This document proposes a face recognition-based payment processing system. It uses facial recognition technology to identify users and process payments securely. The system works as follows:
1. A user's face is detected using Haar Cascade classifiers and their facial features are extracted using Local Binary Pattern Histograms (LBPH).
2. If the detected face matches a user in the system database, a one-time password (OTP) is sent to the user's registered mobile number.
3. Upon entering the correct OTP, the payment transaction is completed. Otherwise, the transaction fails.
This system aims to provide secure contactless payments using facial biometrics for identification. It avoids the need for users to carry payment
This presentation demonstrates the Image Dithering and Dithering Methods and Algorithms. It is a good report for the computer science students, especially for students that study image processing subject in computer science department.
Ray casting is a rendering technique used in computer graphics and computational geometry.
It is capable of creating a three-dimensional perspective in a two-dimensional map.
Developed by scientists at the Mathematical Applications Group in the 1960.
it is considered one of the most basic graphics-rendering algorithms.
Ray casting makes use of the same geometric algorithm as ray tracing.
Advantage:
Ray casting is fast, as only a single computation is needed for every vertical line of the screen.
Compared to ray tracing, ray casting is faster, as it is limited by one or more geometric constraints.
his is one of the reasons why ray casting was the most popular rendering tool in early 3-D video games.
Computer Graphics 471 Project Report FinalAli Ahmed
This document is a project report for a 3D bowling game created by a team of students for a computer graphics course. It includes sections on the team's methodology, implementation details of the game engine, modeling, visual effects, and results. Key elements developed include a modular game engine, procedural modeling of the ball and pins with textures, shadows, reflections, collision detection, and animation sequences. The report discusses completed and uncompleted elements, and includes screenshots showcasing the results.
The document discusses a project to develop a desktop application that converts sign language to speech and text to sign language. It aims to help communicate with deaf people by removing barriers. The team plans to use EmguCV and C# Speech Engine. It has created an application that converts signs to text using image processing. Future work includes completing the software to cover all words in Arabic sign language.
License Plate Recognition System using Python and OpenCVVishal Polley
License plate recognition (LPR) is a type of technology, mainly software, that enables computer systems to read automatically the registration number (license number) of vehicles from digital pictures.
GRS '“ Gesture based Recognition System for Indian Sign Language Recognition ...ijtsrd
Recognition languages are developed for the better communication of the challenged people. The recognition signs include the combination of various with hand gestures, movement, arms and facial expressions to convey the words thought. The languages used in sign are rich and complex as equal as to languages that are spoken. As the technological world is growing rapidly, the sign languages for human are made to recognised by systems in order to improve the accuracy and the multiply the various sign languages with newer forms. In order to improve the accuracy in detecting the input sign, a model has been proposed. The proposed model consists of three phases a training phase, a testing phase and a storage output phase. A gesture is extracted from the given input picture. The extracted image is processed to remove the background noise data with the help of threshold pixel image value. After the removal of noise from the image and the filtered image to trained model is tested with a user input and then the detection accuracy is measured. A total of 50 sign gestures were loaded into the training model. The trained model accuracy is measured and then the output is extracted in the form of the mentioned language symbol. The detection mechanism of the proposed model is compared with the other detection methods such as Hidden Markov Model(HMM), Convolutional Neural Networks(CNN) and Support Vector Machine(SVM). The classification is done by means of a Support Vector Machine(SVM) which classifies at a higher accuracy. The accuracy obtained was 99 percent in comparison with the other detection methods. D. Anbarasan | R. Aravind | K. Alice"GRS “ Gesture based Recognition System for Indian Sign Language Recognition System for Deaf and Dumb People" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd9638.pdf http://www.ijtsrd.com/engineering/computer-engineering/9638/grs--gesture-based-recognition-system-for-indian-sign-language-recognition-system-for-deaf-and-dumb-people/d-anbarasan
Ray tracing is a technique for rendering realistic images by simulating the physical behavior of light, including reflection, refraction, color, and shadows. It works by tracing the path of light as rays emitted from the camera lens and calculating what objects they intersect. This allows for effects such as shadows, reflections off mirrors or transparent surfaces, and refraction through transparent objects. While it produces highly realistic images, ray tracing is also computationally intensive compared to other rendering techniques.
