Submit Search
Upload
IRJET- Rice QA using Deep Learning
•
0 likes
•
23 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5695.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
https://www.irjet.net/archives/V6/i4/IRJET-V6I4506.pdf
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET Journal
https://www.irjet.net/archives/V6/i12/IRJET-V6I12169.pdf
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET Journal
https://www.irjet.net/archives/V7/i3/IRJET-V7I31126.pdf
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
https://www.irjet.net/archives/V6/i6/IRJET-V6I6558.pdf
IRJET- 3D Object Recognition of Car Image Detection
IRJET- 3D Object Recognition of Car Image Detection
IRJET Journal
https://irjet.net/archives/V7/i3/IRJET-V7I3540.pdf
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET Journal
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99 If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money. Check out my other articles on Medium. : https://rb.gy/zn1aiu My YouTube: https://rb.gy/88iwdd Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y My Instagram: https://rb.gy/gmvuy9 My Twitter: https://twitter.com/Machine01776819 My Substack: https://devanshacc.substack.com/ Live conversations at twitch here: https://rb.gy/zlhk9y Get a free stock on Robinhood: https://join.robinhood.com/fnud75 This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels. Comments: ICML'2020. Code and pretrained models at this https URL Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML) Cite as: arXiv:2002.05709 [cs.LG] (or arXiv:2002.05709v3 [cs.LG] for this version) Submission history From: Ting Chen [view email] [v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB) [v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB) [v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
Devansh16
https://irjet.net/archives/V7/i3/IRJET-V7I3459.pdf
IRJET - Object Identification in Steel Container through Thermal Image Pi...
IRJET - Object Identification in Steel Container through Thermal Image Pi...
IRJET Journal
Abstract These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
Recommended
https://www.irjet.net/archives/V6/i4/IRJET-V6I4506.pdf
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET- Object Detection and Recognition using Single Shot Multi-Box Detector
IRJET Journal
https://www.irjet.net/archives/V6/i12/IRJET-V6I12169.pdf
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET Journal
https://www.irjet.net/archives/V7/i3/IRJET-V7I31126.pdf
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
https://www.irjet.net/archives/V6/i6/IRJET-V6I6558.pdf
IRJET- 3D Object Recognition of Car Image Detection
IRJET- 3D Object Recognition of Car Image Detection
IRJET Journal
https://irjet.net/archives/V7/i3/IRJET-V7I3540.pdf
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET Journal
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99 If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money. Check out my other articles on Medium. : https://rb.gy/zn1aiu My YouTube: https://rb.gy/88iwdd Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y My Instagram: https://rb.gy/gmvuy9 My Twitter: https://twitter.com/Machine01776819 My Substack: https://devanshacc.substack.com/ Live conversations at twitch here: https://rb.gy/zlhk9y Get a free stock on Robinhood: https://join.robinhood.com/fnud75 This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels. Comments: ICML'2020. Code and pretrained models at this https URL Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML) Cite as: arXiv:2002.05709 [cs.LG] (or arXiv:2002.05709v3 [cs.LG] for this version) Submission history From: Ting Chen [view email] [v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB) [v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB) [v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
Devansh16
https://irjet.net/archives/V7/i3/IRJET-V7I3459.pdf
IRJET - Object Identification in Steel Container through Thermal Image Pi...
IRJET - Object Identification in Steel Container through Thermal Image Pi...
IRJET Journal
Abstract These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using machine learning algorithms emphasize more on improving attack detection rate and reducing false alarms but time efficiency is often overlooked. Therefore, in order to address this limitation, a modern solution has been presented using Machine Learning-as-a-Service platform. The proposed work analyses the performance of eight two-class and three multiclass algorithms using UNSW NB-15, a modern intrusion detection dataset. 82,332 testing samples were considered to evaluate the performance of algorithms. The proposed two class decision forest model exhibited 99.2% accuracy and took 6 seconds to learn 1,75,341 network instances. Multiclass classification task was also undertaken wherein attack types like generic, exploits, shellcode and worms were classified with a recall percentage of 99%, 94.49%, 91.79% and 90.9% respectively by the multiclass decision forest model that also leapfrogged others in terms of training and execution time.
Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...
IJECEIAES
https://www.irjet.net/archives/V5/i3/IRJET-V5I3333.pdf
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET Journal
Detection of unexpected and emerging new threats has become a necessity for secured internet communication with absolute data confidentiality, integrity and availability. Design and development of such a detection system shall not only be new, accurate and fast but also effective in a dynamic environment encompassing the surrounding network. In this paper, an algorithm is proposed for anomaly detection through modifying the Self – Organizing Map (SOM), by including new neighbourhood updating rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment. The algorithm initially starts with null network and grows with the original data space as initial weight vectors. New nodes are created using distance threshold parameter and their neighbourhood is identified using connection strength. Employing learning rule, the weight vector updation is carried out for neighbourhood nodes. Performance of the new algorithm is evaluated for using standard bench mark dataset. The result is compared with other neural network methods, shows 98% detection rate and 2% false alarm rate.
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
cscpconf
https://irjet.net/archives/V4/i7/IRJET-V4I7504.pdf
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
IRJET Journal
https://www.irjet.net/archives/V6/i6/IRJET-V6I6589.pdf
IRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution Techniques
IRJET Journal
https://www.irjet.net/archives/V6/i5/IRJET-V6I5562.pdf
IRJET- Automated Detection of Diabetic Retinopathy using Compressed Sensing
IRJET- Automated Detection of Diabetic Retinopathy using Compressed Sensing
IRJET Journal
https://blog.irjet.net/archives/V6/i4/IRJET-V6I442.pdf
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET Journal
http://www.iosrjournals.org/iosr-jce/pages/v12i5.html
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
IOSR Journals
https://irjet.net/archives/V4/i2/IRJET-V4I2386.pdf
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET Journal
https://www.irjet.net/archives/V6/i4/IRJET-V6I4765.pdf
IRJET- Displaying and Capturing Profile using Object Detection YOLO and Deepl...
