This document describes a humanoid dual-arm robot system that uses visual serving (VS) control and neural network (NN) learning to transfer skills between the robot's arms. A VS control system is developed using stereo vision to obtain 3D point clouds of target objects. A least squares method is used to reduce errors during camera calibration. An NN controller is designed to handle uncertainties during tracking control. Deterministic learning is used to reuse learned knowledge without re-adapting to changes. A skill transfer mechanism transfers learned knowledge between the robot's arms to improve learning efficiency. The system was implemented on a Baxter robot and testing demonstrated the effectiveness of the VS control, NN controller, knowledge reuse and skill transfer features.
IRJET- A Review Paper on Object Detection using Zynq-7000 FPGA for an Embedde...IRJET Journal
This document reviews object detection using the Zynq-7000 FPGA for embedded applications. It discusses how the Zynq-7000 FPGA is a promising platform for embedded applications due to its dual-core ARM processor and programmable logic on a single chip. The document reviews various object detection algorithms such as R-CNN, Fast R-CNN, Faster R-CNN, and YOLO and compares their prediction times. It is proposed to implement object detection on the Zynq-7000 FPGA using algorithms like YOLO that provide fast and accurate detection in real-time.
This document discusses various soft computing techniques for iris recognition, specifically focusing on two neural network approaches: Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM). It provides an overview of iris recognition as a biometric method, summarizes preprocessing steps like localization, segmentation, and normalization of iris images. It also describes feature extraction and matching steps. Finally, it defines artificial neural networks and discusses how LVQ and ARAM can be used for pattern matching in iris recognition applications.
Using FPGA Design and HIL Algorithm Simulation to Control Visual ServoingIJAAS Team
This is a novel research paper provides an optimal solution for object tracking using visual servoing control system with programmable gate array technology to realize the visual controller. The controller takes in account the robot dynamics to generate the joint torques directly for performing the tasks related to object tracking using visual servoing. Also, the notion of dynamic perceptibility provides the capability of the designed system to track desired objects employing direct visual servoing technique. This idea is assimilated in the suggested controller and realized in the programmable gate array. Additionally, this paper grants an ideal control framework for direct visual servoing robots that incorporates dynamic perceptibility features. With the aim of evaluating the proposed FPGA based architecture, the control algorithm is applied to Hardware-in-the-loop simulation (HIL) set up of three degrees of freedom rigid robotic manipulator with three links. Furthermore, different investigations are performed to demonstrate the behavior of the proposed system when a trajectory adjacent to a singularity is attained.
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
This document presents a pupil detection technique using the center of gravity method. It first applies Gaussian filtering, double thresholding, and morphological closing to an eye image to isolate the pupil region. It then uses the center of gravity method to calculate the x and y coordinates of the pupil center by dividing the total pixel values in each dimension by the total number of black pixels. Experimental results on the CASIA iris database demonstrate the accuracy of the proposed computationally efficient pupil detection method. A hardware implementation of the technique is also presented, which could be used for real-time iris localization in biometric recognition applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document presents a project report on machine learning. It discusses several projects completed including implementing neural networks to compute averages, extracting histogram of joints features, and developing a gesture recognition system using Hidden Markov Models. The gesture recognition system uses a Kinect sensor to capture skeleton data, extracts features, builds a codebook using clustering, trains HMM models for each gesture, and achieves over 85% accuracy on a dataset of 15 gestures. Future work to improve the system is also outlined.
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
Basically, the idea behind this system is improvement in cybernetics, the biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control. The human eye is sensitive to visible light. Security systems having realized the value of biometrics for two basic purposes: to verify or identify users. In this busy world, identification should be fast and efficient. In this paper I focus on an efficient methodology for identification and verification for iris detection using Haar transform and Minimum hamming distance. I use canny operator for the edge detection. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light .I applied the Haar wavelet compressing the data. By comparing the quantized vectors using the Hamming Distance operator, we determine finally whether two irises are similar. The result shows that system is quite effective.
HUMAN BODY DETECTION AND SAFETY CARE SYSTEM FOR A FLYING ROBOTcsandit
Image-processing is one the challenging issue in robotic as well as electrical engineering
research contexts. This study proposes a system for extract and tracking objects by a
quadcopter’s flying robot and how to extract the human body. It is observed in image taken
from real-time camera that is embedded bottom of the quadcopter, there is a variance in human
behaviour being tracked or recorded such as position and, size, of the human. In the regard, the
paper tries to investigate an image-processing method for tracking humans’ body, concurrently.
For this process, an extraction method, which defines features to distinguish a human body, is
proposed. The proposed method creates a virtual shape of bodies for recognizing the body of
humans, also, generate an extractor according to its edge information. This method shows
better performance in term of precision as well as speed experimentally.
IRJET- A Review Paper on Object Detection using Zynq-7000 FPGA for an Embedde...IRJET Journal
This document reviews object detection using the Zynq-7000 FPGA for embedded applications. It discusses how the Zynq-7000 FPGA is a promising platform for embedded applications due to its dual-core ARM processor and programmable logic on a single chip. The document reviews various object detection algorithms such as R-CNN, Fast R-CNN, Faster R-CNN, and YOLO and compares their prediction times. It is proposed to implement object detection on the Zynq-7000 FPGA using algorithms like YOLO that provide fast and accurate detection in real-time.
This document discusses various soft computing techniques for iris recognition, specifically focusing on two neural network approaches: Competitive neural network Learning Vector Quantization (LVQ) and Adaptive Resonance Associative Map (ARAM). It provides an overview of iris recognition as a biometric method, summarizes preprocessing steps like localization, segmentation, and normalization of iris images. It also describes feature extraction and matching steps. Finally, it defines artificial neural networks and discusses how LVQ and ARAM can be used for pattern matching in iris recognition applications.
