This document is a summary of chapters from Clea Simon's memoir "MAD HOUSE: GROWING UP IN THE SHADOW OF MENTALLY ILL SIBLINGS". It describes Simon's childhood, where her older brother and sister were both diagnosed with schizophrenia. This created immense difficulties for her family and caused Simon to feel isolated and fear that she too may develop the illness. Though she was able to graduate from Harvard, she continued struggling with the impacts of her siblings' conditions and sought therapy to process her experiences growing up.
This document summarizes a study on clustering probabilistic graphs. The study extends the definition of graph clustering to probabilistic graphs by establishing a connection between the objective function and correlation clustering. This allows the development of practical approximation algorithms. The methods can discover the correct number of clusters in a probabilistic protein-protein interaction network and identify established protein relationships. The techniques also proved practical on a large social network of one billion edges.
Covering points of interest with mobile sensorsEcwayt
Ecway Technologies provides IEEE projects and software developments from its offices located in multiple cities across Tamil Nadu, India. The company's website and contact information is provided.
The document discusses an algorithm for autonomously deploying mobile sensors to cover predefined Points of Interest while maintaining connectivity. Each sensor moves toward a Point of Interest but also maintains connectivity with a subset of neighboring sensors as part of a Relative Neighborhood Graph, minimizing the number of sensors used for connectivity and maximizing the number available for monitoring. Analytical results, simulations, and practical implementation demonstrate the efficiency of the algorithm.
1) The document proposes a helmet-based vehicle safety system to enforce traffic rules in Tamil Nadu and reduce accident deaths from head injuries by not wearing helmets.
2) The system uses a wireless transmitter attached to a helmet and PIR sensor, which detects if a rider is wearing a helmet and allows the bike to start only if a helmet is detected.
3) The goal of the system is to ensure every rider follows traffic rules by making helmets mandatory for bike travel.
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
This document describes a study on inter-WBAN scheduling for mobile wireless body area networks. The study proposes a random incomplete coloring algorithm with low time complexity and high spatial reuse to overcome interference between wireless body area networks. Simulation results show that the proposed coloring algorithm effectively overcomes inter-WBAN interference and supports higher system throughput in various mobile WBAN scenarios compared to conventional coloring methods.
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
This document describes a code modulation based encryption and decryption technique for secure wireless communication. The system has a transmitter section and receiver section, each designed around a microcontroller. At the transmitter, data typed into a PC is encrypted using the microcontroller and transmitted via RF. At the receiver, the encrypted data is received, decoded by the microcontroller, and displayed on the PC. To view the actual data, a password must be entered which decrypts the cipher text into plaintext. The block diagram shows the transmitter components include an encoder, microcontroller, MAX232, and RF transmitter. The receiver components include a decoder, microcontroller, MAX232, and RF receiver.
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
Ecway Technologies is a software development company with offices in multiple cities in Tamil Nadu, India. They can be contacted via phone or email.
The paper presents a novel fuzzy clustering algorithm that operates on relational input data in the form of a pairwise similarity matrix between objects. The algorithm uses a graph representation and models centrality as likelihood in an Expectation-Maximization framework. Results show the algorithm can identify overlapping clusters of semantically related sentences, demonstrating potential use in text mining tasks. It was also applied successfully to benchmark datasets in other domains.
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
This paper presents a smart driving direction system that leverages taxi drivers' intelligence and experience. GPS-equipped taxis act as mobile sensors to model the dynamic traffic patterns of a city. A time-dependent landmark graph models traffic patterns and experienced drivers' route choices to provide users with the practically fastest route to a destination at a given departure time. A clustering approach estimates travel times between landmarks in different time slots. A two-stage routing algorithm then computes a customized, practically fastest route for the user based on this graph and real-world trajectory data from over 33,000 taxis over three months. Evaluation found that 60-70% of routes suggested were faster than alternatives, with 20% sharing results, and on average routes
This document is a summary of chapters from Clea Simon's memoir "MAD HOUSE: GROWING UP IN THE SHADOW OF MENTALLY ILL SIBLINGS". It describes Simon's childhood, where her older brother and sister were both diagnosed with schizophrenia. This created immense difficulties for her family and caused Simon to feel isolated and fear that she too may develop the illness. Though she was able to graduate from Harvard, she continued struggling with the impacts of her siblings' conditions and sought therapy to process her experiences growing up.
