This document discusses human action recognition from images and videos. It proposes using web-based classifiers to incrementally collect action images without human labeling. These images are used to build action models in an unsupervised manner and annotate human actions in videos. The key contributions are proposing a system to collect action images from the web using text queries, building action models from these images, and using the models to annotate actions in uncontrolled videos like YouTube videos.
This document discusses feature selection for intrusion detection systems. It analyzes the KDD 99 intrusion detection dataset and selects features relevant for detecting specific attacks. It performs experiments with manual feature selection, automatic feature selection, and no feature selection. For detecting Remote to Local (R2L) attacks, it selects 15 features from the KDD 99 dataset. It uses a random forest classifier on the reduced feature sets. The results show that manual feature selection achieves the highest detection rates for most attacks compared to automatic feature selection and using all features. In particular, it achieves rates of 73.33% for FTP write attacks and 99.96% for guess password attacks.
Este estudio comparó las características morfológicas del pie entre deportistas que practican descalzos y con calzado. No se encontraron diferencias significativas entre los grupos, posiblemente debido al poco tiempo de práctica descalza. Sin embargo, los deportistas descalzos tenían una distribución más alta de pies normales y baja de pies cavos, y menos asimetría, lo que podría indicar beneficios de practicar descalzo. Se necesita más investigación longitudinal con sujetos que practiquen descalzos a diario para identificar adapt
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication at the user end and Rijndael encryption algorithm to encrypt user data before it is sent to the cloud. The encryption ensures security of data at rest and in transit, while EAP-CHAP handles authentication of users with the cloud service provider. Pseudocode for the Rijndael encryption/decryption process is also provided.
1) A PID controller was designed using ISE, IAE, ITAE and MSE error criteria for a stable linear time invariant continuous system. A bacterial foraging particle swarm optimization (BF-PSO) technique was used to tune the PID controller gains (Kp, Ki, Kd) to meet performance specifications.
2) The PID controller was applied to the system using each error criteria and the closed-loop responses were observed and compared. For the IAE criteria, the system had 0% overshoot and undershoot with a settling time of 7.2172e-006 seconds and rise time of 4.0551e-006 seconds.
3) The BF-PSO algorithm combines
This document discusses human action recognition from images and videos. It proposes using web-based classifiers to incrementally collect action images without human labeling. These images are used to build action models in an unsupervised manner and annotate human actions in videos. The key contributions are proposing a system to collect action images from the web using text queries, building action models from these images, and using the models to annotate actions in uncontrolled videos like YouTube videos.
This document discusses feature selection for intrusion detection systems. It analyzes the KDD 99 intrusion detection dataset and selects features relevant for detecting specific attacks. It performs experiments with manual feature selection, automatic feature selection, and no feature selection. For detecting Remote to Local (R2L) attacks, it selects 15 features from the KDD 99 dataset. It uses a random forest classifier on the reduced feature sets. The results show that manual feature selection achieves the highest detection rates for most attacks compared to automatic feature selection and using all features. In particular, it achieves rates of 73.33% for FTP write attacks and 99.96% for guess password attacks.
Este estudio comparó las características morfológicas del pie entre deportistas que practican descalzos y con calzado. No se encontraron diferencias significativas entre los grupos, posiblemente debido al poco tiempo de práctica descalza. Sin embargo, los deportistas descalzos tenían una distribución más alta de pies normales y baja de pies cavos, y menos asimetría, lo que podría indicar beneficios de practicar descalzo. Se necesita más investigación longitudinal con sujetos que practiquen descalzos a diario para identificar adapt
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication at the user end and Rijndael encryption algorithm to encrypt user data before it is sent to the cloud. The encryption ensures security of data at rest and in transit, while EAP-CHAP handles authentication of users with the cloud service provider. Pseudocode for the Rijndael encryption/decryption process is also provided.
1) A PID controller was designed using ISE, IAE, ITAE and MSE error criteria for a stable linear time invariant continuous system. A bacterial foraging particle swarm optimization (BF-PSO) technique was used to tune the PID controller gains (Kp, Ki, Kd) to meet performance specifications.
2) The PID controller was applied to the system using each error criteria and the closed-loop responses were observed and compared. For the IAE criteria, the system had 0% overshoot and undershoot with a settling time of 7.2172e-006 seconds and rise time of 4.0551e-006 seconds.
3) The BF-PSO algorithm combines
The document provides a daily newsletter on MCX commodity futures markets. It summarizes trends in silver, crude oil, and copper futures, advising traders that the trends look bullish and to use buy on dips strategies. For silver, strong support is at Rs. 45,000 and resistance at Rs. 52,000. For crude oil, traders are advised to wait for weekly inventory data before trading. Copper futures are expected to trade between Rs. 445-455 for the week.
This document discusses fuzzy queries in relational database management systems (RDBMS). It introduces fuzzy RDBMS (FRDBMS), which allows imprecise queries using fuzzy logic and natural language. Fuzzy queries are more expressive than traditional SQL queries as they can represent human language and return graded results. The document presents an example student database and compares a traditional SQL query to a fuzzy query. It shows that fuzzy queries using membership functions can return student records and their degree of membership to linguistic terms like "poor performer", providing a more flexible way to query databases.
