This document discusses multi-object tracking methods based on particle filtering and hidden Markov models. It provides an overview of particle filtering and how it can be used for object tracking by approximating the posterior distribution of objects in video frames. It also discusses how hidden Markov models can be used for prediction and tracking objects at the global layer. Specifically, it describes a multi-object tracking method that uses a coupled layer approach with a local layer tracked using particle filtering and a global layer tracked using a hidden Markov model. This improves tracking efficiency and reduces computational time compared to other recent multi-object trackers.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...ijsrd.com
Moving Object Databases (MOD), although ubiquitous, still call for methods that will be able to understand, search, analyze, and browse their spatiotemporal content. In this paper, we propose a method for trajectory segmentation and sampling based on the representativeness of the (sub) trajectories in the MOD. In order to find the most representative sub trajectories, the following methodology is proposed. First, a novel global voting algorithm is performed, based on local density and trajectory similarity information. This method is applied for each segment of the trajectory, forming a local trajectory descriptor that represents line segment representativeness. The sequence of this descriptor over a trajectory gives the voting signal of the trajectory, where high values correspond to the most representative parts. Then, a novel segmentation algorithm is applied on this signal that automatically estimates the number of partitions and the partition borders, identifying homogenous partitions concerning their representativeness. Finally, a sampling method over the resulting segments yields the most representative sub trajectories in the MOD. Our experimental results in synthetic and real MOD verify the effectiveness of the proposed scheme, also in comparison with other sampling techniques.
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Vehicle detection using background subtraction and clustering algorithmsTELKOMNIKA JOURNAL
Traffic congestion has raised worldwide as a result of growing motorization, urbanization, and population. In fact, congestion reduces the efficiency of transportation infrastructure usage and increases travel time, air pollutions as well as fuel consumption. Then, Intelligent Transportation System (ITS) comes as a solution of this problem by implementing information technology and communications networks. One classical option of Intelligent Transportation Systems is video camera technology. Particularly, the video system has been applied to collect traffic data including vehicle detection and analysis. However, this application still has limitation when it has to deal with a complex traffic and environmental condition. Thus, the research proposes OTSU, FCM and K-means methods and their comparison in video image processing. OTSU is a classical algorithm used in image segmentation, which is able to cluster pixels into foreground and background. However, only FCM (Fuzzy C-Means) and K-means algorithms have been successfully applied to cluster pixels without supervision. Therefore, these methods seem to be more potential to generate the MSE values for defining a clearer threshold for background subtraction on a moving object with varying environmental conditions. Comparison of these methods is assessed from MSE and PSNR values. The best MSE result is demonstrated from K-means and a good PSNR is obtained from FCM. Thus, the application of the clustering algorithms in detection of moving objects in various condition is more promising.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
An Effective Implementation of Configurable Motion Estimation Architecture fo...ijsrd.com
This project introduces configurable motion estimation architecture for a wide range of fast block-matching algorithms (BMAs). Contemporary motion estimation architectures are either too rigid for multiple BMAs or the flexibility in them is implemented at the cost of reduced performance. .In block-based motion estimation, a block-matching algorithm (BMA) searches the best matching block for the current macro block from the reference frame. During the searching procedure, the checking point yielding the minimum block distortion (MBD) determines the displacement of the best matching block.
Web spam classification using supervised artificial neural network algorithmsaciijournal
Due to the rapid growth in technology employed by the spammers, there is a need of classifiers that are more efficient, generic and highly adaptive. Neural Network based technologies have high ability of adaption as well as generalization. As per our knowledge, very little work has been done in this field using neural network. We present this paper to fill this gap. This paper evaluates performance of three supervised learning algorithms of artificial neural network by creating classifiers for the complex problem of latest web spam pattern classification. These algorithms are Conjugate Gradient algorithm, Resilient Backpropagation learning, and Levenberg-Marquardt algorithm.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Trajectory Segmentation and Sampling of Moving Objects Based On Representativ...ijsrd.com
Moving Object Databases (MOD), although ubiquitous, still call for methods that will be able to understand, search, analyze, and browse their spatiotemporal content. In this paper, we propose a method for trajectory segmentation and sampling based on the representativeness of the (sub) trajectories in the MOD. In order to find the most representative sub trajectories, the following methodology is proposed. First, a novel global voting algorithm is performed, based on local density and trajectory similarity information. This method is applied for each segment of the trajectory, forming a local trajectory descriptor that represents line segment representativeness. The sequence of this descriptor over a trajectory gives the voting signal of the trajectory, where high values correspond to the most representative parts. Then, a novel segmentation algorithm is applied on this signal that automatically estimates the number of partitions and the partition borders, identifying homogenous partitions concerning their representativeness. Finally, a sampling method over the resulting segments yields the most representative sub trajectories in the MOD. Our experimental results in synthetic and real MOD verify the effectiveness of the proposed scheme, also in comparison with other sampling techniques.