This presentation demonstrates the Image Dithering and Dithering Methods and Algorithms. It is a good report for the computer science students, especially for students that study image processing subject in computer science department.
Ray casting is a rendering technique used in computer graphics and computational geometry.
It is capable of creating a three-dimensional perspective in a two-dimensional map.
Developed by scientists at the Mathematical Applications Group in the 1960.
it is considered one of the most basic graphics-rendering algorithms.
Ray casting makes use of the same geometric algorithm as ray tracing.
Advantage:
Ray casting is fast, as only a single computation is needed for every vertical line of the screen.
Compared to ray tracing, ray casting is faster, as it is limited by one or more geometric constraints.
his is one of the reasons why ray casting was the most popular rendering tool in early 3-D video games.
Computer Graphics 471 Project Report FinalAli Ahmed
This document is a project report for a 3D bowling game created by a team of students for a computer graphics course. It includes sections on the team's methodology, implementation details of the game engine, modeling, visual effects, and results. Key elements developed include a modular game engine, procedural modeling of the ball and pins with textures, shadows, reflections, collision detection, and animation sequences. The report discusses completed and uncompleted elements, and includes screenshots showcasing the results.
The document discusses a project to develop a desktop application that converts sign language to speech and text to sign language. It aims to help communicate with deaf people by removing barriers. The team plans to use EmguCV and C# Speech Engine. It has created an application that converts signs to text using image processing. Future work includes completing the software to cover all words in Arabic sign language.
License Plate Recognition System using Python and OpenCVVishal Polley
License plate recognition (LPR) is a type of technology, mainly software, that enables computer systems to read automatically the registration number (license number) of vehicles from digital pictures.
GRS '“ Gesture based Recognition System for Indian Sign Language Recognition ...ijtsrd
Recognition languages are developed for the better communication of the challenged people. The recognition signs include the combination of various with hand gestures, movement, arms and facial expressions to convey the words thought. The languages used in sign are rich and complex as equal as to languages that are spoken. As the technological world is growing rapidly, the sign languages for human are made to recognised by systems in order to improve the accuracy and the multiply the various sign languages with newer forms. In order to improve the accuracy in detecting the input sign, a model has been proposed. The proposed model consists of three phases a training phase, a testing phase and a storage output phase. A gesture is extracted from the given input picture. The extracted image is processed to remove the background noise data with the help of threshold pixel image value. After the removal of noise from the image and the filtered image to trained model is tested with a user input and then the detection accuracy is measured. A total of 50 sign gestures were loaded into the training model. The trained model accuracy is measured and then the output is extracted in the form of the mentioned language symbol. The detection mechanism of the proposed model is compared with the other detection methods such as Hidden Markov Model(HMM), Convolutional Neural Networks(CNN) and Support Vector Machine(SVM). The classification is done by means of a Support Vector Machine(SVM) which classifies at a higher accuracy. The accuracy obtained was 99 percent in comparison with the other detection methods. D. Anbarasan | R. Aravind | K. Alice"GRS “ Gesture based Recognition System for Indian Sign Language Recognition System for Deaf and Dumb People" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd9638.pdf http://www.ijtsrd.com/engineering/computer-engineering/9638/grs--gesture-based-recognition-system-for-indian-sign-language-recognition-system-for-deaf-and-dumb-people/d-anbarasan
Ray tracing is a technique for rendering realistic images by simulating the physical behavior of light, including reflection, refraction, color, and shadows. It works by tracing the path of light as rays emitted from the camera lens and calculating what objects they intersect. This allows for effects such as shadows, reflections off mirrors or transparent surfaces, and refraction through transparent objects. While it produces highly realistic images, ray tracing is also computationally intensive compared to other rendering techniques.
Computer graphics mini project on bellman-ford algorithmRAJEEV KUMAR SINGH
This is PPT of Computer graphics mini project on bellman-ford algorithm. The 6th sem Opengl Projects for VTU.
The projects demo about the Bellman-Ford algorithm, how it works using the OpenGL graphics library in MS Visual Studio.
