This document presents a research study that proposes a novel approach for enhancing image copy detection using machine learning techniques. The study employs the Particle Bee Firefly Optimization Algorithm (PBFOA) to extract features from images for training a model. Additionally, Fuzzy C-Means clustering is used for image segmentation. The U2-Net model is adapted for image forensics and compared to the ManTra-Net model. Experimental results show that U2-Net achieves an accuracy of 92.5% for identifying manipulated images, outperforming ManTra-Net in some scenarios. The study highlights the potential of U2-Net as an effective tool for maintaining the authenticity of digital images.
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
This document presents a research paper that proposes a privacy-preserving deep learning framework for CNN-based fake face detection. The framework aims to develop a robust CNN model to accurately detect fake faces in images and videos while preserving user privacy. The researchers train their CNN model on a dataset of authentic and synthetic facial images representing techniques like deepfakes, morphing, and facial reenactment. Their evaluation shows the CNN model achieves state-of-the-art performance in fake face detection with 98% accuracy, addressing an important challenge while balancing detection capabilities with privacy concerns. The proposed approach could serve as a valuable tool for content verification, privacy protection, and ensuring trust in applications using digital media.
Broadcasting Forensics Using Machine Learning Approachesijtsrd
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and authenticate Multimedia content. Over the past decade, consumer grade imaging sensors have become increasingly prevalent, generating vast quantities of images and videos that are used for various public and private communication purposes. Such applications include publicity, advocacy, disinformation, and deception, among others. This paper aims to develop tools that can extract knowledge from these visuals and comprehend their provenance. However, many images and videos undergo modification and manipulation before public release, which can misrepresent the facts and deceive viewers. To address this issue, we propose a set of forensics and counter forensic techniques that can help establish the authenticity and integrity of Multimedia content. Additionally, we suggest ways to modify the content intentionally to mislead potential adversaries. Our proposed tools are evaluated using publicly available datasets and independently organized challenges. Our results show that the forensics and counter forensic techniques can accurately identify manipulated content and can help restore the original image or video. Furthermore, in this paper demonstrate that the modified content can successfully deceive potential adversaries while remaining undetected by state of the art forensic methods. Amit Kapoor | Prof. Vinod Mahor "Broadcasting Forensics Using Machine Learning Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57545.pdf Paper URL: https://www.ijtsrd.com.com/engineering/computer-engineering/57545/broadcasting-forensics-using-machine-learning-approaches/amit-kapoor
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
This document presents an approach for detecting copy-move forgery and recovering transformations in digital images. It uses the SIFT algorithm to extract features from images and detect similar features that indicate a copy-move forgery. The RANSAC algorithm is then used to detect any geometric transformations, such as rotation or scaling, that were applied to the copied region. The proposed methodology extracts SIFT features, performs keypoint matching to detect potential forgeries, clusters matched keypoints, and then uses RANSAC to estimate any transformations between the original and copied areas. This process aims to both detect copy-move forgeries and recover images to their original state before transformations were applied.
Image Forgery Detection Methods- A ReviewIRJET Journal
This document reviews various methods for detecting image forgery. It begins with an introduction to the topic, explaining the need for image forgery detection techniques due to the widespread manipulation of images online. It then categorizes common types of image manipulation and provides a literature review comparing the accuracy and citations of different detection techniques, such as CNN-based methods, transform-domain methods using DCT and DWT, and methods analyzing JPEG compression artifacts. The review finds that CNN-based methods generally achieve the highest accuracy, around 90-100%, but also notes transform-domain and JPEG-based methods can also achieve reasonably high accuracy ranging from 70-100% depending on the technique and testing parameters.
Image Forgery Detection Using Deep Neural NetworkIRJET Journal
This document presents a study on detecting image forgeries using deep learning techniques. Specifically, it compares the performance of an Error Level Analysis (ELA) model combined with a Convolutional Neural Network (CNN) to a pre-trained VGG-16 model. The ELA-CNN model achieves remarkably high accuracy of 99.87% and correctly identifies 99% of unknown images. In contrast, the VGG-16 model achieves slightly lower accuracy of 97.93% and validation rate of 75.87%. The study thus demonstrates that deep learning methods, especially when combined with techniques like ELA, can significantly improve image forgery detection over traditional approaches.
The document discusses various techniques for detecting tampering in digital images, including passive and active methods. Passive methods analyze underlying pixel statistics and properties to detect inconsistencies introduced during tampering, without requiring embedded watermarks. Specific passive techniques discussed are splicing detection, copy-move detection, and statistical-based detection. The document also briefly covers active techniques like digital watermarking and signatures that require embedded signals but can authenticate images. Overall, the document provides an overview of prominent frameworks for passive image tampering detection and localization.