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Vehicle detection using background subtraction and clustering algorithmsTELKOMNIKA JOURNAL
Traffic congestion has raised worldwide as a result of growing motorization, urbanization, and population. In fact, congestion reduces the efficiency of transportation infrastructure usage and increases travel time, air pollutions as well as fuel consumption. Then, Intelligent Transportation System (ITS) comes as a solution of this problem by implementing information technology and communications networks. One classical option of Intelligent Transportation Systems is video camera technology. Particularly, the video system has been applied to collect traffic data including vehicle detection and analysis. However, this application still has limitation when it has to deal with a complex traffic and environmental condition. Thus, the research proposes OTSU, FCM and K-means methods and their comparison in video image processing. OTSU is a classical algorithm used in image segmentation, which is able to cluster pixels into foreground and background. However, only FCM (Fuzzy C-Means) and K-means algorithms have been successfully applied to cluster pixels without supervision. Therefore, these methods seem to be more potential to generate the MSE values for defining a clearer threshold for background subtraction on a moving object with varying environmental conditions. Comparison of these methods is assessed from MSE and PSNR values. The best MSE result is demonstrated from K-means and a good PSNR is obtained from FCM. Thus, the application of the clustering algorithms in detection of moving objects in various condition is more promising.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
An Effective Implementation of Configurable Motion Estimation Architecture fo...ijsrd.com
This project introduces configurable motion estimation architecture for a wide range of fast block-matching algorithms (BMAs). Contemporary motion estimation architectures are either too rigid for multiple BMAs or the flexibility in them is implemented at the cost of reduced performance. .In block-based motion estimation, a block-matching algorithm (BMA) searches the best matching block for the current macro block from the reference frame. During the searching procedure, the checking point yielding the minimum block distortion (MBD) determines the displacement of the best matching block.
Web spam classification using supervised artificial neural network algorithmsaciijournal
Due to the rapid growth in technology employed by the spammers, there is a need of classifiers that are more efficient, generic and highly adaptive. Neural Network based technologies have high ability of adaption as well as generalization. As per our knowledge, very little work has been done in this field using neural network. We present this paper to fill this gap. This paper evaluates performance of three supervised learning algorithms of artificial neural network by creating classifiers for the complex problem of latest web spam pattern classification. These algorithms are Conjugate Gradient algorithm, Resilient Backpropagation learning, and Levenberg-Marquardt algorithm.
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
Image segmentation is the first step in image analysis and pattern recognition. Image segmentation is the process of dividing an image into different regions such that each region is homogeneous. The accurate and effective algorithm for segmenting image is very useful in many fields, especially in medical image. This paper presents a new approach for image segmentation by applying k-means algorithm with two level variable weighting. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means and Fuzzy k-means clustering algorithm is one of the most widely used algorithms in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means and Fuzzy k-Means. This paper proposes a new clustering algorithm called TW-fuzzy k-means, an automated two-level variable weighting clustering algorithm for segmenting object. In this algorithm, a variable weight is also assigned to each variable on the current partition of data. This could be applied on general images and/or specific images (i.e., medical and microscopic images). The proposed TW-Fuzzy k-means algorithm in terms of providing a better segmentation performance for various type of images. Based on the results obtained, the proposed algorithm gives better visual quality as compared to several other clustering methods.