This document summarizes a study on clustering probabilistic graphs. The study extends the definition of graph clustering to probabilistic graphs by establishing a connection between the objective function and correlation clustering. This allows the development of practical approximation algorithms. The methods can discover the correct number of clusters in a probabilistic protein-protein interaction network and identify established protein relationships. The techniques also proved practical on a large social network of one billion edges.
Covering points of interest with mobile sensorsEcwayt
Ecway Technologies provides IEEE projects and software developments from its offices located in multiple cities across Tamil Nadu, India. The company's website and contact information is provided.
The document discusses an algorithm for autonomously deploying mobile sensors to cover predefined Points of Interest while maintaining connectivity. Each sensor moves toward a Point of Interest but also maintains connectivity with a subset of neighboring sensors as part of a Relative Neighborhood Graph, minimizing the number of sensors used for connectivity and maximizing the number available for monitoring. Analytical results, simulations, and practical implementation demonstrate the efficiency of the algorithm.
1) The document proposes a helmet-based vehicle safety system to enforce traffic rules in Tamil Nadu and reduce accident deaths from head injuries by not wearing helmets.
2) The system uses a wireless transmitter attached to a helmet and PIR sensor, which detects if a rider is wearing a helmet and allows the bike to start only if a helmet is detected.
3) The goal of the system is to ensure every rider follows traffic rules by making helmets mandatory for bike travel.
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
This document describes a study on inter-WBAN scheduling for mobile wireless body area networks. The study proposes a random incomplete coloring algorithm with low time complexity and high spatial reuse to overcome interference between wireless body area networks. Simulation results show that the proposed coloring algorithm effectively overcomes inter-WBAN interference and supports higher system throughput in various mobile WBAN scenarios compared to conventional coloring methods.
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
This document describes a code modulation based encryption and decryption technique for secure wireless communication. The system has a transmitter section and receiver section, each designed around a microcontroller. At the transmitter, data typed into a PC is encrypted using the microcontroller and transmitted via RF. At the receiver, the encrypted data is received, decoded by the microcontroller, and displayed on the PC. To view the actual data, a password must be entered which decrypts the cipher text into plaintext. The block diagram shows the transmitter components include an encoder, microcontroller, MAX232, and RF transmitter. The receiver components include a decoder, microcontroller, MAX232, and RF receiver.
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
Ecway Technologies is a software development company with offices in multiple cities in Tamil Nadu, India. They can be contacted via phone or email.
The paper presents a novel fuzzy clustering algorithm that operates on relational input data in the form of a pairwise similarity matrix between objects. The algorithm uses a graph representation and models centrality as likelihood in an Expectation-Maximization framework. Results show the algorithm can identify overlapping clusters of semantically related sentences, demonstrating potential use in text mining tasks. It was also applied successfully to benchmark datasets in other domains.
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
This paper presents a smart driving direction system that leverages taxi drivers' intelligence and experience. GPS-equipped taxis act as mobile sensors to model the dynamic traffic patterns of a city. A time-dependent landmark graph models traffic patterns and experienced drivers' route choices to provide users with the practically fastest route to a destination at a given departure time. A clustering approach estimates travel times between landmarks in different time slots. A two-stage routing algorithm then computes a customized, practically fastest route for the user based on this graph and real-world trajectory data from over 33,000 taxis over three months. Evaluation found that 60-70% of routes suggested were faster than alternatives, with 20% sharing results, and on average routes
Cloudsim ranking on data manifold with sink pointsEcwayt
ECWAY Technologies provides IEEE projects and software development services from its offices in multiple cities across India. The document discusses a novel ranking approach called Manifold Ranking with Sink Points (MRSP) that addresses diversity, relevance, and importance in ranking. MRSP uses manifold ranking over a data manifold to find the most relevant objects while turning already ranked objects into "sink points" to prevent redundant objects from receiving a high rank. Experimental results on update summarization and query recommendation tasks show MRSP performs strongly compared to existing ranking approaches by better addressing the importance of diversity in ranking.