Using FPGA Design and HIL Algorithm Simulation to Control Visual ServoingIJAAS Team
This is a novel research paper provides an optimal solution for object tracking using visual servoing control system with programmable gate array technology to realize the visual controller. The controller takes in account the robot dynamics to generate the joint torques directly for performing the tasks related to object tracking using visual servoing. Also, the notion of dynamic perceptibility provides the capability of the designed system to track desired objects employing direct visual servoing technique. This idea is assimilated in the suggested controller and realized in the programmable gate array. Additionally, this paper grants an ideal control framework for direct visual servoing robots that incorporates dynamic perceptibility features. With the aim of evaluating the proposed FPGA based architecture, the control algorithm is applied to Hardware-in-the-loop simulation (HIL) set up of three degrees of freedom rigid robotic manipulator with three links. Furthermore, different investigations are performed to demonstrate the behavior of the proposed system when a trajectory adjacent to a singularity is attained.
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
This document presents a pupil detection technique using the center of gravity method. It first applies Gaussian filtering, double thresholding, and morphological closing to an eye image to isolate the pupil region. It then uses the center of gravity method to calculate the x and y coordinates of the pupil center by dividing the total pixel values in each dimension by the total number of black pixels. Experimental results on the CASIA iris database demonstrate the accuracy of the proposed computationally efficient pupil detection method. A hardware implementation of the technique is also presented, which could be used for real-time iris localization in biometric recognition applications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document presents a project report on machine learning. It discusses several projects completed including implementing neural networks to compute averages, extracting histogram of joints features, and developing a gesture recognition system using Hidden Markov Models. The gesture recognition system uses a Kinect sensor to capture skeleton data, extracts features, builds a codebook using clustering, trains HMM models for each gesture, and achieves over 85% accuracy on a dataset of 15 gestures. Future work to improve the system is also outlined.
Secure System based on Dynamic Features of IRIS Recognitionijsrd.com
Basically, the idea behind this system is improvement in cybernetics, the biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control. The human eye is sensitive to visible light. Security systems having realized the value of biometrics for two basic purposes: to verify or identify users. In this busy world, identification should be fast and efficient. In this paper I focus on an efficient methodology for identification and verification for iris detection using Haar transform and Minimum hamming distance. I use canny operator for the edge detection. This biological phenomenon contracts and dilates the two pupils synchronously when illuminating one of the eyes by visible light .I applied the Haar wavelet compressing the data. By comparing the quantized vectors using the Hamming Distance operator, we determine finally whether two irises are similar. The result shows that system is quite effective.
HUMAN BODY DETECTION AND SAFETY CARE SYSTEM FOR A FLYING ROBOTcsandit
Image-processing is one the challenging issue in robotic as well as electrical engineering
research contexts. This study proposes a system for extract and tracking objects by a
quadcopter’s flying robot and how to extract the human body. It is observed in image taken
from real-time camera that is embedded bottom of the quadcopter, there is a variance in human
behaviour being tracked or recorded such as position and, size, of the human. In the regard, the
paper tries to investigate an image-processing method for tracking humans’ body, concurrently.
For this process, an extraction method, which defines features to distinguish a human body, is
proposed. The proposed method creates a virtual shape of bodies for recognizing the body of
humans, also, generate an extractor according to its edge information. This method shows
better performance in term of precision as well as speed experimentally.
The document summarizes a project where an industrial robot named Baxter, made by Rethink Robotics, plays pool using its vision sensors and inverse kinematics. The key steps involved finding the desired orientation to strike the cue ball into the pocket using either a 3D sensor or Baxter's head camera, moving Baxter's arm to that orientation, then using visual servoing with Baxter's hand camera to align the end effector with the center of the ball while maintaining orientation. Once aligned, Baxter would linearly move its end effector to strike the ball. Some limitations were the workspace was limited due to Baxter's fixed position, and insufficient force was achieved on the ball. Future work proposed making Baxter mobile and using linear actuators to increase striking force
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...csandit
Wireless mobile sensor networks (WMSNs) are groups of mobile sensing agents with multimodal
sensing capabilities that communicate over wireless networks. WMSNs have more
flexibility in terms of deployment and exploration abilities over static sensor networks. Sensor
networks have a wide range of applications in security and surveillance systems, environmental
monitoring, data gathering for network-centric healthcare systems, monitoring seismic activities
and atmospheric events, tracking traffic congestion and air pollution levels, localization of
autonomous vehicles in intelligent transportation systems, and detecting failures of sensing,
storage, and switching components of smart grids.
Implementation of Object Tracking for Real Time VideoIDES Editor
Real-time tracking of object boundaries is an
important task in many vision applications. Here we propose
an approach to implement the level set method. This approach
does not need to solve any partial differential equations (PDFs),
thus reducing the computation dramatically compared with
optimized narrow band techniques proposed before. With our
approach, real-time level-set based video tracking can be
achieved.
Multimodal RGB-D+RF-based sensing for human movement analysisPetteriTeikariPhD
This document discusses various sensing modalities and technologies that could be used for human movement analysis, including RGB-D cameras, WiFi sensing using CSI, edge computing devices, synchronizing multiple sensors, and acoustic/ultrasound, mmWave, and WiFi sensing. RGB-D cameras like Intel RealSense and Kinect are commonly used options for depth sensing. WiFi signals have also been used to estimate person pose by detecting changes in carriers caused by the human body. Low-power edge devices discussed include Nvidia Jetson Nano and Google's Coral Edge TPU board. Synchronizing signals from multiple cameras requires a trigger signal. Acoustic/ultrasound, mmWave, and WiFi sensing have also been
The document describes IntelliSuite's integrated MEMS design flow, which allows users to model devices from the schematic level through physical layout and verification, as well as simulate multi-physics processes. IntelliSuite combines top-down and bottom-up design approaches for efficient and accurate modeling. Key capabilities include schematic capture, physical layout, process simulation, and system-level modeling extraction for fast behavioral simulation.