Object extraction using edge, motion and saliency information from videoseSAT Journals
Abstract Object detection is a process of finding the instances of object of a certain class which is useful in analysis of video or image. There are number of algorithms have been developed so far for object detection. Object detection has got significant role in variety of areas of computer vision like video surveillance, image retrieval`. In this paper presented an efficient algorithm for moving object extraction using edge, motion and saliency information from videos. Out methodology includes 4 stages: Frame generation, Pre-processing, Foreground generation and integration of cues. Foreground generation includes edge detection using sobel edge detection algorithm, motion detection using pixel-based absolute difference algorithm and motion saliency detection. Conditional Random Field (CRF) is applied for integration of cues and thus we get better spatial information of segmented object. Keywords: Object detection, Saliency information, Sobel edge detection, CRF.
In recent machine learning community, there is a trend of constructing a linear logarithm version of
nonlinear version through the ‘kernel method’ for example kernel principal component analysis, kernel
fisher discriminant analysis, support Vector Machines (SVMs), and the current kernel clustering
algorithms. Typically, in unsupervised methods of clustering algorithms utilizing kernel method, a
nonlinear mapping is operated initially in order to map the data into a much higher space feature, and then
clustering is executed. A hitch of these kernel clustering algorithms is that the clustering prototype resides
in increased features specs of dimensions and therefore lack intuitive and clear descriptions without
utilizing added approximation of projection from the specs to the data as executed in the literature
presented. This paper aims to utilize the ‘kernel method’, a novel clustering algorithm, founded on the
conventional fuzzy clustering algorithm (FCM) is anticipated and known as kernel fuzzy c-means algorithm
(KFCM). This method embraces a novel kernel-induced metric in the space of data in order to interchange
the novel Euclidean matric norm in cluster prototype and fuzzy clustering algorithm still reside in the space
of data so that the results of clustering could be interpreted and reformulated in the spaces which are
original. This property is used for clustering incomplete data. Execution on supposed data illustrate that
KFCM has improved performance of clustering and stout as compare to other transformations of FCM for
clustering incomplete data.
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.
An enhanced fireworks algorithm to generate prime key for multiple users in f...journalBEEI
This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps. It is used processing the digital image. Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of fireworks and camel herd algorithms (HFCA), where Fireworks are based on 3-dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so quick response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Fast Full Search for Block Matching Algorithmsijsrd.com
This project introduces configurable motion estimation architecture for a wide range of fast block-matching algorithms (BMAs). Contemporary motion estimation architectures are either too rigid for multiple BMAs or the flexibility in them is implemented at the cost of reduced performance. In block-based motion estimation, a block-matching algorithm (BMA) searches for the best matching block for the current macro block from the reference frame. During the searching procedure, the checking point yielding the minimum block distortion (MBD) determines the displacement of the best matching block.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...ijsrd.com
Multi-Target Tracking for Sensor Networks using Ant Colony Optimization is proposed in this paper. The proposed approach uses ant colony optimization technique that composed of both dynamic and mobile nodes. While mobile nodes are used for optimizing the target tracking, dynamic nodes ensure the total coverage of the network. As a result, the performance of the Wireless Sensor Networks with multi-target tracking on mobility nodes will improve. While improving the performance of the wireless sensor networks, automatically minimum distance will be travelled by the nodes, thereby decreasing the energy consumption of the mobility nodes. This is achieved by selecting the optimal path by searching each path of the existing network. The software should check whether any chance of collision and if it is happening, then how to avoid it by providing a minimum delay for finding the optimal path. For finding the prediction of each node to reach the optimal path different methods should be applied, like k-means and random selection. The experimental results show that Object tracking with prediction mechanism is much better than without prediction mechanism.
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Editor IJCATR
Video object tracking and segmentation are the fundamental building blocks for smart surveillance
system. Various algorithms like partial least square analysis, Markov model, Temporal differencing,
background subtraction algorithm, adaptive background updating have been proposed but each were having
drawbacks like object tracking problem, multibackground congestion, illumination changes, occlusion etc.