ERROR LEVEL ANALYSIS IN IMAGE FORGERY DETECTIONIRJET Journal
This document summarizes a research paper that proposes using error level analysis (ELA) as part of a deep learning approach to detect digital image forgeries. ELA works by comparing error levels in an image to identify areas that have been manipulated. The researchers incorporated ELA feature extraction into a convolutional neural network (CNN) model for image forgery detection. Their results found that including ELA improved test and validation accuracy by around 2.7% while only increasing processing time by 5.6%. The paper concludes that combining ELA with deep learning can enhance the detection of image forgeries.
General Purpose Image Tampering Detection using Convolutional Neural Network ...sipij
Digital image tampering detection has been an active area of research in recent times due to the ease with
which digital image can be modified to convey false or misleading information. To address this problem,
several studies have proposed forensics algorithms for digital image tampering detection. While these
approaches have shown remarkable improvement, most of them only focused on detecting a specific type of
image tampering. The limitation of these approaches is that new forensic method must be designed for
each new manipulation approach that is developed. Consequently, there is a need to develop methods
capable of detecting multiple tampering operations. In this paper, we proposed a novel general purpose
image tampering scheme based on CNNs and Local Optimal Oriented Pattern (LOOP) which is capable of
detecting five types of image tampering in both binary and multiclass scenarios. Unlike the existing deep
learning techniques which used constrained pre-processing layers to suppress the effect of image content
in order to capture image tampering traces, our method uses LOOP features, which can effectively subdue
the effect image content, thus, allowing the proposed CNNs to capture the needed features to distinguish
among different types of image tampering. Through a number of detailed experiments, our results
demonstrate that the proposed general purpose image tampering method can achieve high detection
accuracies in individual and multiclass image tampering detections respectively and a comparative
analysis of our results with the existing state of the arts reveals that the proposed model is more robust
than most of the exiting methods.
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
This document presents a research paper that proposes a privacy-preserving deep learning framework for CNN-based fake face detection. The framework aims to develop a robust CNN model to accurately detect fake faces in images and videos while preserving user privacy. The researchers train their CNN model on a dataset of authentic and synthetic facial images representing techniques like deepfakes, morphing, and facial reenactment. Their evaluation shows the CNN model achieves state-of-the-art performance in fake face detection with 98% accuracy, addressing an important challenge while balancing detection capabilities with privacy concerns. The proposed approach could serve as a valuable tool for content verification, privacy protection, and ensuring trust in applications using digital media.
Broadcasting Forensics Using Machine Learning Approachesijtsrd
Broadcasting forensic is the practice of using scientific methods and techniques to analyse and authenticate Multimedia content. Over the past decade, consumer grade imaging sensors have become increasingly prevalent, generating vast quantities of images and videos that are used for various public and private communication purposes. Such applications include publicity, advocacy, disinformation, and deception, among others. This paper aims to develop tools that can extract knowledge from these visuals and comprehend their provenance. However, many images and videos undergo modification and manipulation before public release, which can misrepresent the facts and deceive viewers. To address this issue, we propose a set of forensics and counter forensic techniques that can help establish the authenticity and integrity of Multimedia content. Additionally, we suggest ways to modify the content intentionally to mislead potential adversaries. Our proposed tools are evaluated using publicly available datasets and independently organized challenges. Our results show that the forensics and counter forensic techniques can accurately identify manipulated content and can help restore the original image or video. Furthermore, in this paper demonstrate that the modified content can successfully deceive potential adversaries while remaining undetected by state of the art forensic methods. Amit Kapoor | Prof. Vinod Mahor "Broadcasting Forensics Using Machine Learning Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57545.pdf Paper URL: https://www.ijtsrd.com.com/engineering/computer-engineering/57545/broadcasting-forensics-using-machine-learning-approaches/amit-kapoor
An Approach for Copy-Move Attack Detection and Transformation RecoveryIRJET Journal
This document presents an approach for detecting copy-move forgery and recovering transformations in digital images. It uses the SIFT algorithm to extract features from images and detect similar features that indicate a copy-move forgery. The RANSAC algorithm is then used to detect any geometric transformations, such as rotation or scaling, that were applied to the copied region. The proposed methodology extracts SIFT features, performs keypoint matching to detect potential forgeries, clusters matched keypoints, and then uses RANSAC to estimate any transformations between the original and copied areas. This process aims to both detect copy-move forgeries and recover images to their original state before transformations were applied.