This document presents a novel iris recognition technique that uses fractional energies of transformed iris images to extract features and identify individuals. Various transforms like cosine, Walsh, Haar, Kekre, and Hartley transforms are applied to iris images to generate transformed images. Feature vectors are then extracted from the transformed images by selecting the higher energy coefficients, which represent most of the image information. Performance is evaluated using genuine acceptance rate on different percentages of higher energies, from 100% down to 96%. The technique is tested on a database of 384 iris images from 64 individuals. Results show that cosine and Walsh transforms achieve the best genuine acceptance rate of 85% when using 99% of the fractional energies. Considering fractional energies improves performance by reducing computations compared to
Real Time Object Identification for Intelligent Video Surveillance ApplicationsEditor IJCATR
Intelligent video surveillance system has emerged as a very important research topic in the computer vision field in the
recent years. It is well suited for a broad range of applications such as to monitor activities at traffic intersections for detecting
congestions and predict the traffic flow. Object classification in the field of video surveillance is a key component of smart
surveillance software. Two robust methodology and algorithms adopted for people and object classification for automated surveillance
systems is proposed in this paper. First method uses background subtraction model for detecting the object motion. The background
subtraction and image segmentation based on morphological transformation for tracking and object classification on highways is
proposed. This algorithm uses erosion followed by dilation on various frames. Proposed algorithm in first method, segments the image
by preserving important edges which improves the adaptive background mixture model and makes the system learn faster and more
accurately. The system used in second method adopts the object detection method without background subtraction because of the static
object detection. Segmentation is done by the bounding box registration technique. Then the classification is done with the multiclass
SVM using the edge histogram as features. The edge histograms are calculated for various bin values in different environment. The
result obtained demonstrates the effectiveness of the proposed approach.
Deblurring of License Plate Image using Blur Kernel EstimationIRJET Journal
The document proposes a novel method for deblurring license plate images using blur kernel estimation. Existing deblurring methods cannot handle large blurs or low resolution images. The proposed method estimates the blur kernel parameters (angle and length) that caused the blurring. It analyzes sparse representation coefficients of deblurred images to determine the kernel angle, and uses Radon transform in the Fourier domain to estimate the kernel length. This allows effective deblurring of license plates that are severely blurred and unrecognizable to humans. The method is evaluated on real images and shown to outperform state-of-the-art blind deblurring algorithms.
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...ijtsrd
Brain Computer Interface BCI aims at providing an alternate means of communication and control to people with severe cognitive or sensory motor disabilities. Brain Computer Interface in electroencephalogram EEG is of great important but it is challenging to manage the non stationary EEG. EEG signals are more vulnerable to contamination due to noise and artifacts. In our proposed work, we used Cuckoo Search Masking Empirical Mode decomposition to ignore such vulnerable things. Initially, the features of EEG signals are taken such as Energy, AR Coefficients, Morphological features and Fuzzy Approximate Entropy. Then, for Feature extraction method, Masking Empirical Mode Decomposition MEMD is applied to deal with motor imagery MI recognition tasks. The EEG signal is decomposed by MEMD and hybrid features are then extracted from the first two intrinsic mode functions IMFs . After the extracted features, Cuckoo Search algorithm is used to select the significant features. Different weights for the relevance and redundancy in the fitness function of the proposed algorithm are used to further improve their performance in terms of the number of features and the classification accuracy and finally they are fed into Linear Discriminant Analysis for classification. This analysis produces models whose accuracy is as good as more complex method. The results show that our proposed method can achieve the highest accuracy, maximal MI, recall as well as precision for Motor Imagery Recognition tasks. Our proposed method is comparable or superior than existing method. Jaipriya D ""Motor Imagery Recognition of EEG Signal using Cuckoo-Search Masking Empirical Mode Decomposition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30020.pdf
Paper Url : https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30020/motor-imagery-recognition-of-eeg-signal-using-cuckoo-search-masking-empirical-mode-decomposition/jaipriya-d
IntelliSuite is a complete design environment for MEMS that provides tools across the entire product development cycle. It includes schematic capture tool Synple, physical design tool Blueprint, process design tools CleanRoom, and multiphysics solvers FastField. IntelliSuite aims to link the entire MEMS organization through a unified platform. It offers a seamless flow from concept to tapeout through integrated tools for simulation, layout, verification, and more. IntelliSuite has established itself as the standard industry tool used by MEMS professionals worldwide.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
This document proposes a local receptive fields based extreme learning machine (ELM-LRF) for face recognition. ELM-LRF introduces local receptive fields to the input layer of an ELM for locally connected neural networks. It is tested on three face datasets: Caltech, CBCL, and UFI. ELM-LRF achieves high testing accuracies of 98.15%, 98.34%, and 66.11% respectively, outperforming other methods. The key advantages of ELM-LRF are that it reduces training time, provides fast results with no risk of getting stuck in local minima like backpropagation algorithms.
This document summarizes a research paper that proposed a non-intrusive system to detect driver drowsiness using computer vision techniques. The system uses the Viola-Jones algorithm to detect the driver's face and eyes in images. It then applies fuzzy logic and genetic algorithms to analyze features like eye state and mouth movements to determine the level of drowsiness. The study found genetic algorithms produced more accurate results compared to fuzzy logic alone at estimating drowsiness levels from the facial analysis. The system represents a non-invasive alternative to existing drowsiness detection methods.