The background segmentation worked on to principled object tracking by using two models Gaussian mixture
model and level centre model. Wavelet transforms have been one of the important signal processing
developments, especially for the applications such as time-frequency analysis, data compression,
segmentation and vision. The key idea of the wavelet transform approach is to represents any arbitrary
function f (t) as a superposition of a set of such wavelets or basis functions. Results show that algorithm
performs well to remove occlusion and multibackground congestion as well as algorithm worked with
removal of noise in the signals
Title PDF: MATRIOSKA: A Multi-level Approach to Fast Tracking by Learning | ICIAP 2013
In this paper we propose a novel framework for the detection and tracking in real-time of unknown object in a video stream. We decompose the problem into two separate modules: detection and learning. The detection module can use multiple keypoint-based methods (ORB, FREAK, BRISK, SIFT, SURF and more) inside a fallback model, to correctly localize the object frame by frame exploiting the strengths of each method. The learning module updates the object model, with a growing and pruning approach, to account for changes in its appearance and extracts negative samples to further improve the detector performance. To show the effectiveness of the proposed tracking-by-detection algorithm, we present numerous quantitative results on a number of challenging sequences in which the target object goes through changes of pose, scale and illumination.
Vehicle Tracking Using Kalman Filter and Featuressipij
Vehicle tracking has a wide variety of applications. The image resolution of the video available from most traffic camera system is low. In many cases for tracking multi object, distinguishing them from another isn’t easy because of their similarity. In this paper we describe a method, for tracking multiple objects, where the objects are vehicles. The number of vehicles is unknown and varies. We detect all moving objects, and for tracking of vehicle we use the kalman filter and color feature and distance of it from one frame to the next. So the method can distinguish and tracking all vehicles individually. The proposed algorithm can be applied to multiple moving objects.
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
Image segmentation is the first step in image analysis and pattern recognition. Image segmentation is the process of dividing an image into different regions such that each region is homogeneous. The accurate and effective algorithm for segmenting image is very useful in many fields, especially in medical image. This paper presents a new approach for image segmentation by applying k-means algorithm with two level variable weighting. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means and Fuzzy k-means clustering algorithm is one of the most widely used algorithms in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means and Fuzzy k-Means. This paper proposes a new clustering algorithm called TW-fuzzy k-means, an automated two-level variable weighting clustering algorithm for segmenting object. In this algorithm, a variable weight is also assigned to each variable on the current partition of data. This could be applied on general images and/or specific images (i.e., medical and microscopic images). The proposed TW-Fuzzy k-means algorithm in terms of providing a better segmentation performance for various type of images. Based on the results obtained, the proposed algorithm gives better visual quality as compared to several other clustering methods.
Object extraction using edge, motion and saliency information from videoseSAT Journals
Abstract Object detection is a process of finding the instances of object of a certain class which is useful in analysis of video or image. There are number of algorithms have been developed so far for object detection. Object detection has got significant role in variety of areas of computer vision like video surveillance, image retrieval`. In this paper presented an efficient algorithm for moving object extraction using edge, motion and saliency information from videos. Out methodology includes 4 stages: Frame generation, Pre-processing, Foreground generation and integration of cues. Foreground generation includes edge detection using sobel edge detection algorithm, motion detection using pixel-based absolute difference algorithm and motion saliency detection. Conditional Random Field (CRF) is applied for integration of cues and thus we get better spatial information of segmented object. Keywords: Object detection, Saliency information, Sobel edge detection, CRF.
In recent machine learning community, there is a trend of constructing a linear logarithm version of
nonlinear version through the ‘kernel method’ for example kernel principal component analysis, kernel
fisher discriminant analysis, support Vector Machines (SVMs), and the current kernel clustering
algorithms. Typically, in unsupervised methods of clustering algorithms utilizing kernel method, a
nonlinear mapping is operated initially in order to map the data into a much higher space feature, and then
clustering is executed. A hitch of these kernel clustering algorithms is that the clustering prototype resides
in increased features specs of dimensions and therefore lack intuitive and clear descriptions without
utilizing added approximation of projection from the specs to the data as executed in the literature
presented. This paper aims to utilize the ‘kernel method’, a novel clustering algorithm, founded on the
conventional fuzzy clustering algorithm (FCM) is anticipated and known as kernel fuzzy c-means algorithm
(KFCM). This method embraces a novel kernel-induced metric in the space of data in order to interchange
the novel Euclidean matric norm in cluster prototype and fuzzy clustering algorithm still reside in the space
of data so that the results of clustering could be interpreted and reformulated in the spaces which are
original. This property is used for clustering incomplete data. Execution on supposed data illustrate that
KFCM has improved performance of clustering and stout as compare to other transformations of FCM for
clustering incomplete data.
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.