IRJET- Displaying and Capturing Profile using Object Detection YOLO and Deepl...
IRJET Journal
Wireless sensor nodes continuously observe and sense statistical data from the physical environment. But what degree of accurate data sensed by the sensor nodes collaboratively is a big issue for wireless sensor networks. Hence in this paper, we describe accuracy models of sensor networks for collecting accurate data from the physical environment under two conditions. First condition: we propose accuracy model which requires a priori knowledge of statistical data of the physical environment called Estimated Data Accuracy (EDA) model. Simulation results shows that EDA model can sense more accurate data from the physical environment than the other information accuracy models in the network. Moreover using EDA model, there exist an optimal set of sensor nodes which are adequate to perform approximately the same data accuracy level achieve by the network. Finally we simulate EDA model under the thread of malicious attacks in the network due to extreme physical environment. Second condition: we propose another accuracy model using Steepest Decent method called Adaptive Data Accuracy (ADA) model which doesn’t require any a priori information of input signal statistics. We also show that using ADA model, there exist an optimal set of sensor nodes which measures accurate data and are sufficient to perform the same data accuracy level achieve by the network. Further in ADA model, we can reduce the amount of data transmission for these optimal set of sensor nodes using a model called Spatio- Temporal Data Prediction (STDP) model. STDP model captures the spatial and temporal correlation of sensing data to reduce the communication overhead under data reduction strategies. Finally using STDP model, we illustrate a mechanism to trace the malicious nodes in the network under extreme physical environment. Computer simulations illustrate the performance of EDA, ADA and STDP models respectively.
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
IDES Editor
https://www.irjet.net/archives/V6/i4/IRJET-V6I41134.pdf
IRJET- Comparative Analysis of Video Processing Object Detection
IRJET- Comparative Analysis of Video Processing Object Detection
IRJET Journal
Majority of the existing commercial application for video surveillance system only captures the event frames where the accuracy level of captures is too poor. We reviewed the existing system to find that at present there is no such research technique that offers contextual-based scene identification of outliers. Therefore, we presented a framework that uses unsupervised learning approach to perform precise identification of outliers for a given video frames concerning the contextual information of the scene. The proposed system uses matrix decomposition method using multivariate analysis to maintain an equilibrium better faster response time and higher accuracy of the abnormal event/object detection as an outlier. Using an analytical methodology, the proposed system blocking operation followed by sparsity to perform detection. The study outcome shows that proposed system offers an increasing level of accuracy in contrast to the existing system with faster response time.
Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...
IJECEIAES
VOLUME-7 ISSUE-6, JUNE 2019 , International Journal of Research in Advent Technology (IJRAT) , ISSN: 2321-9637 (Online)
76201950
76201950
IJRAT
https://irjet.net/archives/V4/i1/IRJET-V4I1210.pdf
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
IRJET Journal
https://www.irjet.net/archives/V6/i5/IRJET-V6I5240.pdf
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
Abstract Internet Technology is growing at exponential rate day by day, making data security of computer systems more complex and critical. There has been multiple methodology implemented for the same in recent time as detailed in [1], [3]. Availability of larger bandwidth has made the multiple large computer server network connected worldwide and thus increasing the load on the necessity to secure data and Intrusion detection system (IDS) is one of the most efficient technique to maintain security of computer system. The proposed system is designed in such a way that are helpful in identifying malicious behavior and improper use of computer system. In this report we proposed a hybrid technique for intrusion detection using data mining algorithms. Our main objective is to do complete analysis of intrusion detection Dataset to test the implemented system.In This report we will propose a new methodology in which Modified k-mean is used for clustering whereas Naïve Bayes for the classification. These two data mining techniques will be used for Intrusion detection in large horizontally distributed database. Keywords: Intrusion Detection, Modified K-Mean, Naïve Bays
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
Ieee gold 2010 resta
Ieee gold 2010 resta
grssieee
The strongest indicator of a cancer patient's prognosis is the number of mitotic bodies that a pathologist manually counts from the high-resolution whole-slide histopathology images. Obviously, it is not efficient to manually count the mitosis number. But it is still challenging to automate the process of mitosis detection due to the limited training datasets and the intensive computing involved in the model training and inference. This presentation introduces a large-scale deep learning approach to train a two-stage CNN-based model with high accuracy to detect the mitosis locations directly from the high-resolution whole-slide images. In details, we first train a nuclei detection model to remove the background information from the raw whole-slide histopathology images. Second, a customized ResNet-50 model is trained on the cleaned dataset in the first step. The first step saves the training time while improving the model performance in the second step. A false-positive oversampling approach is used to further improve the model performance. With these models, the inference process is conducted to detect the mitosis locations from the large volume of histopathology images in parallel. Meanwhile, the whole pipeline, including data preprocessing, model training, hyperparameter tuning, and inference, is parallelized by utilizing the distributed TensorFlow, Apache Spark, and HDFS. The experiences and techniques in this project can be applied to other large scale deep learning problems as well. Speaker: Fei Hu
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
Databricks
There is no question that data hiding has increasingly drawn extensive attention recently. This report presents a data hiding technique based on the modification of image histogram. It is fully reversible, that means, the original cover image can be recovered from the marked image, after the hidden data has been extracted. In this work, a data hiding scheme using reversibly designed difference-pair method is presented. In comparison to the previous work, since only one pixel of a pixel-pair was allowed to be modified by 1 bit in value, their embedding capacity was low. The embedding algorithm should have higher embedding capacity as this was the major drawback. Therefore it was decided to work on an algorithm which can increase embedding capacity in reversible domain. Results achieved after the execution of algorithms were compared with the existed work to draw result oriented conclusion.