Foreground algorithms for detection and extraction of an object in multimedia...IJECEIAES
Background Subtraction of a foreground object in multimedia is one of the major preprocessing steps involved in many vision-based applications. The main logic for detecting moving objects from the video is difference of the current frame and a reference frame which is called “background image” and this method is known as frame differencing method. Background Subtraction is widely used for real-time motion gesture recognition to be used in gesture enabled items like vehicles or automated gadgets. It is also used in content-based video coding, traffic monitoring, object tracking, digital forensics and human-computer interaction. Now-a-days due to advent in technology it is noticed that most of the conferences, meetings and interviews are done on video calls. It’s quite obvious that a conference room like atmosphere is not always readily available at any point of time. To eradicate this issue, an efficient algorithm for foreground extraction in a multimedia on video calls is very much needed. This paper is not to just build Background Subtraction application for Mobile Platform but to optimize the existing OpenCV algorithm to work on limited resources on mobile platform without reducing the performance. In this paper, comparison of various foreground detection, extraction and feature detection algorithms are done on mobile platform using OpenCV. The set of experiments were conducted to appraise the efficiency of each algorithm over the other. The overall performances of these algorithms were compared on the basis of execution time, resolution and resources required.
HARDWARE SOFTWARE CO-SIMULATION FOR TRAFFIC LOAD COMPUTATION USING MATLAB SIM...ijcsity
Due to increase in number of vehicles, Traffic is a major problem faced in urban areas throughout the
world. This document presents a newly developed Matlab Simulink model to compute traffic load for real
time traffic signal control. Signal processing, video and image processing and Xilinx Blockset have been
extensively used for traffic load computation. The approach used is Edge detection operation, wherein,
Edges are extracted to identify the number of vehicles. The developed model computes the results with
greater degrees of accuracy and is capable of being used to set the green signal duration so as to release
the traffic dynamically on traffic junctions.
Xilinx System Generator (XSG) provides Simulink Blockset for several hardware operations that could be
implemented on various Xilinx Field programmable gate arrays (FPGAs). The method described in this
paper involves object feature identification and detection. Xilinx System Generator provides some blocks to
transform data provided from the software side of the simulation environment to the hardware side. In our
case it is MATLAB Simulink to System Generator blocks. This is an important concept to understand in the
design process using Xilinx System Generator. The Xilinx System Generator, embedded in MATLAB
Simulink is used to program the model and then test on the FPGA board using the properties of hardware
co-simulation tools.
Hardware software co simulation of edge detection for image processing system...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementing Neural Networks Using VLSI for Image Processing (compression)IJERA Editor
Biological systems process the analog signals such as image and sound efficiently. To process the information the way biological systems do we make use of ANN. (Artificial Neural Networks) The focus of this paper is to review the implementation of the neural network architecture using analog components like Gilbert cell multiplier, differential amplifier for neuron activation function and tan sigmoid function circuit using MOS transistor. The neural architecture is trained using Back propagation algorithm for compressing the image. This paper surveys the methods of implementing the neural network using VLSI .Different CMOS technologies are used for implementing the circuits for arithmetic operations (i.e. 180nm, 45nm, 32nm).And the MOS transistors are working in sub threshold region. In this paper a review is made on how the VLSI architecture is used to implement neural networks and trained for compressing the image.
Real Human Face Detection for Surveillance System Using Heterogeneous Sensors csandit
This document describes a new method for real-time human face detection using heterogeneous sensors. The method uses classifiers trained on data from both image and other sensors to detect faces. It aims to improve accuracy while reducing processing time by using a minimum number of cascading classifiers. Sensors are synchronized so data from different sources can be processed simultaneously. Experimental results show the new approach enhances accuracy in detecting real humans over methods using only image data. It also improves speed by reducing the number of classifiers needed.
There has been over the past few years, a very increased popularity for yoga. A lot of literatures have been published that claim yoga to be beneficial in improving the overall lifestyle and health especially in rehabilitation, mental health and more. Considering the fast-paced lives that individuals live, people usually prefer to exercise or work-out from the comfort of their homes and with that a need for an instructor arises. Hence why, we have developed a self-assisted system which can be used to detect and classify yoga asanas, which is discussed in-depth in this paper. Especially now when the pandemic has taken over the world, it is not feasible to attend physical classes or have an instructor over. Using the technology of Computer Vision, a computer-assisted system such as the one discussed, comes in very handy. The technologies such as ml5.js, PoseNet and Neural Networks are made use for the human pose estimation and classification. The proposed system uses the above-mentioned technologies to take in a real-time video input and analyze the pose of an individual, and classifies the poses into yoga asanas. It also displays the name of the yoga asana that is detected along with the confidence score.
The Machine Vision and Perception Group at the Technical University of Munich conducts research on visual perception and its application to medical, mobile, and human-computer interaction systems. This includes areas like registration of rigid and deformable objects, monocular reconstruction, visual localization and mapping, and biologically inspired navigation and action analysis. The group develops algorithms for tasks like 3D object recognition in point clouds that are robust to incomplete and noisy data.
1) The document describes a wireless mobile robot designed for military applications that uses sensors to interact with the physical world and navigate under the control of a base station.
2) The robot is designed to complete all tasks like detecting obstacles, border security, recording audio/video, and firing within critical time limits for safety.
3) The robot's functions are managed by the real-time operating system Salvo on an 8051 microcontroller to ensure tasks meet deadlines even when resources are fully utilized.
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
This document describes a proposed surveillance system using a block matching algorithm for motion detection. The system would use IP cameras to stream video that is monitored for unauthorized activity. Motion detection is performed by comparing frames using the block matching algorithm to detect changes in pixel intensity values, which would trigger an alarm. The block matching algorithm divides frames into blocks of pixels and validates the maximum and minimum intensity of each pixel. Comparing blocks between frames identifies motion if intensity values change beyond a threshold. If motion is detected in a designated sensitive area, the system saves the video and sends alerts by email and mobile notification to users.