Image Forgery Detection Methods- A ReviewIRJET Journal
This document reviews various methods for detecting image forgery. It begins with an introduction to the topic, explaining the need for image forgery detection techniques due to the widespread manipulation of images online. It then categorizes common types of image manipulation and provides a literature review comparing the accuracy and citations of different detection techniques, such as CNN-based methods, transform-domain methods using DCT and DWT, and methods analyzing JPEG compression artifacts. The review finds that CNN-based methods generally achieve the highest accuracy, around 90-100%, but also notes transform-domain and JPEG-based methods can also achieve reasonably high accuracy ranging from 70-100% depending on the technique and testing parameters.
Image Forgery Detection Using Deep Neural NetworkIRJET Journal
This document presents a study on detecting image forgeries using deep learning techniques. Specifically, it compares the performance of an Error Level Analysis (ELA) model combined with a Convolutional Neural Network (CNN) to a pre-trained VGG-16 model. The ELA-CNN model achieves remarkably high accuracy of 99.87% and correctly identifies 99% of unknown images. In contrast, the VGG-16 model achieves slightly lower accuracy of 97.93% and validation rate of 75.87%. The study thus demonstrates that deep learning methods, especially when combined with techniques like ELA, can significantly improve image forgery detection over traditional approaches.
The document discusses various techniques for detecting tampering in digital images, including passive and active methods. Passive methods analyze underlying pixel statistics and properties to detect inconsistencies introduced during tampering, without requiring embedded watermarks. Specific passive techniques discussed are splicing detection, copy-move detection, and statistical-based detection. The document also briefly covers active techniques like digital watermarking and signatures that require embedded signals but can authenticate images. Overall, the document provides an overview of prominent frameworks for passive image tampering detection and localization.
ERROR LEVEL ANALYSIS IN IMAGE FORGERY DETECTIONIRJET Journal
This document summarizes a research paper that proposes using error level analysis (ELA) as part of a deep learning approach to detect digital image forgeries. ELA works by comparing error levels in an image to identify areas that have been manipulated. The researchers incorporated ELA feature extraction into a convolutional neural network (CNN) model for image forgery detection. Their results found that including ELA improved test and validation accuracy by around 2.7% while only increasing processing time by 5.6%. The paper concludes that combining ELA with deep learning can enhance the detection of image forgeries.
General Purpose Image Tampering Detection using Convolutional Neural Network ...sipij
Digital image tampering detection has been an active area of research in recent times due to the ease with
which digital image can be modified to convey false or misleading information. To address this problem,
several studies have proposed forensics algorithms for digital image tampering detection. While these
approaches have shown remarkable improvement, most of them only focused on detecting a specific type of
image tampering. The limitation of these approaches is that new forensic method must be designed for
each new manipulation approach that is developed. Consequently, there is a need to develop methods
capable of detecting multiple tampering operations. In this paper, we proposed a novel general purpose
image tampering scheme based on CNNs and Local Optimal Oriented Pattern (LOOP) which is capable of
detecting five types of image tampering in both binary and multiclass scenarios. Unlike the existing deep
learning techniques which used constrained pre-processing layers to suppress the effect of image content
in order to capture image tampering traces, our method uses LOOP features, which can effectively subdue
the effect image content, thus, allowing the proposed CNNs to capture the needed features to distinguish
among different types of image tampering. Through a number of detailed experiments, our results
demonstrate that the proposed general purpose image tampering method can achieve high detection
accuracies in individual and multiclass image tampering detections respectively and a comparative
analysis of our results with the existing state of the arts reveals that the proposed model is more robust
than most of the exiting methods.
General Purpose Image Tampering Detection using Convolutional Neural Network ...sipij
Digital image tampering detection has been an active area of research in recent times due to the ease with
which digital image can be modified to convey false or misleading information. To address this problem,
several studies have proposed forensics algorithms for digital image tampering detection. While these
approaches have shown remarkable improvement, most of them only focused on detecting a specific type of
image tampering. The limitation of these approaches is that new forensic method must be designed for
each new manipulation approach that is developed. Consequently, there is a need to develop methods
capable of detecting multiple tampering operations. In this paper, we proposed a novel general purpose
image tampering scheme based on CNNs and Local Optimal Oriented Pattern (LOOP) which is capable of
detecting five types of image tampering in both binary and multiclass scenarios. Unlike the existing deep
learning techniques which used constrained pre-processing layers to suppress the effect of image content
in order to capture image tampering traces, our method uses LOOP features, which can effectively subdue
the effect image content, thus, allowing the proposed CNNs to capture the needed features to distinguish
among different types of image tampering. Through a number of detailed experiments, our results
demonstrate that the proposed general purpose image tampering method can achieve high detection
accuracies in individual and multiclass image tampering detections respectively and a comparative
analysis of our results with the existing state of the arts reveals that the proposed model is more robust
than most of the exiting methods.