This document discusses research issues related to Mobile Ad Hoc Networks (MANETs). It covers topics such as data communication methods in MANETs including data push, pull, and peer-to-peer; security challenges in MANETs including types of attacks; and intrusion detection systems for MANETs including architectures and detecting routing anomalies. The document provides background on MANET architectures and characteristics to provide context.
This document describes the construction and selection of single sampling quick switching variables systems for given control limits that involve minimum sum of risks. It provides the procedure for finding the single sampling quick switching variables system that has the minimum sum of producer's and consumer's risk for a specified acceptable quality level and limiting quality level. A table is constructed that can be used to select a quick switching variables sampling system for given values of AQL and LQL that has the minimum sum of risks. The document also discusses how to design a quick switching variables sampling system with an unknown standard deviation that involves minimum sum of risks.
This document summarizes and reviews various techniques for optical character recognition (OCR) of English text, including matrix matching, fuzzy logic, feature extraction, structural analysis, and neural networks. It discusses the structure and stages of OCR systems, including image preprocessing, segmentation, feature extraction, classification, and output. Challenges for OCR systems include degraded documents like old books, photocopies, and newspapers. The document reviews several related works on OCR and discusses techniques to improve recognition of degraded text.
This document proposes a weight rotation technique to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. The technique is based on selected mapping (SLM) but has lower complexity by reducing the number of inverse fast Fourier transform (IFFT) operations. It works by rotating the phase sequence if the PAPR exceeds a threshold, until the threshold is met. Simulation results show it achieves similar PAPR reduction as SLM but with far fewer IFFT operations, resulting in significantly lower complexity.
1) The document describes a proposed intelligent system for monitoring and controlling water quality in natural bodies of water using wireless sensor networks and unmanned autonomous vehicles.
2) The system would use sensors to monitor water quality parameters, centralized monitoring to process the data and detect pollution, and controlled UAVs to locate and remove pollution sources.
3) The document discusses two key technical challenges - sensor selection to maximize sensor network lifetime and controlling UAVs over unreliable wireless networks. It proposes algorithms adapted from literature to address these challenges.
The document provides a daily newsletter on MCX commodity futures markets. It summarizes trends in silver, crude oil, and copper futures, advising traders that the trends look bullish and to use buy on dips strategies. For silver, strong support is at Rs. 45,000 and resistance at Rs. 52,000. For crude oil, traders are advised to wait for weekly inventory data before trading. Copper futures are expected to trade between Rs. 445-455 for the week.
This document discusses fuzzy queries in relational database management systems (RDBMS). It introduces fuzzy RDBMS (FRDBMS), which allows imprecise queries using fuzzy logic and natural language. Fuzzy queries are more expressive than traditional SQL queries as they can represent human language and return graded results. The document presents an example student database and compares a traditional SQL query to a fuzzy query. It shows that fuzzy queries using membership functions can return student records and their degree of membership to linguistic terms like "poor performer", providing a more flexible way to query databases.
This document discusses research issues related to Mobile Ad Hoc Networks (MANETs). It covers topics such as data communication methods in MANETs including data push, pull, and peer-to-peer; security challenges in MANETs including types of attacks; and intrusion detection systems for MANETs including architectures and detecting routing anomalies. The document provides background on MANET architectures and characteristics to provide context.
This document describes the construction and selection of single sampling quick switching variables systems for given control limits that involve minimum sum of risks. It provides the procedure for finding the single sampling quick switching variables system that has the minimum sum of producer's and consumer's risk for a specified acceptable quality level and limiting quality level. A table is constructed that can be used to select a quick switching variables sampling system for given values of AQL and LQL that has the minimum sum of risks. The document also discusses how to design a quick switching variables sampling system with an unknown standard deviation that involves minimum sum of risks.
This document summarizes and reviews various techniques for optical character recognition (OCR) of English text, including matrix matching, fuzzy logic, feature extraction, structural analysis, and neural networks. It discusses the structure and stages of OCR systems, including image preprocessing, segmentation, feature extraction, classification, and output. Challenges for OCR systems include degraded documents like old books, photocopies, and newspapers. The document reviews several related works on OCR and discusses techniques to improve recognition of degraded text.
This document proposes a weight rotation technique to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. The technique is based on selected mapping (SLM) but has lower complexity by reducing the number of inverse fast Fourier transform (IFFT) operations. It works by rotating the phase sequence if the PAPR exceeds a threshold, until the threshold is met. Simulation results show it achieves similar PAPR reduction as SLM but with far fewer IFFT operations, resulting in significantly lower complexity.
1) The document describes a proposed intelligent system for monitoring and controlling water quality in natural bodies of water using wireless sensor networks and unmanned autonomous vehicles.
2) The system would use sensors to monitor water quality parameters, centralized monitoring to process the data and detect pollution, and controlled UAVs to locate and remove pollution sources.
3) The document discusses two key technical challenges - sensor selection to maximize sensor network lifetime and controlling UAVs over unreliable wireless networks. It proposes algorithms adapted from literature to address these challenges.