The document summarizes a project where an industrial robot named Baxter, made by Rethink Robotics, plays pool using its vision sensors and inverse kinematics. The key steps involved finding the desired orientation to strike the cue ball into the pocket using either a 3D sensor or Baxter's head camera, moving Baxter's arm to that orientation, then using visual servoing with Baxter's hand camera to align the end effector with the center of the ball while maintaining orientation. Once aligned, Baxter would linearly move its end effector to strike the ball. Some limitations were the workspace was limited due to Baxter's fixed position, and insufficient force was achieved on the ball. Future work proposed making Baxter mobile and using linear actuators to increase striking force
A CUSTOMIZED FLOCKING ALGORITHM FOR SWARMS OF SENSORS TRACKING A SWARM OF TAR...csandit
Wireless mobile sensor networks (WMSNs) are groups of mobile sensing agents with multimodal
sensing capabilities that communicate over wireless networks. WMSNs have more
flexibility in terms of deployment and exploration abilities over static sensor networks. Sensor
networks have a wide range of applications in security and surveillance systems, environmental
monitoring, data gathering for network-centric healthcare systems, monitoring seismic activities
and atmospheric events, tracking traffic congestion and air pollution levels, localization of
autonomous vehicles in intelligent transportation systems, and detecting failures of sensing,
storage, and switching components of smart grids.
Implementation of Object Tracking for Real Time VideoIDES Editor
Real-time tracking of object boundaries is an
important task in many vision applications. Here we propose
an approach to implement the level set method. This approach
does not need to solve any partial differential equations (PDFs),
thus reducing the computation dramatically compared with
optimized narrow band techniques proposed before. With our
approach, real-time level-set based video tracking can be
achieved.
Multimodal RGB-D+RF-based sensing for human movement analysisPetteriTeikariPhD
This document discusses various sensing modalities and technologies that could be used for human movement analysis, including RGB-D cameras, WiFi sensing using CSI, edge computing devices, synchronizing multiple sensors, and acoustic/ultrasound, mmWave, and WiFi sensing. RGB-D cameras like Intel RealSense and Kinect are commonly used options for depth sensing. WiFi signals have also been used to estimate person pose by detecting changes in carriers caused by the human body. Low-power edge devices discussed include Nvidia Jetson Nano and Google's Coral Edge TPU board. Synchronizing signals from multiple cameras requires a trigger signal. Acoustic/ultrasound, mmWave, and WiFi sensing have also been
The document describes IntelliSuite's integrated MEMS design flow, which allows users to model devices from the schematic level through physical layout and verification, as well as simulate multi-physics processes. IntelliSuite combines top-down and bottom-up design approaches for efficient and accurate modeling. Key capabilities include schematic capture, physical layout, process simulation, and system-level modeling extraction for fast behavioral simulation.
This document presents a novel iris recognition technique that uses fractional energies of transformed iris images to extract features and identify individuals. Various transforms like cosine, Walsh, Haar, Kekre, and Hartley transforms are applied to iris images to generate transformed images. Feature vectors are then extracted from the transformed images by selecting the higher energy coefficients, which represent most of the image information. Performance is evaluated using genuine acceptance rate on different percentages of higher energies, from 100% down to 96%. The technique is tested on a database of 384 iris images from 64 individuals. Results show that cosine and Walsh transforms achieve the best genuine acceptance rate of 85% when using 99% of the fractional energies. Considering fractional energies improves performance by reducing computations compared to
Real Time Object Identification for Intelligent Video Surveillance ApplicationsEditor IJCATR
Intelligent video surveillance system has emerged as a very important research topic in the computer vision field in the
recent years. It is well suited for a broad range of applications such as to monitor activities at traffic intersections for detecting
congestions and predict the traffic flow. Object classification in the field of video surveillance is a key component of smart
surveillance software. Two robust methodology and algorithms adopted for people and object classification for automated surveillance
systems is proposed in this paper. First method uses background subtraction model for detecting the object motion. The background
subtraction and image segmentation based on morphological transformation for tracking and object classification on highways is
proposed. This algorithm uses erosion followed by dilation on various frames. Proposed algorithm in first method, segments the image
by preserving important edges which improves the adaptive background mixture model and makes the system learn faster and more
accurately. The system used in second method adopts the object detection method without background subtraction because of the static
object detection. Segmentation is done by the bounding box registration technique. Then the classification is done with the multiclass
SVM using the edge histogram as features. The edge histograms are calculated for various bin values in different environment. The
result obtained demonstrates the effectiveness of the proposed approach.
Deblurring of License Plate Image using Blur Kernel EstimationIRJET Journal
The document proposes a novel method for deblurring license plate images using blur kernel estimation. Existing deblurring methods cannot handle large blurs or low resolution images. The proposed method estimates the blur kernel parameters (angle and length) that caused the blurring. It analyzes sparse representation coefficients of deblurred images to determine the kernel angle, and uses Radon transform in the Fourier domain to estimate the kernel length. This allows effective deblurring of license plates that are severely blurred and unrecognizable to humans. The method is evaluated on real images and shown to outperform state-of-the-art blind deblurring algorithms.