You can get free source code for this mini projects from - http://www.openglprojects.in/2012/06/mini-project-on-bellman-ford-algorithm.html
Malicious code, such as viruses and worms, can attach themselves to programs and spread by modifying other programs as they run. They can cause harm by deleting files, displaying messages, or preventing systems from booting properly. Viruses embed themselves in target programs by overwriting code, changing file pointers, or inserting themselves in boot sectors or memory-resident programs. They are able to spread through networks or by infecting files shared between systems. Viruses can be detected by analyzing their code storage and execution patterns, or how they transmit from one system to another.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
This document describes an automated license plate recognition system developed for Egypt. The system uses image processing techniques to extract license plates from images, recognizes the characters on the plates, and communicates with a database. It consists of three main parts: plate extraction, character recognition, and database communication. The system was tested on 100 plates and achieved a 91% accuracy rate. Future work could improve the system's ability to handle motion blurred or overlapped plates.
hidden surface elimination using z buffer algorithmrajivagarwal23dei
The document discusses hidden surface removal techniques used in 3D computer graphics. It introduces the hidden surface problem that arises when non-transparent objects obscure other objects from view. It describes object space and image space methods for identifying and removing hidden surfaces. The z-buffer algorithm is discussed as a commonly used image space method that works by comparing depth values in a z-buffer to determine which surfaces are visible at each pixel location.
Digital image forgery involves altering images through techniques like retouching, splicing, and cloning. Retouching enhances or reduces image features. Splicing combines fragments from multiple images to form new images. Cloning copies and pastes parts of a single image to duplicate or conceal objects. Forgery detection analyzes images passively for traces left during processing, or actively uses hidden digital watermarks or signatures embedded during acquisition to verify an image's source and detect modifications.
This project introduces a new methodology for hiding text data in RGB images. The methodology uses a spiral and snake scanning technique to hide payload in the least significant bit of image pixels. It involves three steps: scanning the image pixels, encrypting the text by modifying the image bit planes, and decrypting the text from the stego-image. The technique was tested on images from 24x24 to 1024x1024 pixels and was found to maintain high image quality as measured by PSNR, MSE and entropy metrics.
This document discusses different color models used in computer graphics and printing. It explains that color models are systems for creating a range of colors from a small set of primary colors. The two main types are additive models which use light, like RGB, and subtractive models which use inks, like CMYK. RGB uses red, green and blue light and is for computer displays. CMYK uses cyan, magenta, yellow and black inks and is the standard for color printing. It provides details on how each model mixes colors and describes other models like HSV which represents color in terms of hue, saturation and value.
The sutherland hodgeman polygon clipping algorithmMani Kanth
The document discusses the Sutherland Hodgeman polygon clipping algorithm. It is used to clip a polygon by specifying a clipping window. The algorithm clips the vertices of the polygon against each edge of the clipping window by finding intersection points. If an edge is not completely inside the clipping window, the portion outside is clipped off. An example is provided to demonstrate clipping a polygon ABCDE against a clipping window PQRS.
The document summarizes a student mini project on vehicle license plate recognition. It describes how the project uses image processing and optical character recognition techniques in MATLAB to: 1) capture an image of a license plate, 2) localize and segment the plate region, 3) extract and recognize the characters, and 4) output the license plate number. The overall aim is to develop a system that can detect and recognize license plates for applications like traffic enforcement, border security, and smart parking.
1. The document discusses face recognition using an eigenface approach, which uses principal component analysis to extract features from a database of faces to generate eigenfaces that can be used to identify unknown faces.
2. The eigenface approach takes into account the entire face for recognition and is relatively insensitive to small changes in faces. It is faster, simpler, and has better learning capabilities compared to other approaches.
3. Some limitations are that accuracy is affected if lighting and face position vary greatly, it only works with grayscale images, and noisy or partially occluded faces decrease recognition performance.
This document discusses face recognition systems and the use of artificial neural networks for face recognition. It describes the basic steps in a face recognition system as face detection, alignment, feature extraction, and matching. Two types of neural networks that can be used for recognition are described - Radial Basis Function Networks and Back Propagation Networks. RBF Networks have an input, hidden, and output layer while BPN uses backpropagation of errors to adjust weights. The document also outlines some applications of face recognition systems such as ID verification and criminal investigations.