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
This document describes a quality-differentiated video multicast scheme for multirate wireless networks called QDM. QDM aims to provide heterogeneous clients with differentiated video qualities matching their channel conditions. It first proposes a rate scheduling model to select the optimal transmission bitrate for each video frame to maximize total visual quality subject to minimum quality guarantees. It then presents QDM, a practical protocol that constructs a cluster-based structure to characterize heterogeneity and adapts transmission rates based on video quality perceived by representative cluster heads. Simulation results show QDM can efficiently adapt to network dynamics and variable video bitrates, producing a 2-5 dB gain in average video quality over leader-based approaches.
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
The document proposes a power allocation scheme for statistical quality-of-service provisioning in multi-relay cognitive networks. The scheme first chooses between direct transmission or relay transmission based on channel state information. It then performs efficient power allocation according to the transmission mode under average transmit power constraints, interference power constraints, and a peak interference constraint to meet quality-of-service requirements. Simulations show the proposed scheme outperforms max-min criterion and equal power allocation policies by achieving higher throughput while involving at most two relays for transmission.
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
The document discusses using the Turning Bands method to forecast the performance of distributed web systems. Real-life data was obtained from an experiment monitoring a group of web servers worldwide using an agent system called MWING located in different parts of Poland. The results showed good quality in predicting web performance when European web servers were monitored from an agent in Gliwice, Poland using the Turning Bands method.
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
This document summarizes a paper on distributed processing of probabilistic top-k queries in wireless sensor networks. It introduces the concepts of sufficient and necessary sets, which can facilitate localized data pruning in clusters. It then describes three algorithms - sufficient set-based, necessary set-based, and boundary-based - for intercluster query processing with bounded communication rounds. Finally, it presents an adaptive algorithm that dynamically switches between the three algorithms to minimize transmission cost, and experimental results showing the algorithms significantly reduce data transmission with small constant communication rounds, with the adaptive algorithm performing near-optimally under various conditions.
This document contains 15 titles for civil engineering projects related to structural analysis. The titles cover topics like analyzing beams, trusses, bridges, dams, and other structures under different loads and conditions using methods like finite element analysis. The analyses will determine factors like deflection, stresses, and dynamic response for various civil and building components.
This document discusses using a chopper circuit to control the speed of a DC motor. A chopper circuit uses MOSFETs to vary the voltage applied to the motor, allowing for remote speed control. This method is more efficient and compact than previous variable resistor and transformer-based controls. Pressing buttons on the chopper circuit varies the MOSFET firing angle, decreasing motor speed as the firing angle increases. The chopper control reduces motor current, losses, temperature, noise, and increases lifetime compared to DC operation.
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
ECWAY Technologies provides IEEE projects and software developments with offices in multiple cities in Tamil Nadu, India. They can be contacted via phone or email.
The document discusses a channel assignment algorithm for throughput optimization in multi-radio wireless mesh networks using network coding. It formulates the joint problem of random network coding, channel assignment, and broadcast link scheduling while taking into account opportunistic overhearing, interference constraints, coding constraints, number of channels, radios per node, and fairness between unicast connections. An auction-based suboptimal solution is developed for overall network throughput optimization. Evaluation shows the algorithm can effectively use multiple radios and channels and handle fairness issues from auctions, with promising gains over traditional routing solutions
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
The document discusses channel allocation and routing in hybrid multichannel multiradio wireless mesh networks. It proposes an Adaptive Dynamic Channel Allocation (ADCA) protocol that considers both throughput and delay optimization in channel assignment. It also proposes an Interference and Congestion Aware Routing (ICAR) protocol for hybrid networks with static and dynamic links that balances channel usage. Simulation results show that ADCA reduces packet delay significantly without degrading throughput, and the hybrid architecture adapts better to changing traffic than static-only architectures with lower overhead and delay than existing hybrid network approaches.