Motor Imagery Recognition of EEG Signal using Cuckoo Search Masking Empirical...ijtsrd
Brain Computer Interface BCI aims at providing an alternate means of communication and control to people with severe cognitive or sensory motor disabilities. Brain Computer Interface in electroencephalogram EEG is of great important but it is challenging to manage the non stationary EEG. EEG signals are more vulnerable to contamination due to noise and artifacts. In our proposed work, we used Cuckoo Search Masking Empirical Mode decomposition to ignore such vulnerable things. Initially, the features of EEG signals are taken such as Energy, AR Coefficients, Morphological features and Fuzzy Approximate Entropy. Then, for Feature extraction method, Masking Empirical Mode Decomposition MEMD is applied to deal with motor imagery MI recognition tasks. The EEG signal is decomposed by MEMD and hybrid features are then extracted from the first two intrinsic mode functions IMFs . After the extracted features, Cuckoo Search algorithm is used to select the significant features. Different weights for the relevance and redundancy in the fitness function of the proposed algorithm are used to further improve their performance in terms of the number of features and the classification accuracy and finally they are fed into Linear Discriminant Analysis for classification. This analysis produces models whose accuracy is as good as more complex method. The results show that our proposed method can achieve the highest accuracy, maximal MI, recall as well as precision for Motor Imagery Recognition tasks. Our proposed method is comparable or superior than existing method. Jaipriya D ""Motor Imagery Recognition of EEG Signal using Cuckoo-Search Masking Empirical Mode Decomposition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30020.pdf
Paper Url : https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30020/motor-imagery-recognition-of-eeg-signal-using-cuckoo-search-masking-empirical-mode-decomposition/jaipriya-d
IntelliSuite is a complete design environment for MEMS that provides tools across the entire product development cycle. It includes schematic capture tool Synple, physical design tool Blueprint, process design tools CleanRoom, and multiphysics solvers FastField. IntelliSuite aims to link the entire MEMS organization through a unified platform. It offers a seamless flow from concept to tapeout through integrated tools for simulation, layout, verification, and more. IntelliSuite has established itself as the standard industry tool used by MEMS professionals worldwide.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
This document proposes a local receptive fields based extreme learning machine (ELM-LRF) for face recognition. ELM-LRF introduces local receptive fields to the input layer of an ELM for locally connected neural networks. It is tested on three face datasets: Caltech, CBCL, and UFI. ELM-LRF achieves high testing accuracies of 98.15%, 98.34%, and 66.11% respectively, outperforming other methods. The key advantages of ELM-LRF are that it reduces training time, provides fast results with no risk of getting stuck in local minima like backpropagation algorithms.
This document summarizes a research paper that proposed a non-intrusive system to detect driver drowsiness using computer vision techniques. The system uses the Viola-Jones algorithm to detect the driver's face and eyes in images. It then applies fuzzy logic and genetic algorithms to analyze features like eye state and mouth movements to determine the level of drowsiness. The study found genetic algorithms produced more accurate results compared to fuzzy logic alone at estimating drowsiness levels from the facial analysis. The system represents a non-invasive alternative to existing drowsiness detection methods.
Foreground algorithms for detection and extraction of an object in multimedia...IJECEIAES
Background Subtraction of a foreground object in multimedia is one of the major preprocessing steps involved in many vision-based applications. The main logic for detecting moving objects from the video is difference of the current frame and a reference frame which is called “background image” and this method is known as frame differencing method. Background Subtraction is widely used for real-time motion gesture recognition to be used in gesture enabled items like vehicles or automated gadgets. It is also used in content-based video coding, traffic monitoring, object tracking, digital forensics and human-computer interaction. Now-a-days due to advent in technology it is noticed that most of the conferences, meetings and interviews are done on video calls. It’s quite obvious that a conference room like atmosphere is not always readily available at any point of time. To eradicate this issue, an efficient algorithm for foreground extraction in a multimedia on video calls is very much needed. This paper is not to just build Background Subtraction application for Mobile Platform but to optimize the existing OpenCV algorithm to work on limited resources on mobile platform without reducing the performance. In this paper, comparison of various foreground detection, extraction and feature detection algorithms are done on mobile platform using OpenCV. The set of experiments were conducted to appraise the efficiency of each algorithm over the other. The overall performances of these algorithms were compared on the basis of execution time, resolution and resources required.
HARDWARE SOFTWARE CO-SIMULATION FOR TRAFFIC LOAD COMPUTATION USING MATLAB SIM...ijcsity
Due to increase in number of vehicles, Traffic is a major problem faced in urban areas throughout the
world. This document presents a newly developed Matlab Simulink model to compute traffic load for real
time traffic signal control. Signal processing, video and image processing and Xilinx Blockset have been
extensively used for traffic load computation. The approach used is Edge detection operation, wherein,
Edges are extracted to identify the number of vehicles. The developed model computes the results with
greater degrees of accuracy and is capable of being used to set the green signal duration so as to release
the traffic dynamically on traffic junctions.
Xilinx System Generator (XSG) provides Simulink Blockset for several hardware operations that could be
implemented on various Xilinx Field programmable gate arrays (FPGAs). The method described in this
paper involves object feature identification and detection. Xilinx System Generator provides some blocks to
transform data provided from the software side of the simulation environment to the hardware side. In our
case it is MATLAB Simulink to System Generator blocks. This is an important concept to understand in the
design process using Xilinx System Generator. The Xilinx System Generator, embedded in MATLAB
Simulink is used to program the model and then test on the FPGA board using the properties of hardware
co-simulation tools.
Hardware software co simulation of edge detection for image processing system...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementing Neural Networks Using VLSI for Image Processing (compression)IJERA Editor
Biological systems process the analog signals such as image and sound efficiently. To process the information the way biological systems do we make use of ANN. (Artificial Neural Networks) The focus of this paper is to review the implementation of the neural network architecture using analog components like Gilbert cell multiplier, differential amplifier for neuron activation function and tan sigmoid function circuit using MOS transistor. The neural architecture is trained using Back propagation algorithm for compressing the image. This paper surveys the methods of implementing the neural network using VLSI .Different CMOS technologies are used for implementing the circuits for arithmetic operations (i.e. 180nm, 45nm, 32nm).And the MOS transistors are working in sub threshold region. In this paper a review is made on how the VLSI architecture is used to implement neural networks and trained for compressing the image.
Real Human Face Detection for Surveillance System Using Heterogeneous Sensors csandit
This document describes a new method for real-time human face detection using heterogeneous sensors. The method uses classifiers trained on data from both image and other sensors to detect faces. It aims to improve accuracy while reducing processing time by using a minimum number of cascading classifiers. Sensors are synchronized so data from different sources can be processed simultaneously. Experimental results show the new approach enhances accuracy in detecting real humans over methods using only image data. It also improves speed by reducing the number of classifiers needed.