The document describes a graphics editor program that simulates the MS Paint application. It uses OpenGL for graphics rendering and GLUT for creating windows and rendering scenes. Key features implemented include tools for drawing shapes, images, and text. OpenGL functions are used for rendering while GLUT functions handle window creation and events. The design section covers header files, OpenGL/GLUT functions, and user-defined functions for tasks like drawing, erasing, and filling shapes. Implementation details are provided for various drawing algorithms and user interface elements.
Facial Emotion Recognition: A Deep Learning approachAshwinRachha
Neural Networks lie at the apogee of Machine Learning algorithms. With a large set of data and automatic feature selection and extraction process, Convolutional Neural Networks are second to none. Neural Networks can be very effective in classification problems.
Facial Emotion Recognition is a technology that helps companies and individuals evaluate customers and optimize their products and services by most relevant and pertinent feedback.
This document discusses data types, expressions, and assignment statements in programming languages. It covers:
- Primitive data types like integers, floats, Booleans provided by most languages. Character strings can be primitive or arrays.
- User-defined types like enumerations and subranges. Array types can be static, dynamic, or have different index types. Unions and pointers/references are also covered.
- Expressions involve operators, operands, and evaluation order. Operator overloading and type conversions are design considerations.
- Assignment statements use operators like = and := to change variable values. Compound and unary operators provide shorthand. Assignment can produce results used as expressions in some languages.
This document discusses color models and color spaces. It defines color models as specifications for representing colors as points within a coordinate system. Common color models include RGB, grayscale, and binary. It describes how human vision perceives color through red, green, and blue cone receptors in the eye. Hue, saturation, and brightness are also defined as the three properties that describe color, with hue being the actual color, saturation being the purity of the color, and brightness being the relative intensity.
Graphics Programming OpenGL & GLUT in Code::BlocksBudditha Hettige
This document provides instructions for setting up OpenGL and GLUT projects in Code::Blocks. It discusses downloading Code::Blocks and the necessary GLUT files, and saving them in the appropriate directories. It then outlines the steps to create a new GLUT project in Code::Blocks, including selecting the compiler and building the application. The document also provides examples of OpenGL code using geometric primitives, transformations, and GLUT functions.
The document discusses programming constructs and converting algorithms into computer programs. It covers:
1) The basic constructs of sequence, selection, and iteration that are necessary to write any computer program according to Edsger Dijkstra's theorem. Sequence involves steps executed in order, selection allows choosing between alternatives, and iteration repeats steps.
2) Pseudocode as a way to represent algorithms independently of any programming language using basic commands like input, output, and assignment.
3) Variables as named storage locations for values in a program. When converting pseudocode to an actual programming language, the variable type must be specified.
4) Two approaches for how a computer executes a program - compiling converts the entire source
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
This document describes a visual attendance system using face recognition. The system was created to make the traditional paper-based attendance process more efficient and less prone to errors. It uses computer vision and face recognition techniques, including the RetinaFace and Arcnet algorithms, to detect and identify students' faces from video feeds or images taken in the classroom. When taking attendance, the system captures photos of students present and searches its database of student faces to automatically record attendance without disrupting the class. The document discusses the methodology and system structure, including face detection, face recognition modeling, and an overall workflow flowchart. It aims to provide an improved digital solution for tracking attendance at universities and colleges.
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
This document describes a proposed system for credit card authentication using facial recognition. The system aims to address security issues with credit card fraud during online transactions. Currently, credit cards often rely on PIN codes for authentication, but PIN codes can be stolen or forgotten. The proposed system uses facial recognition technology to authenticate users during online credit card payments. When users register their credit card, their photo would be taken and their facial features extracted and stored in a database. During a payment, the system would compare the user's live photo to the stored facial features to verify their identity before approving the transaction. The document outlines the facial recognition process, including face detection, feature extraction using Local Binary Patterns, and face matching. It also provides sample
Computer graphics mini project on bellman-ford algorithmRAJEEV KUMAR SINGH
This is PPT of Computer graphics mini project on bellman-ford algorithm. The 6th sem Opengl Projects for VTU.
The projects demo about the Bellman-Ford algorithm, how it works using the OpenGL graphics library in MS Visual Studio.