Ecway Technologies provides IEEE projects, software developments, and casual stereoscopic photo authoring. It has offices in multiple cities across India. Ecway's casual stereoscopic photo authoring method takes two images or video frames from a regular monocular camera as input and transforms them into a stereoscopic image pair for 3D viewing. The method uses a perceptual-plausible image rectification algorithm that warps the input pairs to meet stereoscopic geometric constraints while avoiding visual distortion. It formulates the warping problem as a quadratic energy minimization solved using a sparse linear solver. The method also allows local and global disparity adjustments for adapting stereoscopic images to different viewing conditions. Experiments show Ecway's spatially-varying war
Ecway Technologies provides software development and IEEE projects services from offices located in multiple cities across India. They can be contacted via phone or email on their website at www.ecwayprojects.com.
The paper presents a method for easy stereoscopic photo authoring using a regular monocular camera. It takes two input images or video frames and transforms them into a stereoscopic image pair for pleasant 3D viewing. This is done through a perceptual-plausible image rectification algorithm that warps the input pairs to meet stereoscopic geometric constraints while avoiding visual distortion. The warping uses spatially-varying mesh-based warps that encode various constraints to best meet the stereoscopic geometry and minimize distortion. Experiments show the
Capacity of hybrid wireless mesh networks with random a psEcwayt
This paper proposes a hybrid wireless mesh network (WMN) architecture that allows the backbone to utilize random connections to access points (APs) in a wireless local area network (WLAN). Theoretical analysis shows that the capacity of a three-tier hybrid WMN is affected by the number of mesh router cells connected to APs, the ratio of access link bandwidth to backbone link bandwidth, and traffic balance among routers with AP access. Simulation results demonstrate that configuring APs and balancing traffic can significantly improve network capacity in the proposed hybrid architecture by taking advantage of wired connections through APs.
This prototype robot is designed to help bomb squads by remotely detecting bombs and obstacles. It uses sensors to detect metals and obstacles as it moves through an area, sending that information back to operators via a wireless camera and computer. The robot is controlled remotely using the camera feed while sensors transmit detection data to a base station, which displays the information and sounds an alarm if metals are found.
Bed side patients monitoring system with emergency alertEcwayt
The document describes a bedside patient monitoring system that measures temperature data using a portable medical monitoring unit. The unit contains a microcontroller, sensor board, and processing system to manage information, analyze data in real-time, and provide warnings for emergencies or abnormal diagnoses. The system takes a patient's temperature, converts it to digital using an ADC, and sends it to the microcontroller for processing. If the temperature exceeds a threshold, the system sounds a buzzer for notification.
Autonomous sensing order selection strategies exploiting channel access infor...Ecwayt
The document describes an autonomous sensing order selection strategy for cognitive radio networks. The strategy allows multiple cognitive radios to sense channels sequentially for spectrum opportunities in an uncoordinated manner. The proposed adaptive persistent sensing order selection strategy reduces the likelihood of collisions between autonomous cognitive radios compared to random selection. When the number of cognitive radios is less than or equal to the number of channels, the strategy enables the radios to converge to collision-free channel sensing orders. The adaptive persistent strategy also reduces the expected time to arrive at collision-free orders compared to a randomize-after-collision strategy.
Automobile security system using digital passwordEcwayt
This document describes an automobile security system using a digital password. The system includes a keypad to enter a password, an LCD display, and a microcontroller. The user can set their own password for the system, which then allows them to unlock the device by entering the correct password code via the keypad. The system provides electronic access control and protection for automobiles using a digital password input and verification method.
Automatic temperature based exhaust fan controllerEcwayt
This document describes an automatic temperature-based exhaust fan controller circuit. The circuit uses a thermistor to sense room temperature, which is converted to a digital signal by an analog-to-digital converter (ADC). The microcontroller then sets the firing angle of a TRIAC, which controls the average power and therefore speed of the exhaust fan motor, based on the temperature reading. The fan speed will increase as the temperature rises to effectively regulate the room temperature.