An enhanced fireworks algorithm to generate prime key for multiple users in f...journalBEEI
This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps. It is used processing the digital image. Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of fireworks and camel herd algorithms (HFCA), where Fireworks are based on 3-dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so quick response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Fast Full Search for Block Matching Algorithmsijsrd.com
This project introduces configurable motion estimation architecture for a wide range of fast block-matching algorithms (BMAs). Contemporary motion estimation architectures are either too rigid for multiple BMAs or the flexibility in them is implemented at the cost of reduced performance. In block-based motion estimation, a block-matching algorithm (BMA) searches for the best matching block for the current macro block from the reference frame. During the searching procedure, the checking point yielding the minimum block distortion (MBD) determines the displacement of the best matching block.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
An Efficient Approach for Multi-Target Tracking in Sensor Networks using Ant ...ijsrd.com
Multi-Target Tracking for Sensor Networks using Ant Colony Optimization is proposed in this paper. The proposed approach uses ant colony optimization technique that composed of both dynamic and mobile nodes. While mobile nodes are used for optimizing the target tracking, dynamic nodes ensure the total coverage of the network. As a result, the performance of the Wireless Sensor Networks with multi-target tracking on mobility nodes will improve. While improving the performance of the wireless sensor networks, automatically minimum distance will be travelled by the nodes, thereby decreasing the energy consumption of the mobility nodes. This is achieved by selecting the optimal path by searching each path of the existing network. The software should check whether any chance of collision and if it is happening, then how to avoid it by providing a minimum delay for finding the optimal path. For finding the prediction of each node to reach the optimal path different methods should be applied, like k-means and random selection. The experimental results show that Object tracking with prediction mechanism is much better than without prediction mechanism.
Algorithmic Analysis to Video Object Tracking and Background Segmentation and...Editor IJCATR
Video object tracking and segmentation are the fundamental building blocks for smart surveillance
system. Various algorithms like partial least square analysis, Markov model, Temporal differencing,
background subtraction algorithm, adaptive background updating have been proposed but each were having
drawbacks like object tracking problem, multibackground congestion, illumination changes, occlusion etc.
The background segmentation worked on to principled object tracking by using two models Gaussian mixture
model and level centre model. Wavelet transforms have been one of the important signal processing
developments, especially for the applications such as time-frequency analysis, data compression,
segmentation and vision. The key idea of the wavelet transform approach is to represents any arbitrary
function f (t) as a superposition of a set of such wavelets or basis functions. Results show that algorithm
performs well to remove occlusion and multibackground congestion as well as algorithm worked with
removal of noise in the signals
Title PDF: MATRIOSKA: A Multi-level Approach to Fast Tracking by Learning | ICIAP 2013
In this paper we propose a novel framework for the detection and tracking in real-time of unknown object in a video stream. We decompose the problem into two separate modules: detection and learning. The detection module can use multiple keypoint-based methods (ORB, FREAK, BRISK, SIFT, SURF and more) inside a fallback model, to correctly localize the object frame by frame exploiting the strengths of each method. The learning module updates the object model, with a growing and pruning approach, to account for changes in its appearance and extracts negative samples to further improve the detector performance. To show the effectiveness of the proposed tracking-by-detection algorithm, we present numerous quantitative results on a number of challenging sequences in which the target object goes through changes of pose, scale and illumination.
Vehicle Tracking Using Kalman Filter and Featuressipij
Vehicle tracking has a wide variety of applications. The image resolution of the video available from most traffic camera system is low. In many cases for tracking multi object, distinguishing them from another isn’t easy because of their similarity. In this paper we describe a method, for tracking multiple objects, where the objects are vehicles. The number of vehicles is unknown and varies. We detect all moving objects, and for tracking of vehicle we use the kalman filter and color feature and distance of it from one frame to the next. So the method can distinguish and tracking all vehicles individually. The proposed algorithm can be applied to multiple moving objects.
Detection and Tracking of Moving Object: A SurveyIJERA Editor
Object tracking is the process of locating moving object or multiple objects in sequence of frames. Object
tracking is basically a challenging problem. Difficulties in tracking of an object may arise due to abrupt changes
in environment, motion of object, noise etc. To overcome such problems different tracking algorithms have been
proposed. This paper presents various techniques related to object detection and tracking..The goal of this paper
is to present a survey of these techniques.