Data Hiding Using Reversibly Designed Difference-Pair Method
Data Hiding Using Reversibly Designed Difference-Pair Method
IJERA Editor
https://www.irjet.net/archives/V9/i5/IRJET-V9I502.pdf
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
IRJET Journal
https://www.irjet.net/archives/V9/i6/IRJET-V9I6647.pdf
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
IRJET Journal
More Related Content
What's hot
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using machine learning algorithms emphasize more on improving attack detection rate and reducing false alarms but time efficiency is often overlooked. Therefore, in order to address this limitation, a modern solution has been presented using Machine Learning-as-a-Service platform. The proposed work analyses the performance of eight two-class and three multiclass algorithms using UNSW NB-15, a modern intrusion detection dataset. 82,332 testing samples were considered to evaluate the performance of algorithms. The proposed two class decision forest model exhibited 99.2% accuracy and took 6 seconds to learn 1,75,341 network instances. Multiclass classification task was also undertaken wherein attack types like generic, exploits, shellcode and worms were classified with a recall percentage of 99%, 94.49%, 91.79% and 90.9% respectively by the multiclass decision forest model that also leapfrogged others in terms of training and execution time.
Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...
IJECEIAES
https://www.irjet.net/archives/V5/i3/IRJET-V5I3333.pdf
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET Journal
Detection of unexpected and emerging new threats has become a necessity for secured internet communication with absolute data confidentiality, integrity and availability. Design and development of such a detection system shall not only be new, accurate and fast but also effective in a dynamic environment encompassing the surrounding network. In this paper, an algorithm is proposed for anomaly detection through modifying the Self – Organizing Map (SOM), by including new neighbourhood updating rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment. The algorithm initially starts with null network and grows with the original data space as initial weight vectors. New nodes are created using distance threshold parameter and their neighbourhood is identified using connection strength. Employing learning rule, the weight vector updation is carried out for neighbourhood nodes. Performance of the new algorithm is evaluated for using standard bench mark dataset. The result is compared with other neural network methods, shows 98% detection rate and 2% false alarm rate.
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
cscpconf
https://irjet.net/archives/V4/i7/IRJET-V4I7504.pdf
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
IRJET Journal
https://www.irjet.net/archives/V6/i6/IRJET-V6I6589.pdf
IRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution Techniques
IRJET Journal
https://www.irjet.net/archives/V6/i5/IRJET-V6I5562.pdf
IRJET- Automated Detection of Diabetic Retinopathy using Compressed Sensing
IRJET- Automated Detection of Diabetic Retinopathy using Compressed Sensing
IRJET Journal
https://blog.irjet.net/archives/V6/i4/IRJET-V6I442.pdf
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET Journal
http://www.iosrjournals.org/iosr-jce/pages/v12i5.html
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
IOSR Journals
https://irjet.net/archives/V4/i2/IRJET-V4I2386.pdf
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET Journal
https://www.irjet.net/archives/V6/i4/IRJET-V6I4765.pdf
IRJET- Displaying and Capturing Profile using Object Detection YOLO and Deepl...
IRJET- Displaying and Capturing Profile using Object Detection YOLO and Deepl...
IRJET Journal
Wireless sensor nodes continuously observe and sense statistical data from the physical environment. But what degree of accurate data sensed by the sensor nodes collaboratively is a big issue for wireless sensor networks. Hence in this paper, we describe accuracy models of sensor networks for collecting accurate data from the physical environment under two conditions. First condition: we propose accuracy model which requires a priori knowledge of statistical data of the physical environment called Estimated Data Accuracy (EDA) model. Simulation results shows that EDA model can sense more accurate data from the physical environment than the other information accuracy models in the network. Moreover using EDA model, there exist an optimal set of sensor nodes which are adequate to perform approximately the same data accuracy level achieve by the network. Finally we simulate EDA model under the thread of malicious attacks in the network due to extreme physical environment. Second condition: we propose another accuracy model using Steepest Decent method called Adaptive Data Accuracy (ADA) model which doesn’t require any a priori information of input signal statistics. We also show that using ADA model, there exist an optimal set of sensor nodes which measures accurate data and are sufficient to perform the same data accuracy level achieve by the network. Further in ADA model, we can reduce the amount of data transmission for these optimal set of sensor nodes using a model called Spatio- Temporal Data Prediction (STDP) model. STDP model captures the spatial and temporal correlation of sensing data to reduce the communication overhead under data reduction strategies. Finally using STDP model, we illustrate a mechanism to trace the malicious nodes in the network under extreme physical environment. Computer simulations illustrate the performance of EDA, ADA and STDP models respectively.
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
IDES Editor
https://www.irjet.net/archives/V6/i4/IRJET-V6I41134.pdf
IRJET- Comparative Analysis of Video Processing Object Detection
IRJET- Comparative Analysis of Video Processing Object Detection
IRJET Journal
Majority of the existing commercial application for video surveillance system only captures the event frames where the accuracy level of captures is too poor. We reviewed the existing system to find that at present there is no such research technique that offers contextual-based scene identification of outliers. Therefore, we presented a framework that uses unsupervised learning approach to perform precise identification of outliers for a given video frames concerning the contextual information of the scene. The proposed system uses matrix decomposition method using multivariate analysis to maintain an equilibrium better faster response time and higher accuracy of the abnormal event/object detection as an outlier. Using an analytical methodology, the proposed system blocking operation followed by sparsity to perform detection. The study outcome shows that proposed system offers an increasing level of accuracy in contrast to the existing system with faster response time.
Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...
IJECEIAES
VOLUME-7 ISSUE-6, JUNE 2019 , International Journal of Research in Advent Technology (IJRAT) , ISSN: 2321-9637 (Online)
76201950
76201950
IJRAT
https://irjet.net/archives/V4/i1/IRJET-V4I1210.pdf
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
IRJET Journal
https://www.irjet.net/archives/V6/i5/IRJET-V6I5240.pdf
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
Abstract Internet Technology is growing at exponential rate day by day, making data security of computer systems more complex and critical. There has been multiple methodology implemented for the same in recent time as detailed in [1], [3]. Availability of larger bandwidth has made the multiple large computer server network connected worldwide and thus increasing the load on the necessity to secure data and Intrusion detection system (IDS) is one of the most efficient technique to maintain security of computer system. The proposed system is designed in such a way that are helpful in identifying malicious behavior and improper use of computer system. In this report we proposed a hybrid technique for intrusion detection using data mining algorithms. Our main objective is to do complete analysis of intrusion detection Dataset to test the implemented system.In This report we will propose a new methodology in which Modified k-mean is used for clustering whereas Naïve Bayes for the classification. These two data mining techniques will be used for Intrusion detection in large horizontally distributed database. Keywords: Intrusion Detection, Modified K-Mean, Naïve Bays
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
Ieee gold 2010 resta
Ieee gold 2010 resta
grssieee
The strongest indicator of a cancer patient's prognosis is the number of mitotic bodies that a pathologist manually counts from the high-resolution whole-slide histopathology images. Obviously, it is not efficient to manually count the mitosis number. But it is still challenging to automate the process of mitosis detection due to the limited training datasets and the intensive computing involved in the model training and inference. This presentation introduces a large-scale deep learning approach to train a two-stage CNN-based model with high accuracy to detect the mitosis locations directly from the high-resolution whole-slide images. In details, we first train a nuclei detection model to remove the background information from the raw whole-slide histopathology images. Second, a customized ResNet-50 model is trained on the cleaned dataset in the first step. The first step saves the training time while improving the model performance in the second step. A false-positive oversampling approach is used to further improve the model performance. With these models, the inference process is conducted to detect the mitosis locations from the large volume of histopathology images in parallel. Meanwhile, the whole pipeline, including data preprocessing, model training, hyperparameter tuning, and inference, is parallelized by utilizing the distributed TensorFlow, Apache Spark, and HDFS. The experiences and techniques in this project can be applied to other large scale deep learning problems as well. Speaker: Fei Hu
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
Databricks
There is no question that data hiding has increasingly drawn extensive attention recently. This report presents a data hiding technique based on the modification of image histogram. It is fully reversible, that means, the original cover image can be recovered from the marked image, after the hidden data has been extracted. In this work, a data hiding scheme using reversibly designed difference-pair method is presented. In comparison to the previous work, since only one pixel of a pixel-pair was allowed to be modified by 1 bit in value, their embedding capacity was low. The embedding algorithm should have higher embedding capacity as this was the major drawback. Therefore it was decided to work on an algorithm which can increase embedding capacity in reversible domain. Results achieved after the execution of algorithms were compared with the existed work to draw result oriented conclusion.
Data Hiding Using Reversibly Designed Difference-Pair Method
Data Hiding Using Reversibly Designed Difference-Pair Method
IJERA Editor
What's hot
(20)
Performance analysis of binary and multiclass models using azure machine lear...
Performance analysis of binary and multiclass models using azure machine lear...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
IRJET- Exploring Image Super Resolution Techniques
IRJET- Exploring Image Super Resolution Techniques
IRJET- Automated Detection of Diabetic Retinopathy using Compressed Sensing
IRJET- Automated Detection of Diabetic Retinopathy using Compressed Sensing
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET- Displaying and Capturing Profile using Object Detection YOLO and Deepl...
IRJET- Displaying and Capturing Profile using Object Detection YOLO and Deepl...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
Data Accuracy Models under Spatio - Temporal Correlation with Adaptive Strate...
IRJET- Comparative Analysis of Video Processing Object Detection
IRJET- Comparative Analysis of Video Processing Object Detection
Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...