The document describes an "Automatic station name display in train" project that aims to increase passenger convenience by automatically displaying the name of the upcoming station. The project has two modules: a transmitter that wirelessly sends station area information in binary form, and a receiver with an RF receiver, microcontroller, and LCD display. The receiver compares the received binary data to stored station area and name data, and displays the corresponding station name on the LCD if there is a match.
Automatic semantic content extraction in videos using a fuzzy ontology and ru...Ecwayt
Ecway Technologies provides software development and IEEE projects from its offices in multiple cities across India. It offers automatic semantic content extraction from videos using a fuzzy ontology and rule-based model. This system allows users to query and retrieve objects, events and concepts extracted from videos. It introduces an ontology-based fuzzy video semantic content model using spatial/temporal relations in event and concept definitions. This framework has been implemented and tested on three domains, obtaining satisfactory precision and recall rates for object, event and concept extraction.
Automatic room light intensity detection and control using a microprocessor a...Ecwayt
The document proposes a design called the HLCM (Home Light Control Module) that uses a microprocessor and light sensors for automatic room light detection and control. The HLCM, which will be installed in every light fixture of a home, uses a PIR sensor to detect human presence and a light sensor to measure light intensity. If no one is present, all lights will turn off, but if someone enters, the HLCM will maintain sufficient light by controlling the number of lights. The HLCM also includes an RF module to transmit data between units so lights in different areas can be controlled, and tests showed this design can reduce total power consumption.
Cloudsim ranking on data manifold with sink pointsEcwayt
ECWAY Technologies provides IEEE projects and software development services from its offices in multiple cities across India. The document discusses a novel ranking approach called Manifold Ranking with Sink Points (MRSP) that addresses diversity, relevance, and importance in ranking. MRSP uses manifold ranking over a data manifold to find the most relevant objects while turning already ranked objects into "sink points" to prevent redundant objects from receiving a high rank. Experimental results on update summarization and query recommendation tasks show MRSP performs strongly compared to existing ranking approaches by better addressing the importance of diversity in ranking.
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
This document describes a quality-differentiated video multicast scheme for multirate wireless networks called QDM. QDM aims to provide heterogeneous clients with differentiated video qualities matching their channel conditions. It first proposes a rate scheduling model to select the optimal transmission bitrate for each video frame to maximize total visual quality subject to minimum quality guarantees. It then presents QDM, a practical protocol that constructs a cluster-based structure to characterize heterogeneity and adapts transmission rates based on video quality perceived by representative cluster heads. Simulation results show QDM can efficiently adapt to network dynamics and variable video bitrates, producing a 2-5 dB gain in average video quality over leader-based approaches.
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
The document proposes a power allocation scheme for statistical quality-of-service provisioning in multi-relay cognitive networks. The scheme first chooses between direct transmission or relay transmission based on channel state information. It then performs efficient power allocation according to the transmission mode under average transmit power constraints, interference power constraints, and a peak interference constraint to meet quality-of-service requirements. Simulations show the proposed scheme outperforms max-min criterion and equal power allocation policies by achieving higher throughput while involving at most two relays for transmission.
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
The document discusses using the Turning Bands method to forecast the performance of distributed web systems. Real-life data was obtained from an experiment monitoring a group of web servers worldwide using an agent system called MWING located in different parts of Poland. The results showed good quality in predicting web performance when European web servers were monitored from an agent in Gliwice, Poland using the Turning Bands method.
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
This document summarizes a paper on distributed processing of probabilistic top-k queries in wireless sensor networks. It introduces the concepts of sufficient and necessary sets, which can facilitate localized data pruning in clusters. It then describes three algorithms - sufficient set-based, necessary set-based, and boundary-based - for intercluster query processing with bounded communication rounds. Finally, it presents an adaptive algorithm that dynamically switches between the three algorithms to minimize transmission cost, and experimental results showing the algorithms significantly reduce data transmission with small constant communication rounds, with the adaptive algorithm performing near-optimally under various conditions.
This document contains 15 titles for civil engineering projects related to structural analysis. The titles cover topics like analyzing beams, trusses, bridges, dams, and other structures under different loads and conditions using methods like finite element analysis. The analyses will determine factors like deflection, stresses, and dynamic response for various civil and building components.
