This document describes a web application called Agro-Farm Care that aims to help farmers by predicting crops, fertilizers, and detecting diseases from images using machine learning models. The application takes in soil parameters and recommends suitable crops. It also takes in soil and crop details to recommend fertilizers. Additionally, it can detect diseases by analyzing leaf images. The system was developed using tools like Flask, Python, HTML, CSS and aims to benefit farmers by providing crop, fertilizer and disease predictions and recommendations.
Online fraud costs the global economy more than $400 billion, with more than 800 million personal records stolen in 2013 alone. Increasingly, fraud has diversified to different digital channels, including mobile and online payments, creating new challenges as innovative fraud patterns emerge. Hence it is still a challenge to find effective methods to mitigate fraud. Existing solutions include simple if-then rules and classical machine learning algorithms.
From an academic perspective, credit card fraud detection is a standard classification problem, in which historical transaction data is used to predict future frauds. However, practical aspects make the problem more complex. Indeed, existent comparison measures lack a realistic representation of monetary gains and losses, which is necessary for effective fraud detection. Moreover, there is an enormous amount of transactions from which only a tiny part are frauds, which implies a huge class imbalance. Additionally, a real fraud detection system is required to give a response in milliseconds. This criterion needs to be taken into account in the modeling process in order for the system to be successfully implemented. To solve these problems, in this presentation two recently proposed algorithms are compared: Bayes minimum risk and example-dependent cost-sensitive decision tree. These methods are compared with state of the art algorithms and shows significant improvements measured by financial savings.
Online fraud costs the global economy more than $400 billion, with more than 800 million personal records stolen in 2013 alone. Increasingly, fraud has diversified to different digital channels, including mobile and online payments, creating new challenges as innovative fraud patterns emerge. Hence it is still a challenge to find effective methods to mitigate fraud. Existing solutions include simple if-then rules and classical machine learning algorithms.
From an academic perspective, credit card fraud detection is a standard classification problem, in which historical transaction data is used to predict future frauds. However, practical aspects make the problem more complex. Indeed, existent comparison measures lack a realistic representation of monetary gains and losses, which is necessary for effective fraud detection. Moreover, there is an enormous amount of transactions from which only a tiny part are frauds, which implies a huge class imbalance. Additionally, a real fraud detection system is required to give a response in milliseconds. This criterion needs to be taken into account in the modeling process in order for the system to be successfully implemented. To solve these problems, in this presentation two recently proposed algorithms are compared: Bayes minimum risk and example-dependent cost-sensitive decision tree. These methods are compared with state of the art algorithms and shows significant improvements measured by financial savings.
Airline Analysis of Data Using Hadoop. In this project we used"Subsystem of linux" in our windows 10, after Enable developer mode we install Ubuntu via Store and in ubuntu I had instal Hadoop, java and used the tool python, excel, notepad++, hdfs, mapreduce ..etc.
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Mika Saastamoinen: Spatial computing - extending reality. Presentation at Kela Conference on Social Security 2019 – Equality and wellbeing through sustainable social security system, 10.12.2019.
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
The technology that gifts you with a friend, a right choice for people who are lazy , a technology that caters to help all age groups and helps to share your emotions and feelings with your computer. Computer with human power!
Eye Movement based Human Computer Interaction TechniqueJobin George
Eye movement-based interaction is one of several areas of current research in human computer interaction in which a new interface style seems to be emerging. In the non-command style, the computer passively monitors the user and responds as appropriate, rather than waiting for the user to issue specific commands. In describing eye movement-based human-computer interaction we can see two distinctions, one is in the nature of the user’s eye movements and the other, in the nature of the responses. In the world created by an eye movement based interface, users could move their eyes to scan the scene, just as they would a real world scene, unaffected by the presence of eye tracking equipment movement, on the eye movement axis. The alternative is to instruct users of the eye movement based interface to move their eyes in particular ways. On the response axis, objects could respond to a user’s eye movements in a natural way that is, the object responds to the user’s looking in the same way real objects do. The alternative is unnatural response, where objects respond in ways not experienced in the real world.
Now a days Eye tracking technology is applied in many fields like automotive defense and medical industries. The fields of advertising, entertainment, packaging and web design have all benefited significantly from studying the visual behavior of the consumer. Every day, as eye tracking is used in creative new ways, the list of applications grows.
Airline Analysis of Data Using Hadoop. In this project we used"Subsystem of linux" in our windows 10, after Enable developer mode we install Ubuntu via Store and in ubuntu I had instal Hadoop, java and used the tool python, excel, notepad++, hdfs, mapreduce ..etc.
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
Mika Saastamoinen: Spatial computing - extending reality. Presentation at Kela Conference on Social Security 2019 – Equality and wellbeing through sustainable social security system, 10.12.2019.
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
The technology that gifts you with a friend, a right choice for people who are lazy , a technology that caters to help all age groups and helps to share your emotions and feelings with your computer. Computer with human power!
Eye Movement based Human Computer Interaction TechniqueJobin George
Eye movement-based interaction is one of several areas of current research in human computer interaction in which a new interface style seems to be emerging. In the non-command style, the computer passively monitors the user and responds as appropriate, rather than waiting for the user to issue specific commands. In describing eye movement-based human-computer interaction we can see two distinctions, one is in the nature of the user’s eye movements and the other, in the nature of the responses. In the world created by an eye movement based interface, users could move their eyes to scan the scene, just as they would a real world scene, unaffected by the presence of eye tracking equipment movement, on the eye movement axis. The alternative is to instruct users of the eye movement based interface to move their eyes in particular ways. On the response axis, objects could respond to a user’s eye movements in a natural way that is, the object responds to the user’s looking in the same way real objects do. The alternative is unnatural response, where objects respond in ways not experienced in the real world.
Now a days Eye tracking technology is applied in many fields like automotive defense and medical industries. The fields of advertising, entertainment, packaging and web design have all benefited significantly from studying the visual behavior of the consumer. Every day, as eye tracking is used in creative new ways, the list of applications grows.
Pesticide recommendation system for cotton crop diseases due to the climatic ...IJMREMJournal
Data mining is a process of extracting knowledge from a vast database using tools and techniques. Data
mining plays an important role in decision making on issues related to many real-time problems such as
business, education, agriculture etc. Data mining in agriculture helps the farmers to decide on crop yield ratio,
water resource management, pesticides management and fertilizer management. Nowadays, climatic change is
one of the challenging problems in agriculture which has a greater impact on productivity. Many
researchers have contributed in the field of agriculture data mining i) To predict crop productivity, ii) water
management, iii) air pollution using the naïve bias and decision tree algorithms. The Proposed work is to
predict the diseases due to Climatic changes and recommended pesticide for the disease. Decision tree
algorithm is used to develop a recommendation system which helps to the farmer in the usage of pesticide for
the incidence of crop diseases.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.