76201950
76201950
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
Ieee gold 2010 resta
Ieee gold 2010 resta
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
Data Hiding Using Reversibly Designed Difference-Pair Method
Data Hiding Using Reversibly Designed Difference-Pair Method
Similar to IRJET- Rice QA using Deep Learning
https://www.irjet.net/archives/V9/i5/IRJET-V9I502.pdf
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
IRJET Journal
https://www.irjet.net/archives/V9/i6/IRJET-V9I6647.pdf
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
IRJET Journal
https://www.irjet.net/archives/V9/i1/IRJET-V9I1182.pdf
AUTOMATED WASTE MANAGEMENT SYSTEM
AUTOMATED WASTE MANAGEMENT SYSTEM
IRJET Journal
https://www.irjet.net/archives/V9/i5/IRJET-V9I5384.pdf
Photo Editing And Sharing Web Application With AI- Assisted Features
Photo Editing And Sharing Web Application With AI- Assisted Features
IRJET Journal
https://www.irjet.net/archives/V9/i3/IRJET-V9I3367.pdf
A Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question Answering
IRJET Journal
https://www.irjet.net/archives/V9/i6/IRJET-V9I6540.pdf
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
IRJET Journal
https://www.irjet.net/archives/V6/i6/IRJET-V6I6126.pdf
IRJET- Sketch-Verse: Sketch Image Inversion using DCNN
IRJET- Sketch-Verse: Sketch Image Inversion using DCNN
IRJET Journal
https://www.irjet.net/archives/V5/i10/IRJET-V5I10161.pdf
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET Journal
https://www.irjet.net/archives/V9/i1/IRJET-V9I1231.pdf
IMAGE CAPTION GENERATOR USING DEEP LEARNING
IMAGE CAPTION GENERATOR USING DEEP LEARNING
IRJET Journal
Fine-tuning of a model is a method that is most often required to cater to the users’ explicit requirements. But the question remains whether the model is accurate enough to be used for a certain application. This paper strives to present the metrics used for performance evaluation of a Convolutional Neural Network (CNN) model. The evaluation is based on the training process which provides us with intermediate models after every 1000 iterations. While 1000 iterations are not substantial enough over the range of 490k iterations, the groups are sized with 100k iterations each. Now, the intention was to compare the recorded metrics to evaluate the model in terms of accuracy. The training model used the set of specific categories chosen from the Microsoft Common Objects in Context (MS COCO) dataset while allowing the users to use their externally available images to test the model’s accuracy. Our trained model ensured that all the objects are detected that are present in the image to depict the effect of precision.
Performance Evaluation of Fine-tuned Faster R-CNN on specific MS COCO Objects
Performance Evaluation of Fine-tuned Faster R-CNN on specific MS COCO Objects
IJECEIAES
https://irjet.net/archives/V7/i2/IRJET-V7I256.pdf
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET Journal
https://www.irjet.net/archives/V9/i4/IRJET-V9I4297.pdf
Dog Breed Prediction System (Web)
Dog Breed Prediction System (Web)
IRJET Journal
https://www.irjet.net/archives/V6/i5/IRJET-V6I51002.pdf
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
IRJET Journal
https://www.irjet.net/archives/V9/i6/IRJET-V9I6392.pdf
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
IRJET Journal
https://www.irjet.net/archives/V9/i6/IRJET-V9I6353.pdf
A Literature Review on Vehicle Detection and Tracking in Aerial Image Sequenc...
A Literature Review on Vehicle Detection and Tracking in Aerial Image Sequenc...
IRJET Journal
https://www.irjet.net/archives/V9/i5/IRJET-V9I5345.pdf
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.
IRJET Journal
https://www.irjet.net/archives/V6/i12/IRJET-V6I12401.pdf
IRJET- Car Defect Detection using Machine Learning for Insurance
IRJET- Car Defect Detection using Machine Learning for Insurance
IRJET Journal
https://www.irjet.net/archives/V6/i4/IRJET-V6I4258.pdf
IRJET- Semantic Segmentation using Deep Learning
IRJET- Semantic Segmentation using Deep Learning
IRJET Journal
https://www.irjet.net/archives/V9/i4/IRJET-V9I433.pdf
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
IRJET Journal
https://irjet.net/archives/V7/i2/IRJET-V7I2466.pdf
IRJET - Autonomous Navigation System using Deep Learning
IRJET - Autonomous Navigation System using Deep Learning
IRJET Journal
Similar to IRJET- Rice QA using Deep Learning
(20)
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
USING IMAGE CLASSIFICATION TO INCENTIVIZE RECYCLING
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
AUTOMATED WASTE MANAGEMENT SYSTEM
AUTOMATED WASTE MANAGEMENT SYSTEM
Photo Editing And Sharing Web Application With AI- Assisted Features
Photo Editing And Sharing Web Application With AI- Assisted Features
A Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question Answering
CAR DAMAGE DETECTION USING DEEP LEARNING
CAR DAMAGE DETECTION USING DEEP LEARNING
IRJET- Sketch-Verse: Sketch Image Inversion using DCNN
IRJET- Sketch-Verse: Sketch Image Inversion using DCNN
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IRJET- Implementation of Gender Detection with Notice Board using Raspberry Pi
IMAGE CAPTION GENERATOR USING DEEP LEARNING
IMAGE CAPTION GENERATOR USING DEEP LEARNING
Performance Evaluation of Fine-tuned Faster R-CNN on specific MS COCO Objects
Performance Evaluation of Fine-tuned Faster R-CNN on specific MS COCO Objects
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
Dog Breed Prediction System (Web)
Dog Breed Prediction System (Web)
IRJET- Object Detection and Recognition for Blind Assistance
IRJET- Object Detection and Recognition for Blind Assistance
Image Forgery / Tampering Detection Using Deep Learning and Cloud
Image Forgery / Tampering Detection Using Deep Learning and Cloud
A Literature Review on Vehicle Detection and Tracking in Aerial Image Sequenc...
A Literature Review on Vehicle Detection and Tracking in Aerial Image Sequenc...
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.
IRJET- Car Defect Detection using Machine Learning for Insurance
IRJET- Car Defect Detection using Machine Learning for Insurance
IRJET- Semantic Segmentation using Deep Learning
IRJET- Semantic Segmentation using Deep Learning
Real Time Moving Object Detection for Day-Night Surveillance using AI
Real Time Moving Object Detection for Day-Night Surveillance using AI
IRJET - Autonomous Navigation System using Deep Learning
IRJET - Autonomous Navigation System using Deep Learning
More from IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1118.pdf
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1117.pdf
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1116.pdf
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1115.pdf
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1114.pdf
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1113.pdf
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1112.pdf
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1111.pdf
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1110.pdf
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1109.pdf
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1108.pdf
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1107.pdf
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1106.pdf
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1105.pdf
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1104.pdf
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1103.pdf
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1102.pdf
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1101.pdf
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I1100.pdf
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
https://www.irjet.net/archives/V11/i1/IRJET-V11I199.pdf
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Presented at NUS: Fuzzing and Software Security Summer School 2024 This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
Introduction to Machine Learning Notes
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
C Sai Kiran
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
Dr. Radhey Shyam
This document presents the calculation of the electric field and electric potential in a coaxial cable using Maxwell's equations in the electrostatic case in an analytical and simulated manner using COMSOL Multiphysics.