Real Time Crime Detection using Deep LearningIRJET Journal
The document discusses the application of deep learning techniques for real-time crime detection. It provides an overview of various deep learning architectures and methods used, including CNNs, LSTMs, YOLO, ResNet50, and R-CNN models. These techniques are applied to analyze data sources like surveillance footage and social media to identify criminal activities. The paper also examines challenges in real-time crime detection using deep learning and discusses ethical considerations. Key deep learning models discussed are Spot Crime (which uses CNNs for behavior classification), YOLO (for object detection), and combining ResNet50 and LSTM for crime classification in videos.
Novel framework for optimized digital forensic for mitigating complex image ...IJECEIAES
Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and software, there is also an increasing threat to image content security. Reviewing the existing approaches to identify the traces or artifacts states that there is a large scope of optimization to be implemented to enhance the processing further. Therefore, this paper presents a novel framework that performs cost-effective optimization of digital forensic technique with an idea of accurately localizing the area of tampering as well as offers a capability to mitigate the attacks of various forms. The study outcome shows that the proposed system offers better outcomes in contrast to the existing system to a significant scale to prove that minor novelty in design attributes could induce better improvement with respect to accuracy as well as resilience toward all potential image threats.
A Novel Approach for Machine Learning-Based Identification of Human ActivitiesIRJET Journal
The document presents a novel approach for machine learning-based human activity recognition using convolutional neural networks (CNNs). It discusses extracting frames from input videos, preprocessing the frames, using a CNN model to classify activities in the frames, and predicting the overall human activity. The methodology involves collecting video data, extracting and enhancing frames, extracting features, training the CNN model on the data, and validating the model's ability to recognize activities in real-time. Experimental results show the CNN model achieves 99% accuracy, 92% precision, and 0.93 F1 score in identifying diverse activities like meditation, jogging, and push-ups. The approach provides accurate and reliable human activity recognition with applications in healthcare, sports, and security.
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
This document describes a face mask detection system using artificial intelligence. The system is designed as a two-phase model, with the first phase involving training a convolutional neural network (CNN) model on a dataset of images containing faces with and without masks. In the second phase, the trained model can detect masks in real-time videos and classify faces as with or without a mask. The goal is to implement the system in public places to help enforce mask policies and reduce COVID-19 transmission. The model achieves accurate detection on both static images and videos by using data augmentation techniques to increase variability in the training dataset.
Image Forgery / Tampering Detection Using Deep Learning and CloudIRJET Journal
This document proposes a framework for detecting digitally modified or tampered images using deep learning and cloud services. The framework uses a Convolutional Neural Network (CNN) to extract features from images and classify them as original or tampered. It also utilizes Azure Form Recognizer services to extract text and data from documents and validate the information on a server. The system was tested on a dataset of over 12,000 photos and achieved over 90% accuracy when data was available on the server for validation. The dual approach of CNN classification and cloud-based data validation makes the framework robust and accurate for detecting image and document forgeries.
Digital Image Sham Detection Using Deep LearningIRJET Journal
This document discusses a research paper on detecting digital image forgeries using deep learning. It begins with an abstract that outlines using convolutional neural networks (CNNs) for image forgery detection. It then discusses traditional techniques for detecting forgeries before focusing on CNN-based techniques. The proposed system aims to detect all types of forgeries using VGG16 and VGG19 algorithms with a learning rate of 0.0001, claiming to achieve 100% accuracy. The system architecture and modules are described, along with types of forgeries and the VGG-16 algorithm. Experimental results showing 98.8% accuracy on test datasets are provided. The conclusions discuss that while deep learning methods show promise for comprehensive forgery detection, more work is
Exploring The Potential of Generative Adversarial Network: A Comparative Stud...IRJET Journal
The document discusses generative adversarial networks (GANs) and provides an overview and comparative analysis of several GAN architectures, including vanilla GANs, StyleGANs, CycleGANs, and MedGANs. It examines the designs, training approaches, applications, challenges, and advancements of different GAN types. The key advantages and limitations of each GAN model are discussed. The future potential of GANs is also explored, including using them for unsupervised representation learning and developing novel architectures to address current issues and broaden their applications.
This document summarizes techniques for detecting tampered or forged digital images. It discusses both active techniques that require prior information like watermarks, and passive/"blind" techniques that can detect forgeries without prior info by analyzing inconsistencies in statistical image properties introduced during tampering. Specific techniques mentioned include detecting inconsistencies in noise levels, color filter array properties, JPEG compression quality, and identifying copy-move or image splicing operations. The document also reviews several papers on techniques like analyzing demosaicing patterns, noise analysis, SIFT feature clustering, and alpha matting.