You can get free source code for this mini projects from - http://www.openglprojects.in/2012/06/mini-project-on-bellman-ford-algorithm.html
Malicious code, such as viruses and worms, can attach themselves to programs and spread by modifying other programs as they run. They can cause harm by deleting files, displaying messages, or preventing systems from booting properly. Viruses embed themselves in target programs by overwriting code, changing file pointers, or inserting themselves in boot sectors or memory-resident programs. They are able to spread through networks or by infecting files shared between systems. Viruses can be detected by analyzing their code storage and execution patterns, or how they transmit from one system to another.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
This document describes an automated license plate recognition system developed for Egypt. The system uses image processing techniques to extract license plates from images, recognizes the characters on the plates, and communicates with a database. It consists of three main parts: plate extraction, character recognition, and database communication. The system was tested on 100 plates and achieved a 91% accuracy rate. Future work could improve the system's ability to handle motion blurred or overlapped plates.
hidden surface elimination using z buffer algorithmrajivagarwal23dei
The document discusses hidden surface removal techniques used in 3D computer graphics. It introduces the hidden surface problem that arises when non-transparent objects obscure other objects from view. It describes object space and image space methods for identifying and removing hidden surfaces. The z-buffer algorithm is discussed as a commonly used image space method that works by comparing depth values in a z-buffer to determine which surfaces are visible at each pixel location.
Digital image forgery involves altering images through techniques like retouching, splicing, and cloning. Retouching enhances or reduces image features. Splicing combines fragments from multiple images to form new images. Cloning copies and pastes parts of a single image to duplicate or conceal objects. Forgery detection analyzes images passively for traces left during processing, or actively uses hidden digital watermarks or signatures embedded during acquisition to verify an image's source and detect modifications.
This project introduces a new methodology for hiding text data in RGB images. The methodology uses a spiral and snake scanning technique to hide payload in the least significant bit of image pixels. It involves three steps: scanning the image pixels, encrypting the text by modifying the image bit planes, and decrypting the text from the stego-image. The technique was tested on images from 24x24 to 1024x1024 pixels and was found to maintain high image quality as measured by PSNR, MSE and entropy metrics.
This document discusses different color models used in computer graphics and printing. It explains that color models are systems for creating a range of colors from a small set of primary colors. The two main types are additive models which use light, like RGB, and subtractive models which use inks, like CMYK. RGB uses red, green and blue light and is for computer displays. CMYK uses cyan, magenta, yellow and black inks and is the standard for color printing. It provides details on how each model mixes colors and describes other models like HSV which represents color in terms of hue, saturation and value.
The sutherland hodgeman polygon clipping algorithmMani Kanth
The document discusses the Sutherland Hodgeman polygon clipping algorithm. It is used to clip a polygon by specifying a clipping window. The algorithm clips the vertices of the polygon against each edge of the clipping window by finding intersection points. If an edge is not completely inside the clipping window, the portion outside is clipped off. An example is provided to demonstrate clipping a polygon ABCDE against a clipping window PQRS.
The document summarizes a student mini project on vehicle license plate recognition. It describes how the project uses image processing and optical character recognition techniques in MATLAB to: 1) capture an image of a license plate, 2) localize and segment the plate region, 3) extract and recognize the characters, and 4) output the license plate number. The overall aim is to develop a system that can detect and recognize license plates for applications like traffic enforcement, border security, and smart parking.
1. The document discusses face recognition using an eigenface approach, which uses principal component analysis to extract features from a database of faces to generate eigenfaces that can be used to identify unknown faces.
2. The eigenface approach takes into account the entire face for recognition and is relatively insensitive to small changes in faces. It is faster, simpler, and has better learning capabilities compared to other approaches.
3. Some limitations are that accuracy is affected if lighting and face position vary greatly, it only works with grayscale images, and noisy or partially occluded faces decrease recognition performance.
This document discusses face recognition systems and the use of artificial neural networks for face recognition. It describes the basic steps in a face recognition system as face detection, alignment, feature extraction, and matching. Two types of neural networks that can be used for recognition are described - Radial Basis Function Networks and Back Propagation Networks. RBF Networks have an input, hidden, and output layer while BPN uses backpropagation of errors to adjust weights. The document also outlines some applications of face recognition systems such as ID verification and criminal investigations.