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
JulioCesarSalazarHer1
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on. My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways. In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
List of Best Scientist Who Gives Big Contribution in Civil Engineering Filed, in this we provide how they Contribute in Civil Engineering filed, For Data Collection civilthings.com helps us a lot.
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
gettygaming1
PHP and MySQL project on Hall Booking System is a web based project and it has been developed in PHP and MySQL and we can manage Payment, Booking, Inventory, Booking Dates, Customers and Hall from this project. The main objective to develop Hall Booking System PHP, MySQL, JAVA SCRIPT and BOOTSRAP Project is to overcome the manual errors and make a computerized system. In this project, there are various type of modules available to manage Customers, Booking, Payment. We can also generate reports for Booking, Payment, Booking Dates, Hall. Here the Payment module manage all the operations of Payment, Booking module can manage Booking, Inventory module is normally developed for managing Inventory, Booking Dates module manages Booking Dates operations, Customers module has been implemented to manage Customers. In this project all the modules like Payment, Booking Dates, Booking are tightly coupled and we can track the information easily. Ifyou are looking for Free Hall Booking System Project in PHP and MySQL then you can visit our free projects section. We can easily get the list of wedding halls & lawns in Nagpur. Also we have detailed contact information for some particular hall. But we cannot get the availability about hall. So background behind this web portal is that it gives the area wise listing of wedding halls & lawns with the detailed information of individual and also display for particular date the hall is available or not. Just dial is the system in which we can only find the name of Hall and Lawns in city. In just dial we cannot find Halls in specific area. This system cannot show all information about any Hall. This system is not able to book the Halls online. The A Web Based Hall Booking Management System is designed to overcome the disadvantage of previous system.We can easily get the list of Wedding Halls. But we cannot get the availability about Hall. So background behind this web portal is that it gives the area wise listing of Wedding Halls with the detailed information of individual and also display for particular date the Hall is available or not. This is a special type of web portal to easily get the information of all Wedding Halls in Nagpur which display separate calendar for separate Hall. For particular date the Hall. We can availability of Hall as well as Lawns detailed information about individuals Hall in our web portal . It provides all facilities to clients with lowest cost and lowest maintenance problems.
Hall booking system project report .pdf
Hall booking system project report .pdf
Kamal Acharya
The Project deals with the development of the computerized system for maintaining the regular records and services that are undertaken in the furniture business. This project titled "Web Based Integrated Furniture Showroom Management System" has been aimed to design and computerized system that can handle various activities are been carried out at the Furniture Showroom. This application has been developed using PHP Programming Language as its front end and the back end is MYSQL Server In the existing system all the activities and record maintenance of the furniture showroom are done manually by the manager. The Project deals with the development of the computerized system for maintaining the regular records and services that are undertaken in this most important and large business oriented furniture business. This Project also enables the users to perform all the day to day business operations in the furniture showroom business most efficiently.
Furniture showroom management system project.pdf
Furniture showroom management system project.pdf
Kamal Acharya
Our vision is to make ONLINE CAR SERVICING SYSTEM is needed for the country as technology grows fast in the world. The purpose is to develop this project to provide a better solution to the problems that the customers faces. This website will provide customers to reserve their car services from their home or from office. Customer feels hard to send their car for the service, either they need to reserve using mail system or walk in to send their car for service. At the end of these project, a prototype of justified system will develop which will provide a solution for the identify problem to improve the organizations revenue and performance. This system will be web based system where it is able to conduct an overall process of online registration and bookings too. The data will be stored in keep as privacy for each customer who has register.
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
Kamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message. When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely. When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item. Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
This project is being considered in order to reduce and totally eliminate loss of customers to competitors, and save the company from folding up. The current system is manual and it is time consuming. It is also cost ineffective, and average return is low and diminishing. Currently, customers can call or walk-in in order to rent or reserve a vehicle. The staff of the company will check their file to see which vehicle is available for rental. The current system is error prone and customers are dissatisfied. The goal of this project is to automate vehicle rental and reservation so that customers do not need to walk-in or call in order to reserve a vehicle. They can go online and reserve any kind of vehicle they want and that is available. Even when a customer chooses to walk-in, computers are available for him to go online and perform his reservation. When he choose to reserve by phone, any of the customer service representatives can help him reserve the vehicle speedily and issue him a reservation number. The VRS will maintain the database of all vehicles the company has. It will also keep track of all vehicle reservation and return. Reports will be generated bi-weekly. Reports for the Accounts Manager will detail the cost incurred to maintain each vehicle and revenue accrued on each vehicle. Reports for the Maintenance Manager will detail the present mileage of the car in order for him to take care of the vehicle servicing, and when each vehicle will be due for tag renewal. The Branch Manager’s report will detail total cost incurred and total revenue accrued, and the status of each vehicle so that he can decide whether to sell the vehicle or still keep it.