This document summarizes techniques for detecting tampered digital images. It discusses passive ("blind") methods that detect forgeries by analyzing the statistical properties and digital fingerprints of images without prior knowledge. These techniques examine inconsistencies introduced during tampering that alter the image's noise, compression, color, and other attributes. The document also outlines different types of forgeries like copy-move, splicing, retouching, and techniques using JPEG compression and lighting analysis. It reviews papers on demosaicing regularity detection and noise variation analysis for passive forgery identification.
IRJET- A Survey on Image Retrieval using Machine LearningIRJET Journal
This document summarizes a research paper on using machine learning for image retrieval. It discusses using optical character recognition (OCR) to extract text from images and then translate that text into machine-readable formats. The document reviews related work on combining visual and text features for image retrieval. It also provides an overview of the proposed system architecture, which combines color, texture, and edge features for image retrieval and evaluates performance using metrics like sensitivity, specificity, retrieval score, and accuracy.
The document discusses using machine learning for efficient attack detection in IoT devices without feature engineering. It proposes a feature-engineering-less machine learning (FEL-ML) process that uses raw packet byte streams as input instead of engineered features. This approach is lighter weight and faster than traditional methods. The FEL-ML model is trained directly on unprocessed packet data to perform malware detection on resource-constrained IoT devices. Prior research that used engineered features or complex deep learning models are not suitable for IoT due to limitations of memory and processing power. The proposed FEL-ML approach aims to enable effective network traffic security for IoT using minimal resources.
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
Through the generalization of deep learning, the research community has addressed critical challenges in
the network security domain, like malware identification and anomaly detection. However, they have yet to
discuss deploying them on Internet of Things (IoT) devices for day-to-day operations. IoT devices are often
limited in memory and processing power, rendering the compute-intensive deep learning environment
unusable. This research proposes a way to overcome this barrier by bypassing feature engineering in the
deep learning pipeline and using raw packet data as input. We introduce a feature- engineering-less
machine learning (ML) process to perform malware detection on IoT devices. Our proposed model,”
Feature engineering-less ML (FEL-ML),” is a lighter-weight detection algorithm that expends no extra
computations on “engineered” features. It effectively accelerates the low-powered IoT edge. It is trained
on unprocessed byte-streams of packets. Aside from providing better results, it is quicker than traditional
feature-based methods. FEL-ML facilitates resource-sensitive network traffic security with the added
benefit of eliminating the significant investment by subject matter experts in feature engineering.
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...IRJET Journal
This document proposes a new deep learning technique to detect copy move forgery in digital images. It uses a VGG16 CNN model to extract feature vectors from image blocks. Euclidean distance is used to measure similarity between feature vectors and detect matching blocks, indicating potential forgery. The proposed method is evaluated on the CoMoFoD dataset and achieves higher F1-scores than ResNet50 and EfficientNet models, detecting forged regions more accurately.
Utilization of Machine Learning in Computer VisionIRJET Journal
The document discusses the utilization of machine learning in computer vision. It begins by defining machine learning and computer vision, noting they aim to bring human data sensing and understanding capabilities to computers. It then discusses several applications of machine learning in computer vision, such as object detection in images using algorithms like convolutional neural networks. Finally, it concludes that machine learning and computer vision have reduced costs and improved technologies in many fields like healthcare, transportation and more, with emerging areas including life sciences and human activity analysis.
Cyberbullying Detection Using Machine LearningIRJET Journal
This document discusses a machine learning approach for detecting cyberbullying in various forms of digital content, including text, images, and PDF documents. It proposes using techniques like SVM, k-nearest neighbors, decision trees, and random forests trained on labeled datasets. For text, it would use natural language processing to analyze emotional content and harmful language. Images would be analyzed with deep learning to identify visual cues of cyberbullying. PDFs would use OCR to extract text for analysis. The goal is to automatically flag instances of cyberbullying to help reduce its prevalence online and make spaces safer. It concludes some algorithms like decision trees had the best accuracy and that continued innovation could enhance cyberbullying detection.
Cyberbullying Detection Using Machine LearningIRJET Journal
This document discusses a machine learning approach for detecting cyberbullying in various forms of digital content, including text, images, and PDF documents. It proposes using techniques like SVM, k-nearest neighbors, decision trees, and random forests trained on labeled datasets. For text, it would use natural language processing to analyze emotional content and harmful language. Images would be analyzed with deep learning to identify visual cues of cyberbullying. PDFs would use OCR to extract text for analysis. The goal is to automatically flag instances of cyberbullying to help reduce its prevalence online and make spaces safer. It concludes some algorithms like decision trees had the best accuracy and that continued innovation could enhance cyberbullying detection.