The document describes a graphics editor program that simulates the MS Paint application. It uses OpenGL for graphics rendering and GLUT for creating windows and rendering scenes. Key features implemented include tools for drawing shapes, images, and text. OpenGL functions are used for rendering while GLUT functions handle window creation and events. The design section covers header files, OpenGL/GLUT functions, and user-defined functions for tasks like drawing, erasing, and filling shapes. Implementation details are provided for various drawing algorithms and user interface elements.
Facial Emotion Recognition: A Deep Learning approachAshwinRachha
Neural Networks lie at the apogee of Machine Learning algorithms. With a large set of data and automatic feature selection and extraction process, Convolutional Neural Networks are second to none. Neural Networks can be very effective in classification problems.
Facial Emotion Recognition is a technology that helps companies and individuals evaluate customers and optimize their products and services by most relevant and pertinent feedback.
This document discusses data types, expressions, and assignment statements in programming languages. It covers:
- Primitive data types like integers, floats, Booleans provided by most languages. Character strings can be primitive or arrays.
- User-defined types like enumerations and subranges. Array types can be static, dynamic, or have different index types. Unions and pointers/references are also covered.
- Expressions involve operators, operands, and evaluation order. Operator overloading and type conversions are design considerations.
- Assignment statements use operators like = and := to change variable values. Compound and unary operators provide shorthand. Assignment can produce results used as expressions in some languages.
This document discusses color models and color spaces. It defines color models as specifications for representing colors as points within a coordinate system. Common color models include RGB, grayscale, and binary. It describes how human vision perceives color through red, green, and blue cone receptors in the eye. Hue, saturation, and brightness are also defined as the three properties that describe color, with hue being the actual color, saturation being the purity of the color, and brightness being the relative intensity.
Graphics Programming OpenGL & GLUT in Code::BlocksBudditha Hettige
This document provides instructions for setting up OpenGL and GLUT projects in Code::Blocks. It discusses downloading Code::Blocks and the necessary GLUT files, and saving them in the appropriate directories. It then outlines the steps to create a new GLUT project in Code::Blocks, including selecting the compiler and building the application. The document also provides examples of OpenGL code using geometric primitives, transformations, and GLUT functions.
The document discusses programming constructs and converting algorithms into computer programs. It covers:
1) The basic constructs of sequence, selection, and iteration that are necessary to write any computer program according to Edsger Dijkstra's theorem. Sequence involves steps executed in order, selection allows choosing between alternatives, and iteration repeats steps.
2) Pseudocode as a way to represent algorithms independently of any programming language using basic commands like input, output, and assignment.
3) Variables as named storage locations for values in a program. When converting pseudocode to an actual programming language, the variable type must be specified.
4) Two approaches for how a computer executes a program - compiling converts the entire source
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
This document describes a visual attendance system using face recognition. The system was created to make the traditional paper-based attendance process more efficient and less prone to errors. It uses computer vision and face recognition techniques, including the RetinaFace and Arcnet algorithms, to detect and identify students' faces from video feeds or images taken in the classroom. When taking attendance, the system captures photos of students present and searches its database of student faces to automatically record attendance without disrupting the class. The document discusses the methodology and system structure, including face detection, face recognition modeling, and an overall workflow flowchart. It aims to provide an improved digital solution for tracking attendance at universities and colleges.
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
This document describes a proposed system for credit card authentication using facial recognition. The system aims to address security issues with credit card fraud during online transactions. Currently, credit cards often rely on PIN codes for authentication, but PIN codes can be stolen or forgotten. The proposed system uses facial recognition technology to authenticate users during online credit card payments. When users register their credit card, their photo would be taken and their facial features extracted and stored in a database. During a payment, the system would compare the user's live photo to the stored facial features to verify their identity before approving the transaction. The document outlines the facial recognition process, including face detection, feature extraction using Local Binary Patterns, and face matching. It also provides sample
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
1) The document proposes an automated attendance system using face recognition for educational institutions to replace traditional manual attendance marking.
2) The system uses OpenCV with face detection algorithms like Viola-Jones and PCA to detect faces, create face databases, and compare faces to identities to automatically mark attendance in an excel file.
3) During use, faces will be detected in images from a webcam, compared to stored databases to identify individuals, and their attendance marked electronically without needing physical interaction like ID cards.