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
Kamal Acharya
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love Back kala ilm Specialist Black Magic Baba Near Me +92322-6382012
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
Amil baba
A computer reservation system or central reservation system is a computerized system used to store and retrieve information and conduct transactions related to air travel, hotels, car rental, or activities. These systems typically allow users to book hotel rooms, rental cars, airline tickets as well as activities and tours. They also provide access to railway reservations and bus reservations in some markets, although these are not always integrated with the main system. For these systems to be accessible on mobile phones and computers outside the premises of the airport, cinema, train station or stadiums, they need to be on the internet or a network. This project focuses on the design and implementation of a web based cinema management system for the allocation of seat tickets online. The system would feature the registration of users, use of serial numbers and pins gotten from scratch cards sold and a printed slip. The system would have a store of all the seats and automate the generation of fresh serial numbers and pins.
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
Kamal Acharya
About Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol. • Remote control: Parallel or serial interface. • Compatible with MAFI CCR system. • Compatible with IDM8000 CCR. • Compatible with Backplane mount serial communication. • Compatible with commercial and Defence aviation CCR system. • Remote control system for accessing CCR and allied system over serial or TCP. • Indigenized local Support/presence in India. • Easy in configuration using DIP switches. Technical Specifications Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol. Key Features Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol. • Remote control: Parallel or serial interface • Compatible with MAFI CCR system • Copatiable with IDM8000 CCR • Compatible with Backplane mount serial communication. • Compatible with commercial and Defence aviation CCR system. • Remote control system for accessing CCR and allied system over serial or TCP. • Indigenized local Support/presence in India. Application • Remote control: Parallel or serial interface. • Compatible with MAFI CCR system. • Compatible with IDM8000 CCR. • Compatible with Backplane mount serial communication. • Compatible with commercial and Defence aviation CCR system. • Remote control system for accessing CCR and allied system over serial or TCP. • Indigenized local Support/presence in India. • Easy in configuration using DIP switches.
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
A dental implant (also known as an endosseous implant or fixture) is interfacing with the bone of the jaw or skull to support a dental prosthesis such as a crown, a bridge or a denture.
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
Ayahmorsy
Teaching effects after 128 hours of Building Information Modeling course in Cracow, Poland. Natalia works in Revit, Navisworks and Dynamo for BIM Coordination position. More https://bim.edu.pl or https://bimedu.eu
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
bim.edu.pl
This presentation is about nitration process of industries, unit processes of chemical engineering.
Halogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
The project developers created a system entitled Resort Management and Reservation System; it will provide better management and monitoring of the services in every resort business, especially D’ Rock Resort. To accommodate those out-of-town guests who want to remain and utilize the resort's services, the proponents planned to automate the business procedures of the resort and implement the system. As a result, it aims to improve business profitability, lower expenses, and speed up the resort's transaction processing. The resort will now be able to serve those potential guests, especially during the high season. Using websites for faster transactions to reserve on your desired time and date is another step toward technological advancement. Customers don’t need to walk in and hold in line for several hours. There is no problem in converting a paper-based transaction online; it's just the system that will be used that will help the resort expand. Moreover, Gerard (2012) stated that “The flexible online information structure was developed as a tool for the reservation theory's two primary applications. Computer use is more efficient, accurate, and faster than a manual or present lifestyle of operation. Using a computer has a vital role in our daily life and the advantages of the devices we use.
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
Kamal Acharya
Laundry firms currently use a manual system for the management and maintenance of critical information. The current system requires numerous paper forms, with data stores spread throughout the laundry management infrastructure. Often information is incomplete or does not follow management standards. Records are often lost in transit during computation requiring a comprehensive auditing process to ensure that no vital information is lost. Multiple copies of the same information exist in the laundry firm data and may lead to inconsistencies in data in various data stores. A significant part of the operation of any laundry firm involves the acquisition, management and timely retrieval of great volumes of information. This information typically involves; customer personal information and clothing records history, user information, price of delivery and received date, users scheduling as regards customers details and dealings in service rendered, also our products package waiting list. All of this information must be managed in an efficient and cost wise fashion so that the organization resources may be effectively utilized. We present the design and implementation of a laundry database management system (LBMS) used in a laundry establishment. Laundry firms are usually faced with difficulties in keeping detailed records of customers clothing; this little problem as seen to most laundry firms is highly discouraging as customers are filled with disappointments, arising from issues such as customer clothes mix-ups and untimely retrieval of clothes. The aim of this application is to determine the number of clothes collected, in relation to their owners, as this also helps the users fix a date for the collection of their clothes. Also customer’s information is secured, as a specific id is allocated per registration to avoid contrasting information.
Laundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
Recently uploaded
(20)
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net Project Report.pdf
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
Hall booking system project report .pdf
Hall booking system project report .pdf
Furniture showroom management system project.pdf
Furniture showroom management system project.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
Halogenation process of chemical process industries
Halogenation process of chemical process industries
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
Laundry management system project report.pdf
Laundry management system project report.pdf
IRJET- Rice QA using Deep Learning
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5370 Rice QA using Deep Learning Aesha Ganatra1, Aakash Jadhav2 1Computer Engineering, Madhuben and Bhanubhai Patel Women Institute of Technology, Gujarat, India 2Computer Science and Engineering, MGM’s Jawaharlal Nehru Engineering College, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - We predict Rice-Paddy quality by extracting knowledge from custom trained model using Deep Learning. In this paper, we scrape and parse Rice-paddy quality checking system to overcome various faults in traditional methods of quality analysis. We compare their qualities in purity format as ratings. Few grams of Rice- paddy chosen at random from a sack, is placed in front of a camera which recognizes quality of rice for price categorization. 1. INTRODUCTION Industrial Factories converts Rice-paddy into actual Rice but checks Paddy quality using Traditional methods (Hand-held). This method cannot judge the right quality analysis. We can predict it using Deep Learning. We build a model using Google’s Tensorflow Object Detection API[5] to determine Rice-Paddy rating based on various classifications. In building our model, we use custom tensorflow model which gives output as custom classifiers are Pure, Impure and Partial Impure. The fresh rating is given to the Pure with highest rating and a threshold of 80% have lowest ratings. Rice Mills can classify rice-paddy into different qualities depending on their need to avoid faults. 1. RELATED WORK Several challenges has occurred while creating the dataset of rice-paddy, we tackled it by using meaningful information from an image. Literature Survey has given a knowledge of making own dataset of rice-paddy at industrial level. Our approach is to give efficient way of classification task for predictive analysis which attempts to get collective score for recommendation of rice-paddy. This image classification network could be promising framework for detecting specific feature that differentiate image from each other. We classified our dataset using new convolutional neural network called as Pascal VOC[1]. The bounding box is a rectangle drawn on the image which tightly fits the object in the image. A bounding box exists for every instance of every object in the image. For the box, 4 numbers (center x, center y, width, height) are predicted. This can be trained using a distance measure between predicted and ground truth bounding box. 2. CLASSIFICATION AND REGRESSION The bounding box is predicted using regression and the class within the bounding box is predicted using classification. The overview of the architecture is shown in the following figure. Fig -1: Architecture 3. METHOD We have created our own dataset depending upon the literature survey. We gathered thousand of images for each classifier i.e. each object label. After creating dataset we have labeled our dataset using online tools for labelling an images. After labelling[5] an images, we have converted it into csv format because of tensorflow[3] requirements. CSV format is converted into tfrecord format(which is actual for training the dataset which includes feature points). Tfrecord[5] file are divided into two files as train.record and test.record. Train.record is a file which goes into tensorflow training purpose and test.record is required for evaluation purpose. After the completion of training, protocol buffer file is created by generating inference graph using python. This graph file can be implemented on android as well as web framework to design user interface where a camera is used to detect the object from trained tensorflow model. 4. APPROACH The network used in this project is based on Single shot detection (SSD).The SSD normally starts with a VGG [6] model, which is converted to a fully convolutional network. Then we attach some extra convolutional layers, that help to handle bigger objects. The output at the VGG network is a 38x38 feature map (conv4 3). The added layers produce 19x19, 10x10, 5x5, 3x3, 1x1 feature maps. All these feature maps are used for predicting bounding
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5371 boxes at various scales (later layers responsible for larger objects) as shown in following figure. Fig -2: SSD Architecture 5. ALGORITHM AND IMAGE ANNOTATION The PASCAL VOC[1] (pattern analysis, statistical modelling and computational learning visual object classes) provides standardized image data sets for object class recognition and provides a common set of tools for accessing the data sets and annotations. Our PASCAL VOC dataset includes 3 classes and has a challenge based on this dataset. The PASCAL VOC dataset is of good quality and well-marked, and enables evaluation and comparison of different methods. And because the amount of data of the PASCAL VOC dataset is small, compared to the imagenet dataset, very suitable for researchers to test network programs. Our dataset is also created based on the PASCAL VOC[1] dataset standard as shown in following figure. Fig -3: Image Annotation Faster-RCNN is one of the most well known object detection neural networks. It is also the basis for many derived networks for segmentation, 3D object detection, fusion of LIDAR point cloud with image, etc. An intuitive deep understanding of how Faster-RCNN works can be very useful[2]. The speed for Fast R-CNN training stage is 9 times faster and the speed for test is 213 times faster. The speed for Fast R-CNN training stage is 3 times faster than SPP- net and the speed for test is 10 times faster, the accuracy rate also have a certain increase Fig -4: Faster RCNN 6. RESULT AND DISCUSSION After training the images, the number and quality of the dataset will affect the accuracy of the neural network output, and the choice of neural network or the network architecture[2] will also affect the accuracy. Deep learning approaches[4] are increasing in their popularity every day. Deep learning provides fast and effective solutions especially in the analysis of big data. Fig -4: Tensorboard In this study, a classification task was carried out on the custom data set which we used in deep learning applications. Tensorflow was used for this purpose. Fig -5: Results
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5372 Rice mill factories can use this system to check their quality rice product. 7. CONCLUSION An accurate and efficient object detection system has been developed which achieves comparable metrics with the existing state-of-the-art system. This project uses recent techniques in the field of computer vision and deep learning to detect Rice-paddy for industrial purpose. Custom dataset was created and the evaluation was consistent. This can be used in real-time applications which require object detection for pre-processing in their pipeline. An important scope would be to train the system on a video sequence for usage in tracking applications. Addition of a temporally consistent network would enable smooth detection and more optimal than per-frame detection. REFERENCES [1] M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman. The PASCAL Visual Object Classes (VOC) Challenge. IJCV, 2010. [2] J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural Networks, vol. 61, pp. 85–117, Jan. 2015. [3] R. Salakhutdinov and G. . Hinton, “Replicated softmax: An undirected topic model,” Adv. Neural Inf. Process. Syst. 22 - Proc. 2009 Conf., pp. 1607–1614, 2009. [4] M. Abadi et al., “TensorFlow: A System for Large-Scale Machine Learning TensorFlow: A system for large-scale machine learning,” in 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16), 2016, pp. 265–284. [5] Tensorflow Framework www.tensorflow.org [6] R. Girshick. Fast R-CNN. arXiv:1504.08083, 2015. [7] Daniel Stange, Introduction to train.record and test.record, Medium blogs. [8] Project URL https://github.com/aeshaganatra/RiceTensorflow
Download now