Real Time Object Detection with Audio Feedback using Yolo v3ijtsrd
In this paper, we propose a system that combines real time object detection using the YOLOv3 algorithm with audio feedback to assist visually impaired individuals in locating and identifying objects in their surroundings. The YOLOv3 algorithm is a state of the art object detection algorithm that has been used in numerous studies for various applications. Audio feedback has also been studied in previous research as a useful tool for assisting visually impaired individuals. Our proposed system builds on the effectiveness of both these technologies to provide a valuable tool for improving the independence and quality of life of visually impaired individuals. We present the architecture of our proposed system, which includes a YOLOv3 model for object detection and a text to speech engine for providing audio feedback. We also present the results of our experiments, which demonstrate the effectiveness of our system in detecting and identifying objects in real time. Our proposed system can be used in various settings, such as indoor and outdoor environments, and can assist visually impaired individuals in various activities such as the navigation and object identification. Dr. K. Nagi Reddy | K. Sreeja | M. Sreenivasulu Reddy | K. Sireesha | M. Triveni "Real Time Object Detection with Audio Feedback using Yolo_v3" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-2 , April 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd55158.pdf Paper URL: https://www.ijtsrd.com.com/engineering/electronics-and-communication-engineering/55158/real-time-object-detection-with-audio-feedback-using-yolov3/dr-k-nagi-reddy
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learning Techniques
General Purpose Image Tampering Detection using Convolutional Neural Network ...sipij
Digital image tampering detection has been an active area of research in recent times due to the ease with
which digital image can be modified to convey false or misleading information. To address this problem,
several studies have proposed forensics algorithms for digital image tampering detection. While these
approaches have shown remarkable improvement, most of them only focused on detecting a specific type of
image tampering. The limitation of these approaches is that new forensic method must be designed for
each new manipulation approach that is developed. Consequently, there is a need to develop methods
capable of detecting multiple tampering operations. In this paper, we proposed a novel general purpose
image tampering scheme based on CNNs and Local Optimal Oriented Pattern (LOOP) which is capable of
detecting five types of image tampering in both binary and multiclass scenarios. Unlike the existing deep
learning techniques which used constrained pre-processing layers to suppress the effect of image content
in order to capture image tampering traces, our method uses LOOP features, which can effectively subdue
the effect image content, thus, allowing the proposed CNNs to capture the needed features to distinguish
among different types of image tampering. Through a number of detailed experiments, our results
demonstrate that the proposed general purpose image tampering method can achieve high detection
accuracies in individual and multiclass image tampering detections respectively and a comparative
analysis of our results with the existing state of the arts reveals that the proposed model is more robust
than most of the exiting methods.
Real Time Crime Detection using Deep LearningIRJET Journal
The document discusses the application of deep learning techniques for real-time crime detection. It provides an overview of various deep learning architectures and methods used, including CNNs, LSTMs, YOLO, ResNet50, and R-CNN models. These techniques are applied to analyze data sources like surveillance footage and social media to identify criminal activities. The paper also examines challenges in real-time crime detection using deep learning and discusses ethical considerations. Key deep learning models discussed are Spot Crime (which uses CNNs for behavior classification), YOLO (for object detection), and combining ResNet50 and LSTM for crime classification in videos.
Novel framework for optimized digital forensic for mitigating complex image ...IJECEIAES
Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and software, there is also an increasing threat to image content security. Reviewing the existing approaches to identify the traces or artifacts states that there is a large scope of optimization to be implemented to enhance the processing further. Therefore, this paper presents a novel framework that performs cost-effective optimization of digital forensic technique with an idea of accurately localizing the area of tampering as well as offers a capability to mitigate the attacks of various forms. The study outcome shows that the proposed system offers better outcomes in contrast to the existing system to a significant scale to prove that minor novelty in design attributes could induce better improvement with respect to accuracy as well as resilience toward all potential image threats.
A Novel Approach for Machine Learning-Based Identification of Human ActivitiesIRJET Journal
The document presents a novel approach for machine learning-based human activity recognition using convolutional neural networks (CNNs). It discusses extracting frames from input videos, preprocessing the frames, using a CNN model to classify activities in the frames, and predicting the overall human activity. The methodology involves collecting video data, extracting and enhancing frames, extracting features, training the CNN model on the data, and validating the model's ability to recognize activities in real-time. Experimental results show the CNN model achieves 99% accuracy, 92% precision, and 0.93 F1 score in identifying diverse activities like meditation, jogging, and push-ups. The approach provides accurate and reliable human activity recognition with applications in healthcare, sports, and security.