There has been over the past few years, a very increased popularity for yoga. A lot of literatures have been published that claim yoga to be beneficial in improving the overall lifestyle and health especially in rehabilitation, mental health and more. Considering the fast-paced lives that individuals live, people usually prefer to exercise or work-out from the comfort of their homes and with that a need for an instructor arises. Hence why, we have developed a self-assisted system which can be used to detect and classify yoga asanas, which is discussed in-depth in this paper. Especially now when the pandemic has taken over the world, it is not feasible to attend physical classes or have an instructor over. Using the technology of Computer Vision, a computer-assisted system such as the one discussed, comes in very handy. The technologies such as ml5.js, PoseNet and Neural Networks are made use for the human pose estimation and classification. The proposed system uses the above-mentioned technologies to take in a real-time video input and analyze the pose of an individual, and classifies the poses into yoga asanas. It also displays the name of the yoga asana that is detected along with the confidence score.
The Machine Vision and Perception Group at the Technical University of Munich conducts research on visual perception and its application to medical, mobile, and human-computer interaction systems. This includes areas like registration of rigid and deformable objects, monocular reconstruction, visual localization and mapping, and biologically inspired navigation and action analysis. The group develops algorithms for tasks like 3D object recognition in point clouds that are robust to incomplete and noisy data.
1) The document describes a wireless mobile robot designed for military applications that uses sensors to interact with the physical world and navigate under the control of a base station.
2) The robot is designed to complete all tasks like detecting obstacles, border security, recording audio/video, and firing within critical time limits for safety.
3) The robot's functions are managed by the real-time operating system Salvo on an 8051 microcontroller to ensure tasks meet deadlines even when resources are fully utilized.
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
This document describes a proposed surveillance system using a block matching algorithm for motion detection. The system would use IP cameras to stream video that is monitored for unauthorized activity. Motion detection is performed by comparing frames using the block matching algorithm to detect changes in pixel intensity values, which would trigger an alarm. The block matching algorithm divides frames into blocks of pixels and validates the maximum and minimum intensity of each pixel. Comparing blocks between frames identifies motion if intensity values change beyond a threshold. If motion is detected in a designated sensitive area, the system saves the video and sends alerts by email and mobile notification to users.
IRJET- Survey on EEG Based Brainwave Controlled Home AutomationIRJET Journal
This document summarizes research on using electroencephalography (EEG) brainwave signals to control home automation devices. It discusses several previous studies that used EEG signals to control robots, anticipate finger movements, control environmental devices for paralyzed patients, and classify gestures for home automation. The document then outlines a study that analyzed brainwave signals to detect patterns related to thoughts and emotions. These signals were sensed by a brainwave sensor, transmitted via Bluetooth, processed using Matlab, and used to send commands to control home devices. The goal was to develop a brain-computer interface for controlling home automation systems using EEG brainwave signals.
Efficient and secure real-time mobile robots cooperation using visual servoing IJECEIAES
This paper deals with the challenging problem of navigation in formation of mobiles robots fleet. For that purpose, a secure approach is used based on visual servoing to control velocities (linear and angular) of the multiple robots. To construct our system, we develop the interaction matrix which combines the moments in the image with robots velocities and we estimate the depth between each robot and the targeted object. This is done without any communication between the robots which eliminate the problem of the influence of each robot errors on the whole. For a successful visual servoing, we propose a powerful mechanism to execute safely the robots navigation, exploiting a robot accident reporting system using raspberry Pi3. This reporting system testbed is used to send an accident notification, in the form of a specifical message. Experimental results are presented using nonholonomic mobiles robots with on-board real time cameras, to show the effectiveness of the proposed method.
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
The document discusses a technique for detecting human motion in video surveillance using computer vision. It proposes a method called DECOLOR (Detecting Contiguous Outliers in the LOw-rank Representation) that formulates object detection as outlier detection in a low-rank representation of video frames. This allows it to detect moving objects flexibly without assumptions about foreground or background behavior. DECOLOR simultaneously performs object detection and background estimation using only the test video sequence, without requiring training data. The method models the outlier support explicitly and favors spatially contiguous outliers, making it suitable for detecting clustered foreground objects like people. It achieves more accurate detection and background estimation than state-of-the-art robust principal component analysis methods.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Robots are expected to be new tools for the operations and observations in the extreme environments where humans have difficulties in direct access. One of the important matters to realize mobile robots for extreme environments is to establish systems in their structures which are strong enough to disturbances. Also, while considering surveillance in inaccessible remote areas, a need arises for the presence of a robot capable of intruding into small crevices as well as provides proper surveillance. This work aims at the implementation of a snake robot for surveillance operations in remote areas. A biologically inspired robot with various motion patterns is taken into consideration. An important problem in the control of locomotion of robots with multiple degrees of freedom is in adapting the locomotors patterns to the properties of the environment. This has been overcome by using control techniques capable of integrating the motion patterns of a snake. Here an attempt is taken to focus on the creeping locomotion of a living snake. In hybrid model, the optimal locomotion of the snake robot is tried to achieve by comparing it with that of a living snake. A wireless real time vision processing is also employed within the robot to improve its performance. The presence of Video acquisition along with processing will be an added advantage for implementation of the robot for highly precise and difficult surveillance applications. Real time processing of video enables proper and efficient control towards obstacle avoidance pattern of the robot. This ensures that the locomotion of the robot is in a bio-inspired highly efficient path towards the target. Keywords: Collision-free behavior, neural oscillator, snake locomotion, steering, real time vision processing
Design and Implementation of a Self-Balancing Two-Wheeled Robot Driven by a F...IRJET Journal
This document describes the design and implementation of a self-balancing two-wheeled robot controlled by a feed-forward backpropagation neural network. The robot uses an Arduino, gyroscope, accelerometer, and two DC motors. Two control approaches are tested: a PID controller and a feed-forward neural network trained using backpropagation. Testing found the neural network approach learned to balance with fewer oscillations and was more elegant than the PID controller. The neural network demonstrated the effectiveness of artificial intelligence for complex learning tasks.