Real Time Detection of Moving Object Based on Fpgaiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Objects detection and tracking using fast principle component purist and kalm...IJECEIAES
The detection and tracking of moving objects attracted a lot of concern because of the vast computer vision applications. This paper proposes a new algorithm based on several methods for identifying, detecting, and tracking an object in order to develop an effective and efficient system in several applications. This algorithm has three main parts: the first part for background modeling and foreground extraction, the second part for smoothing, filtering and detecting moving objects within the video frame and the last part includes tracking and prediction of detected objects. In this proposed work, a new algorithm to detect moving objects from video data is designed by the Fast Principle Component Purist (FPCP). Then we used an optimal filter that performs well to reduce noise through the median filter. The Fast Regionconvolution neural networks (Fast- RCNN) is used to add smoothness to the spatial identification of objects and their areas. Then the detected object is tracked by Kalman Filter. Experimental results show that our algorithm adapts to different situations and outperforms many existing algorithms.
This article aims at a new algorithm for tracking moving objects in the long term. We have tried to overcome some potential difficulties, first by a comparative study of the measuring methods of the difference and the similarity between the template and the source image. In the second part, an improvement of the best method allows us to follow the target in a robust way. This method also allows us to effectively overcome the problems of geometric deformation, partial occlusion and recovery after the target leaves the field of vision. The originality of our algorithm is based on a new model, which does not depend on a probabilistic process and does not require a data based detection in advance. Experimental results on several difficult video sequences have proven performance advantages over many recent trackers. The developed algorithm can be employed in several applications such as video surveillance, active vision or industrial visual servoing.
Automated Traffic sign board classification system is one of the key technologies of Intelligent
Transportation Systems (ITS). Traffic Surveillance System is being more and important with improving
urban scale and increasing number of vehicles. This Paper presents an intelligent sign board
classification method based on blob analysis in traffic surveillance. Processing is done by three main
steps: moving object segmentation, blob analysis, and classifying. A Sign board is modelled as a
rectangular patch and classified via blob analysis. By processing the blob of sign boards, the meaningful
features are extracted. Tracking moving targets is achieved by comparing the extracted features with
training data. After classifying the sign boards the system will intimate to user in the form of alarms,
sound waves. The experimental results show that the proposed system can provide real-time and useful
information for traffic surveillance.
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSsipij
Multiple objects tracking finds its applications in many high level vision analysis like object behaviour
interpretation and gait recognition. In this paper, a feature based method to track the multiple moving
objects in surveillance video sequence is proposed. Object tracking is done by extracting the color and Hu
moments features from the motion segmented object blob and establishing the association of objects in the
successive frames of the video sequence based on Chi-Square dissimilarity measure and nearest neighbor
classifier. The benchmark IEEE PETS and IEEE Change Detection datasets has been used to show the
robustness of the proposed method. The proposed method is assessed quantitatively using the precision and
recall accuracy metrics. Further, comparative evaluation with related works has been carried out to exhibit
the efficacy of the proposed method.
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...IAEME Publication
Multiple human tracking based on object detection has been a challenge due to its
complexity. Errors in object detection would be propagated to tracking errors. In this
paper, we propose a tracking method that minimizes the error produced by object
detector. We use RetinaNet as object detector and Hungarian algorithm for tracking.
The cost matrix for Hungarian algorithm is calculated using the RetinaNet features,
bounding box center distances, and intersection of unions of bounding boxes. We
interpolate the missing detections in the last step. The proposed method yield 43.2
MOTA for MOT16 benchmark
A Survey On Tracking Moving Objects Using Various AlgorithmsIJMTST Journal
Sparse representation has been applied to the object tracking problem. Mining the self- similarities between particles via multitask learning can improve tracking performance. How-ever, some particles may be different from others when they are sampled from a large region. Imposing all particles share the same structure may degrade the results. To overcome this problem, we propose a tracking algorithm based on robust multitask sparse representation (RMTT) in this letter. When we learn the particle representations, we decompose the sparse coefficient matrix into two parts in our algorithm. Joint sparse regularization is imposed on one coefficient matrix while element-wise sparse regularization is imposed on another matrix. The former regularization exploits self-similarities of particles while the later one considers the differences between them.