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
This document describes a face mask detection system using artificial intelligence. The system is designed as a two-phase model, with the first phase involving training a convolutional neural network (CNN) model on a dataset of images containing faces with and without masks. In the second phase, the trained model can detect masks in real-time videos and classify faces as with or without a mask. The goal is to implement the system in public places to help enforce mask policies and reduce COVID-19 transmission. The model achieves accurate detection on both static images and videos by using data augmentation techniques to increase variability in the training dataset.
Image Forgery / Tampering Detection Using Deep Learning and CloudIRJET Journal
This document proposes a framework for detecting digitally modified or tampered images using deep learning and cloud services. The framework uses a Convolutional Neural Network (CNN) to extract features from images and classify them as original or tampered. It also utilizes Azure Form Recognizer services to extract text and data from documents and validate the information on a server. The system was tested on a dataset of over 12,000 photos and achieved over 90% accuracy when data was available on the server for validation. The dual approach of CNN classification and cloud-based data validation makes the framework robust and accurate for detecting image and document forgeries.
Digital Image Sham Detection Using Deep LearningIRJET Journal
This document discusses a research paper on detecting digital image forgeries using deep learning. It begins with an abstract that outlines using convolutional neural networks (CNNs) for image forgery detection. It then discusses traditional techniques for detecting forgeries before focusing on CNN-based techniques. The proposed system aims to detect all types of forgeries using VGG16 and VGG19 algorithms with a learning rate of 0.0001, claiming to achieve 100% accuracy. The system architecture and modules are described, along with types of forgeries and the VGG-16 algorithm. Experimental results showing 98.8% accuracy on test datasets are provided. The conclusions discuss that while deep learning methods show promise for comprehensive forgery detection, more work is
Exploring The Potential of Generative Adversarial Network: A Comparative Stud...IRJET Journal
The document discusses generative adversarial networks (GANs) and provides an overview and comparative analysis of several GAN architectures, including vanilla GANs, StyleGANs, CycleGANs, and MedGANs. It examines the designs, training approaches, applications, challenges, and advancements of different GAN types. The key advantages and limitations of each GAN model are discussed. The future potential of GANs is also explored, including using them for unsupervised representation learning and developing novel architectures to address current issues and broaden their applications.
This document summarizes techniques for detecting tampered or forged digital images. It discusses both active techniques that require prior information like watermarks, and passive/"blind" techniques that can detect forgeries without prior info by analyzing inconsistencies in statistical image properties introduced during tampering. Specific techniques mentioned include detecting inconsistencies in noise levels, color filter array properties, JPEG compression quality, and identifying copy-move or image splicing operations. The document also reviews several papers on techniques like analyzing demosaicing patterns, noise analysis, SIFT feature clustering, and alpha matting.
This document summarizes techniques for detecting tampered digital images. It discusses passive ("blind") methods that detect forgeries by analyzing the statistical properties and digital fingerprints of images without prior knowledge. These techniques examine inconsistencies introduced during tampering that alter the image's noise, compression, color, and other attributes. The document also outlines different types of forgeries like copy-move, splicing, retouching, and techniques using JPEG compression and lighting analysis. It reviews papers on demosaicing regularity detection and noise variation analysis for passive forgery identification.
IRJET- A Survey on Image Retrieval using Machine LearningIRJET Journal
This document summarizes a research paper on using machine learning for image retrieval. It discusses using optical character recognition (OCR) to extract text from images and then translate that text into machine-readable formats. The document reviews related work on combining visual and text features for image retrieval. It also provides an overview of the proposed system architecture, which combines color, texture, and edge features for image retrieval and evaluates performance using metrics like sensitivity, specificity, retrieval score, and accuracy.
The document discusses using machine learning for efficient attack detection in IoT devices without feature engineering. It proposes a feature-engineering-less machine learning (FEL-ML) process that uses raw packet byte streams as input instead of engineered features. This approach is lighter weight and faster than traditional methods. The FEL-ML model is trained directly on unprocessed packet data to perform malware detection on resource-constrained IoT devices. Prior research that used engineered features or complex deep learning models are not suitable for IoT due to limitations of memory and processing power. The proposed FEL-ML approach aims to enable effective network traffic security for IoT using minimal resources.