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
This document contains details of 15 embedded system projects from 2015. It includes the project codes, topics, and abstracts. The projects cover areas like multi-robot control, fuzzy control of hexapod robots, dual-arm tele-robotic systems, health monitoring using home sensors, automotive security, visual servo control, wearable hand robots, on-chip communication, real-time scheduling, and approximate computing using partially-forgetful memories.
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
DYNAMIC ENERGY MANAGEMENT USING REAL TIME OBJECT DETECTIONIRJET Journal
This document discusses a system for dynamic energy management using real-time object detection. The system divides an area into four sectors and uses the YOLO CV2 algorithm to detect humans in each sector using a Raspberry Pi 4 and webcam. When a human is detected in a particular sector, only the electrical devices in that sector are turned on, minimizing energy usage. The methodology first uses YOLO CV2 for human detection, then implements sector-based electrical control using a Raspberry Pi 4 and hardware components. Dividing the area into sectors allows more granular energy savings compared to controlling an entire area or individual devices.
Mathematical modeling and kinematic analysis of 5 degrees of freedom serial l...IJECEIAES
Modeling and kinematic analysis are crucial jobs in robotics that entail identifying the position of the robot’s joints in order to accomplish particular tasks. This article uses an algebraic approach to model the kinematics of a serial link, 5 degrees of freedom (DOF) manipulator. The analytical method is compared to an optimization strategy known as sequential least squares programming (SLSQP). Using an Intel RealSense 3D camera, the colored object is picked up and placed using vision-based technology, and the pixel location of the object is translated into robot coordinates. The LOBOT LX15D serial bus servo controller was used to transmit these coordinates to the robotic arm. Python3 programming language was used throughout the entire analysis. The findings demonstrated that both analytical and optimized inverse kinematic solutions correctly identified colored objects and positioned them in their appropriate goal points.
Gesture Recognition System using Computer VisionIRJET Journal
This document presents a gesture recognition system using computer vision and convolutional neural networks. It discusses developing classifiers to recognize hand gestures and facial expressions. A dataset of 87,000 images is used to train models to classify 26 letters of the American Sign Language alphabet, as well as additional classes for space, delete and nothing. The models are trained using transfer learning with MobileNet, achieving validation accuracies of over 90% for hand gesture classification and implementing a system that recognizes and translates gestures in real-time. It concludes the paper developed robust models for American Sign Language translation and facial expression recognition using CNNs.
IRJET - Gesture Controlled Home Automation using CNNIRJET Journal
This document describes a gesture controlled home automation system using a convolutional neural network (CNN). The system uses an Android application to capture gestures from the user via the smartphone camera. These images are sent to a Raspberry Pi which classifies the gestures using a CNN model trained on image data. Based on the predicted gesture class, the Raspberry Pi controls connected home appliances such as lights and fans. The system aims to provide a portable and flexible way for users, especially those with disabilities, to remotely control appliances through simple gestures without additional hardware.
Balancing a Segway robot using LQR controller based on genetic and bacteria f...TELKOMNIKA JOURNAL
A two-wheeled single seat Segway robot is a special kind of wheeled mobile robot, using it as a human transporter system needs applying a robust control system to overcome its inherent unstable problem. The mathematical model of the system dynamics is derived and then state space formulation for the system is presented to enable design state feedback controller scheme. In this research, an optimal control system based on linear quadratic regulator (LQR) technique is proposed to stabilize the mobile robot. The LQR controller is designed to control the position and yaw rotation of the two-wheeled vehicle. The proposed balancing robot system is validated by simulating the LQR using Matlab software. Two tuning methods, genetic algorithm (GA) and bacteria foraging optimization algorithm (BFOA) are used to obtain optimal values for controller parameters. A comparison between the performance of both controllers GA-LQR and BFO-LQR is achieved based on the standard control criteria which includes rise time, maximum overshoot, settling time and control input of the system. Simulation results suggest that the BFOA-LQR controller can be adopted to balance the Segway robot with minimal overshoot and oscillation frequency.
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...IRJET Journal
This document reviews improving traffic sign detection using the YOLO algorithm for object detection. It begins by discussing previous work on traffic sign detection and recognition that used techniques like mobile LiDAR, sparse R-CNN neural networks, and improvements to YOLOv4-Tiny. It then examines the YOLO algorithm and how it uses convolutional neural networks for real-time object detection with a single propagation through the network. The document proposes using an improved YOLO algorithm for traffic sign detection to address limitations in existing techniques. It discusses the methodology of object detection, recognition and localization using neural networks and how YOLO has been applied for applications like traffic sign detection.
IRJET- Design and Fabrication of PLC and SCADA based Robotic Arm for Material...IRJET Journal
This document describes the design and fabrication of a PLC and SCADA-controlled robotic arm for material handling. The robotic arm uses pneumatic cylinders connected by joints to move along three axes (X, Y, and Z). A mechanical gripper is attached to the end of the arm to grip objects on a conveyor belt. The movements of the pneumatic cylinders and gripper are controlled by a PLC based on sensor inputs from the conveyor belt. The PLC and robotic arm are integrated with a SCADA system for centralized control and monitoring. The robotic arm is intended to automate repetitive picking and placing tasks to reduce labor costs compared to manual operations.
Obstacle detection for autonomous systems using stereoscopic images and bacte...IJECEIAES
This paper presents a low cost strategy for real-time estimation of the position of ob- stacles in an unknown environment for autonomous robots. The strategy was intended for use in autonomous service robots, which navigate in unknown and dynamic indoor environments. In addition to human interaction, these environments are characterized by a design created for the human being, which is why our developments seek morphological and functional similarity equivalent to the human model. We use a pair of cameras on our robot to achieve a stereoscopic vision of the environment, and we analyze this information to determine the distance to obstacles using an algorithm that mimics bacterial behavior. The algorithm was evaluated on our robotic platform demonstrating high performance in the location of obstacles and real-time operation.
Similar to Humanoid Dual Arm Robot with Neural Learning of Skill Transferring Control (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.