This document discusses using a chopper circuit to control the speed of a DC motor. A chopper circuit uses MOSFETs to vary the voltage applied to the motor, allowing for remote speed control. This method is more efficient and compact than previous variable resistor and transformer-based controls. Pressing buttons on the chopper circuit varies the MOSFET firing angle, decreasing motor speed as the firing angle increases. The chopper control reduces motor current, losses, temperature, noise, and increases lifetime compared to DC operation.
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
ECWAY Technologies provides IEEE projects and software developments with offices in multiple cities in Tamil Nadu, India. They can be contacted via phone or email.
The document discusses a channel assignment algorithm for throughput optimization in multi-radio wireless mesh networks using network coding. It formulates the joint problem of random network coding, channel assignment, and broadcast link scheduling while taking into account opportunistic overhearing, interference constraints, coding constraints, number of channels, radios per node, and fairness between unicast connections. An auction-based suboptimal solution is developed for overall network throughput optimization. Evaluation shows the algorithm can effectively use multiple radios and channels and handle fairness issues from auctions, with promising gains over traditional routing solutions
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
The document discusses channel allocation and routing in hybrid multichannel multiradio wireless mesh networks. It proposes an Adaptive Dynamic Channel Allocation (ADCA) protocol that considers both throughput and delay optimization in channel assignment. It also proposes an Interference and Congestion Aware Routing (ICAR) protocol for hybrid networks with static and dynamic links that balances channel usage. Simulation results show that ADCA reduces packet delay significantly without degrading throughput, and the hybrid architecture adapts better to changing traffic than static-only architectures with lower overhead and delay than existing hybrid network approaches.
Ecway Technologies provides IEEE projects, software developments, and casual stereoscopic photo authoring. It has offices in multiple cities across India. Ecway's casual stereoscopic photo authoring method takes two images or video frames from a regular monocular camera as input and transforms them into a stereoscopic image pair for 3D viewing. The method uses a perceptual-plausible image rectification algorithm that warps the input pairs to meet stereoscopic geometric constraints while avoiding visual distortion. It formulates the warping problem as a quadratic energy minimization solved using a sparse linear solver. The method also allows local and global disparity adjustments for adapting stereoscopic images to different viewing conditions. Experiments show Ecway's spatially-varying war
Ecway Technologies provides software development and IEEE projects services from offices located in multiple cities across India. They can be contacted via phone or email on their website at www.ecwayprojects.com.
The paper presents a method for easy stereoscopic photo authoring using a regular monocular camera. It takes two input images or video frames and transforms them into a stereoscopic image pair for pleasant 3D viewing. This is done through a perceptual-plausible image rectification algorithm that warps the input pairs to meet stereoscopic geometric constraints while avoiding visual distortion. The warping uses spatially-varying mesh-based warps that encode various constraints to best meet the stereoscopic geometry and minimize distortion. Experiments show the
Capacity of hybrid wireless mesh networks with random a psEcwayt
This paper proposes a hybrid wireless mesh network (WMN) architecture that allows the backbone to utilize random connections to access points (APs) in a wireless local area network (WLAN). Theoretical analysis shows that the capacity of a three-tier hybrid WMN is affected by the number of mesh router cells connected to APs, the ratio of access link bandwidth to backbone link bandwidth, and traffic balance among routers with AP access. Simulation results demonstrate that configuring APs and balancing traffic can significantly improve network capacity in the proposed hybrid architecture by taking advantage of wired connections through APs.
This prototype robot is designed to help bomb squads by remotely detecting bombs and obstacles. It uses sensors to detect metals and obstacles as it moves through an area, sending that information back to operators via a wireless camera and computer. The robot is controlled remotely using the camera feed while sensors transmit detection data to a base station, which displays the information and sounds an alarm if metals are found.