Proposed Multi-object Tracking Algorithm Using Sobel Edge Detection operatorQUESTJOURNAL
ABSTRACT:Tracking of moving objects that is called video tracking is used for measuring motion parameters and obtaining a visual record of the moving objects, it is an important area of application in image processing. In general there are two different approaches to obtain object tracking: the first is Recognition-based Tracking, and the second is the Motion-based Tracking. Video tracking system raises a wide possibility in today’s society. This system is used in various applications such as military, security, monitoring, robotic, and nowadays in dayto-day applications. However the video tracking systems still have many open problems and various research activities in a video tracking system are explores. This paper presents an algorithm for video tracking of any moving targets with the uses of contour based detection technique that depends on the sobel operator. The proposed system is suitable for indoor and outdoor applications. Our approach has the advantage of extending the applicability of tracking system and also, as presented here improves the performance of the tracker making feasible high frame rate video tracking. The goal of the tracking system is to analyze the video frames and estimate the position of a part of the input video frame (usually a moving object), our approach can detect, tracked any object more than one object and calculate the position of the moving objects. Therefore, the aim of this paper is to construct a motion tracking system for moving objects. Where, at the end of this paper, the detail outcome and result are discussed using experiments results of the proposed technique
Strategy for Foreground Movement Identification Adaptive to Background Variat...IJECEIAES
Video processing has gained a lot of significance because of its applications in various areas of research. This includes monitoring movements in public places for surveillance. Video sequences from various standard datasets such as I2R, CAVIAR and UCSD are often referred for video processing applications and research. Identification of actors as well as the movements in video sequences should be accomplished with the static and dynamic background. The significance of research in video processing lies in identifying the foreground movement of actors and objects in video sequences. Foreground identification can be done with a static or dynamic background. This type of identification becomes complex while detecting the movements in video sequences with a dynamic background. For identification of foreground movement in video sequences with dynamic background, two algorithms are proposed in this article. The algorithms are termed as Frame Difference between Neighboring Frames using Hue, Saturation and Value (FDNF-HSV) and Frame Difference between Neighboring Frames using Greyscale (FDNF-G). With regard to F-measure, recall and precision, the proposed algorithms are evaluated with state-of-art techniques. Results of evaluation show that, the proposed algorithms have shown enhanced performance.
A New Algorithm for Tracking Objects in Videos of Cluttered ScenesZac Darcy
The work presented in this paper describes a novel algorithm for automatic video object tracking based on
a process of subtraction of successive frames, where the prediction of the direction of movement of the
object being tracked is carried out by analyzing the changing areas generated as result of the object’s
motion, specifically in regions of interest defined inside the object being tracked in both the current and the
next frame. Simultaneously, it is initiated a minimization process which seeks to determine the location of
the object being tracked in the next frame using a function which measures the grade of dissimilarity
between the region of interest defined inside the object being tracked in the current frame and a moving
region in a next frame. This moving region is displaced in the direction of the object’s motion predicted on
the process of subtraction of successive frames. Finally, the location of the moving region of interest in the
next frame that minimizes the proposed function of dissimilarity corresponds to the predicted location of
the object being tracked in the next frame. On the other hand, it is also designed a testing platform which is
used to create virtual scenarios that allow us to assess the performance of the proposed algorithm. These
virtual scenarios are exposed to heavily cluttered conditions where areas which surround the object being
tracked present a high variability. The results obtained with the proposed algorithm show that the tracking
process was successfully carried out in a set of virtual scenarios under different challenging conditions.
In the presence of dynamic background (such as camouflage, ripples in water) detecting of moving objects
became the very toughest job. In order to subtract the background we are using three techniques in this paper i.e.
CDH, FCDH, FCH. Initially the CDH (color difference histogram) technique used in order to remove the dynamic
background so that it will help us to detect the moving objects by minimizing the false error occurred due to the
non-stationary background. This paper proposes an algorithm FCDH (fuzzy color difference histogram) which
uses the concept of fuzzy C-means clustering (FCM) and updates CDH for reducing the effects of intensity
variations because of some fake motions. This algorithm tested with number of videos available in public.
Similar to Multi Object Tracking Methods Based on Particle Filter and HMM (20)
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.