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
1. The document describes a computerized attendance system using face recognition for educational institutions. It uses OpenCV with face recognition and detection algorithms like Viola-Jones, PCA, and Eigenfaces.
2. Faces are detected using Viola-Jones algorithm. PCA is used to train detected faces and create a database of known faces. During attendance, faces are compared to the database to identify individuals and mark attendance automatically in an Excel file.
3. This automated system provides benefits over manual attendance systems by saving time, reducing errors, and preventing forgery. It is a more convenient and accurate way to take attendance.
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
This document proposes a free and generic facial attendance system using Android that can automatically detect students' faces and mark attendance. It uses face detection and recognition algorithms to capture images from a camera and identify students by matching faces to a database. If a face is detected, attendance is marked as present. The system then creates a Google Sheet to store and access attendance records. This provides a low-cost alternative to commercial biometric systems for tracking student attendance.
The document discusses using artificial intelligence and machine learning for lower-cost motion capture animation. It proposes a system that uses OpenCV and Unity to extract coordinates from uploaded video frames and generate animated character models without expensive motion capture suits. A Python script would detect 33 body points from a video and save the coordinates to a text file. Unity software would then use those coordinates to create animated spheres representing the body points and linking them to form a moving skeleton. The goal is to use AI and external software to enable affordable and innovative motion capture for the general public.
IRJET- Face Recognition using Deep LearningIRJET Journal
This document summarizes research on face recognition using deep learning techniques. It begins with an abstract discussing the use of facial recognition technology for identification and verification purposes. It then provides details on common face recognition methods, including Haar cascade classifiers for detection and Local Binary Patterns Histograms (LBPH) for recognition. The document finds that LBPH achieves 89.6% accuracy on still images, while convolutional neural networks (CNNs) can achieve over 99% accuracy. It concludes that facial recognition technology is increasingly being used for security applications and could potentially replace passwords and keys.
This document presents a proposed automated attendance management system using face recognition. The system would use machine learning algorithms and deep learning approaches to recognize students' faces from images and track attendance. It discusses how face recognition works, including face detection, alignment, feature extraction, and recognition. It reviews similar existing systems and their limitations. The document tests several machine learning algorithms on their dataset and finds that an SVM classifier achieves the highest accuracy of 99.3%. Results are presented showing the system labeling and recognizing faces to mark attendance. The system aims to automate the attendance process to ease the burden on teachers, especially in online learning settings.
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET Journal
This document discusses using augmented reality and face recognition techniques to display a person's social media profile by analyzing their face. It proposes combining AR and face recognition by developing a device that can recognize a person's social status from their face in a crowd. The document reviews related works using AR for product promotion, education, and shopping applications. It describes existing face recognition and AR display methods, and algorithms like Eigenface and Haar cascade SVM classifier that can be used. The aim is to enhance interaction between users and technology, with applications in criminal detection, disaster management, education and more.
This document summarizes a research paper on developing a criminal face identification system using computer vision and machine learning techniques. It discusses how face recognition works and various algorithms that can be used, including Eigenfaces, Fisherfaces, SIFT, SURF and LBPH. The proposed system uses LBPH to extract features from faces, divide images into grids, and create histograms to represent facial data. It then compares histograms to identify faces by calculating distances between histograms. The goal is to accurately identify criminals by matching faces to a database and retrieving personal details. The system was tested and able to detect, verify and identify faces to some degree of accuracy.
IRJET - Face Detection and Recognition SystemIRJET Journal
The document describes a face detection and recognition system that uses machine learning algorithms. It analyzes facial structures in images and compares them to a dataset of facial models to identify matches. The system performs background subtraction, face detection, face recognition, and tracking. It was created to provide quick, accurate and contactless biometric security but could also be used for applications like attendance tracking. The system architecture includes modules for motion detection, face detection, face recognition and tracking a detected face. It was designed to be easily adaptable and allow additional functionality to be added.