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
Through the generalization of deep learning, the research community has addressed critical challenges in
the network security domain, like malware identification and anomaly detection. However, they have yet to
discuss deploying them on Internet of Things (IoT) devices for day-to-day operations. IoT devices are often
limited in memory and processing power, rendering the compute-intensive deep learning environment
unusable. This research proposes a way to overcome this barrier by bypassing feature engineering in the
deep learning pipeline and using raw packet data as input. We introduce a feature- engineering-less
machine learning (ML) process to perform malware detection on IoT devices. Our proposed model,”
Feature engineering-less ML (FEL-ML),” is a lighter-weight detection algorithm that expends no extra
computations on “engineered” features. It effectively accelerates the low-powered IoT edge. It is trained
on unprocessed byte-streams of packets. Aside from providing better results, it is quicker than traditional
feature-based methods. FEL-ML facilitates resource-sensitive network traffic security with the added
benefit of eliminating the significant investment by subject matter experts in feature engineering.
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...IRJET Journal
This document proposes a new deep learning technique to detect copy move forgery in digital images. It uses a VGG16 CNN model to extract feature vectors from image blocks. Euclidean distance is used to measure similarity between feature vectors and detect matching blocks, indicating potential forgery. The proposed method is evaluated on the CoMoFoD dataset and achieves higher F1-scores than ResNet50 and EfficientNet models, detecting forged regions more accurately.
Utilization of Machine Learning in Computer VisionIRJET Journal
The document discusses the utilization of machine learning in computer vision. It begins by defining machine learning and computer vision, noting they aim to bring human data sensing and understanding capabilities to computers. It then discusses several applications of machine learning in computer vision, such as object detection in images using algorithms like convolutional neural networks. Finally, it concludes that machine learning and computer vision have reduced costs and improved technologies in many fields like healthcare, transportation and more, with emerging areas including life sciences and human activity analysis.
Cyberbullying Detection Using Machine LearningIRJET Journal
This document discusses a machine learning approach for detecting cyberbullying in various forms of digital content, including text, images, and PDF documents. It proposes using techniques like SVM, k-nearest neighbors, decision trees, and random forests trained on labeled datasets. For text, it would use natural language processing to analyze emotional content and harmful language. Images would be analyzed with deep learning to identify visual cues of cyberbullying. PDFs would use OCR to extract text for analysis. The goal is to automatically flag instances of cyberbullying to help reduce its prevalence online and make spaces safer. It concludes some algorithms like decision trees had the best accuracy and that continued innovation could enhance cyberbullying detection.
Cyberbullying Detection Using Machine LearningIRJET Journal
This document discusses a machine learning approach for detecting cyberbullying in various forms of digital content, including text, images, and PDF documents. It proposes using techniques like SVM, k-nearest neighbors, decision trees, and random forests trained on labeled datasets. For text, it would use natural language processing to analyze emotional content and harmful language. Images would be analyzed with deep learning to identify visual cues of cyberbullying. PDFs would use OCR to extract text for analysis. The goal is to automatically flag instances of cyberbullying to help reduce its prevalence online and make spaces safer. It concludes some algorithms like decision trees had the best accuracy and that continued innovation could enhance cyberbullying detection.
Real Time Object Detection with Audio Feedback using Yolo v3ijtsrd
In this paper, we propose a system that combines real time object detection using the YOLOv3 algorithm with audio feedback to assist visually impaired individuals in locating and identifying objects in their surroundings. The YOLOv3 algorithm is a state of the art object detection algorithm that has been used in numerous studies for various applications. Audio feedback has also been studied in previous research as a useful tool for assisting visually impaired individuals. Our proposed system builds on the effectiveness of both these technologies to provide a valuable tool for improving the independence and quality of life of visually impaired individuals. We present the architecture of our proposed system, which includes a YOLOv3 model for object detection and a text to speech engine for providing audio feedback. We also present the results of our experiments, which demonstrate the effectiveness of our system in detecting and identifying objects in real time. Our proposed system can be used in various settings, such as indoor and outdoor environments, and can assist visually impaired individuals in various activities such as the navigation and object identification. Dr. K. Nagi Reddy | K. Sreeja | M. Sreenivasulu Reddy | K. Sireesha | M. Triveni "Real Time Object Detection with Audio Feedback using Yolo_v3" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-2 , April 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd55158.pdf Paper URL: https://www.ijtsrd.com.com/engineering/electronics-and-communication-engineering/55158/real-time-object-detection-with-audio-feedback-using-yolov3/dr-k-nagi-reddy
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc.The current study work
can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of
separating ROI form the original image that will be applicable for all type of medical images can be evolved. Separated ROI
can be stored with xmin, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked
image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be
suitable, if we segment the ROI from medical image with the four values, then embedding of watermark can be done on whole
medical image, in this paper work on different scan like ctscan ,brain scan etc. our results significant high than other.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Similar to A Novel Approach for Enhancing Image Copy Detection with Robust Machine Learning Techniques (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.