Bed side patients monitoring system with emergency alertEcwayt
The document describes a bedside patient monitoring system that measures temperature data using a portable medical monitoring unit. The unit contains a microcontroller, sensor board, and processing system to manage information, analyze data in real-time, and provide warnings for emergencies or abnormal diagnoses. The system takes a patient's temperature, converts it to digital using an ADC, and sends it to the microcontroller for processing. If the temperature exceeds a threshold, the system sounds a buzzer for notification.
Autonomous sensing order selection strategies exploiting channel access infor...Ecwayt
The document describes an autonomous sensing order selection strategy for cognitive radio networks. The strategy allows multiple cognitive radios to sense channels sequentially for spectrum opportunities in an uncoordinated manner. The proposed adaptive persistent sensing order selection strategy reduces the likelihood of collisions between autonomous cognitive radios compared to random selection. When the number of cognitive radios is less than or equal to the number of channels, the strategy enables the radios to converge to collision-free channel sensing orders. The adaptive persistent strategy also reduces the expected time to arrive at collision-free orders compared to a randomize-after-collision strategy.
Automobile security system using digital passwordEcwayt
This document describes an automobile security system using a digital password. The system includes a keypad to enter a password, an LCD display, and a microcontroller. The user can set their own password for the system, which then allows them to unlock the device by entering the correct password code via the keypad. The system provides electronic access control and protection for automobiles using a digital password input and verification method.
Automatic temperature based exhaust fan controllerEcwayt
This document describes an automatic temperature-based exhaust fan controller circuit. The circuit uses a thermistor to sense room temperature, which is converted to a digital signal by an analog-to-digital converter (ADC). The microcontroller then sets the firing angle of a TRIAC, which controls the average power and therefore speed of the exhaust fan motor, based on the temperature reading. The fan speed will increase as the temperature rises to effectively regulate the room temperature.
The document describes an "Automatic station name display in train" project that aims to increase passenger convenience by automatically displaying the name of the upcoming station. The project has two modules: a transmitter that wirelessly sends station area information in binary form, and a receiver with an RF receiver, microcontroller, and LCD display. The receiver compares the received binary data to stored station area and name data, and displays the corresponding station name on the LCD if there is a match.
Automatic semantic content extraction in videos using a fuzzy ontology and ru...Ecwayt
Ecway Technologies provides software development and IEEE projects from its offices in multiple cities across India. It offers automatic semantic content extraction from videos using a fuzzy ontology and rule-based model. This system allows users to query and retrieve objects, events and concepts extracted from videos. It introduces an ontology-based fuzzy video semantic content model using spatial/temporal relations in event and concept definitions. This framework has been implemented and tested on three domains, obtaining satisfactory precision and recall rates for object, event and concept extraction.
Automatic room light intensity detection and control using a microprocessor a...Ecwayt
The document proposes a design called the HLCM (Home Light Control Module) that uses a microprocessor and light sensors for automatic room light detection and control. The HLCM, which will be installed in every light fixture of a home, uses a PIR sensor to detect human presence and a light sensor to measure light intensity. If no one is present, all lights will turn off, but if someone enters, the HLCM will maintain sufficient light by controlling the number of lights. The HLCM also includes an RF module to transmit data between units so lights in different areas can be controlled, and tests showed this design can reduce total power consumption.
Automatic room light intensity detection and control using a microprocessor a...
Cloudsim the generalization ability of online algorithms for dependent data
1. ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com
THE GENERALIZATION ABILITY OF ONLINE ALGORITHMS
FOR DEPENDENT DATA
ABSTRACT:
We study the generalization performance of online learning algorithms trained on samples
coming from a dependent source of data. We show that the generalization error of any stable
online algorithm concentrates around its regret—an easily computable statistic of the online
performance of the algorithm—when the underlying ergodic process is - or -mixing.
We show high probability error bounds assuming the loss function is convex, and we also
establish sharp convergence rates and deviation bounds for strongly convex losses and several
linear prediction problems such as linear and logistic regression, least-squares SVM, and
boosting on dependent data.
Our results have straightforward applications to stochastic optimization with dependent data, and
our analysis requires only martingale convergence arguments; we need not rely on more
powerful statistical tools such as empirical process theory.