Currency Recognition System using Image ProcessingIRJET Journal
This document describes a currency recognition system using image processing. The system aims to help common people identify original currency notes by automatically extracting visual features from images of notes and comparing them to templates of real notes. It analyzes shapes like identification marks and security threads to determine if a note is genuine. The system is intended to be cheaper and more accessible than existing bank machines, allowing people to recognize notes anywhere using a mobile app. It works by segmenting note images, extracting features through template matching, and outputting whether the analyzed note is original or counterfeit. The goal is to develop an accurate and affordable solution to assist people in verifying currency.
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
The document describes a system that uses facial recognition and a convolutional neural network (CNN) to securely authenticate online payments. The system uses a two-step verification process of OTP verification followed by facial recognition using a CNN. The CNN is trained on the LFW dataset and then used to authenticate users by comparing a real-time captured image to images stored in a database. The system aims to enhance online transaction security by verifying the identity of the user through facial recognition.
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
This document proposes an effective attendance marking system using face recognition and RFID tags. The system aims to automate the attendance marking process. It works as follows:
1. A student holds their RFID tag close to a reader, which initiates the camera.
2. The student's face is then captured. Face recognition and matching algorithms based on MATLAB process and verify if the face matches the student's profile.
3. If a match is found, the student is marked as present. If not, they are marked absent. This process occurs for all students.
4. Students not present by a certain time limit will also be automatically marked absent. Parents can be messaged about absences.
DROWSINESS DETECTION MODEL USING PYTHONIRJET Journal
This document describes a drowsiness detection model built using Python. The model uses computer vision and a pre-trained facial landmark detection model to identify a driver's eyes in video from a webcam. It calculates the eye aspect ratio over time to determine if the driver's eyes are closed, indicating drowsiness. If drowsiness is detected by the eyes being closed for a certain period, an alarm sound is triggered using pygame to alert the driver. The goal is to create an affordable and effective drowsiness detection system to help reduce accidents caused by tired drivers. The model was tested and successfully detected open and closed eyes and triggered alarms appropriately.
1. The document discusses various techniques that have been proposed for face detection and attendance systems, including Haar classifiers, improved support vector machines, and local binary patterns algorithms.
2. It reviews several papers that have implemented different methods for face recognition for attendance systems, such as using HOG features and PCA for dimensionality reduction along with SVM classification.
3. The document also summarizes a paper that proposed a context-aware local binary feature learning method for face recognition that exploits contextual information between adjacent image bits.
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
This document summarizes an automated attendance system using video-based face recognition. The system works by capturing a video of students in a classroom and using face detection and recognition algorithms to identify and mark the attendance of each student. It first detects faces in each video frame using the Haar cascade classifier, then recognizes the faces by comparing them to a training database of student faces using the Eigenfaces algorithm. Finally, it registers the attendance in an Excel sheet. The system aims to make the attendance process more efficient and accurate compared to traditional manual methods.
ATTENDANCE BY FACE RECOGNITION USING AIIRJET Journal
This document describes a proposed face recognition system for automated student attendance. The system would use a camera situated at a school entrance to capture frontal images of students as they enter. It would then use face recognition algorithms to identify each student and automatically record their attendance. Some key advantages of this system include reducing the time spent on manual attendance recording and increasing accuracy by eliminating proxy attendance issues. The proposed system aims to provide a hassle-free automated solution for tracking student attendance using biometric face recognition technologies.
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
This document discusses 3D face recognition technology and its applications for network security. It begins by describing the limitations of traditional 2D face recognition, such as being affected by changes in lighting, pose, and facial expressions. 3D face recognition uses depth information and is pose invariant. It extracts distinctive facial features like depth of the nose, eye sockets, and chin. The document then covers the working of a 3D face recognition system including detection, alignment, measurement, representation, matching, and verification steps. Finally, it analyzes different algorithms used for face recognition, including Principal Component Analysis (PCA), Discrete Cosine Transform (DCT), and Linear Discriminant Analysis (LDA).
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
This document proposes an OCR detection and biometric authenticated credit card payment system. It aims to simplify online transactions by using fingerprint authentication and OCR to detect credit/debit card details from images, reducing the multi-step verification process to a single step. The system utilizes convolutional neural networks for OCR and fingerprint authentication via web authentication standards. It analyzes the architecture and implementation steps for OCR detection and fingerprint verification. The document concludes the proposed system could increase security for credit card companies and help reduce online transaction fraud.
Similar to Face Recognition Based Payment Processing System (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.