis of video. The obtained classes will be projected in the visualization space.
The graph is represented by nodes and edges, the nodes are the keyframes of video documents and the
edges are the relation between documents and the classes of documents. Finally, we construct the user’s
profile, based on the interaction with the system, to render the system more adequate to its preferences.
Video Data Visualization System : Semantic Classification and Personalization ijcga
We present in this paper an intelligent video data visualization tool, based on semantic classification, for retrieving and exploring a large scale corpus of videos. Our work is based on semantic classification resulting from semantic analysis of video. The obtained classes will be projected in the visualization space. The graph is represented by nodes and edges, the nodes are the keyframes of video documents and the
edges are the relation between documents and the classes of documents. Finally, we construct the user’s profile, based on the interaction with the system, to render the system more adequate to its preferences.
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE ijmpict
Video activity recognition has grown to be a dynamic location of analysis in latest years. A widespread
information-driven approach is denoted in this paper that produces descriptions of video content into
textual content description inside the Hindi language. This method combines the final results of modern
item with "real-international" records to pick the in all subject-verb-object triplet for depicting a video. The
usage of this triplet desire technique, a video is tagged via the trainer, mainly, Subject, Verb, and object
(SVO) and then this data is mined to improve the result of checking out video clarification by using pastime
as well as item identity. Contrasting preceding approaches, this method can annotate arbitrary videos
deprived of wanting the large series and annotation of a similar schooling video corpus. The proposed
work affords initial and primary text description within the Hindi language that is producing easy words
and sentence formation. But the fundamental challenging attempt on this work is to extract grammatically
accurate and expressive text records in Hindi textual content regarding video content.
Profile based Video segmentation system to support E-learningGihan Wikramanayake
S C Premaratne, D D Karunaratna, G N Wikramanayake, K P Hewagamage, G K A Dias (2004) "Profile Based Video Segmentation System to Support e-Learning" In:6th International Information Technology Conference, Edited by:V.K. Samaranayake et al. pp. 74-81. Infotel Lanka Society, Colombo, Sri Lanka: IITC Nov 29-Dec 1, ISBN: 955-8974-01-3
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.