This document presents a sign language detection system using action recognition. It aims to enhance current systems' performance in terms of response time and accuracy. The proposed system uses machine learning algorithms like LSTM neural networks trained on data sets to classify sign language gestures in real-time video. It segments hand regions, extracts features, and recognizes signs with 98% accuracy for 26 gestures. The system is intended to help deaf individuals communicate through translating signs to text in real-world applications.
This document provides an introduction to cloud computing, including definitions and types of cloud services. It discusses cloud computing in education and Malaysia. Cloud computing refers to software and hardware managed remotely by third parties and accessed over the internet. There are three main types of cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Common cloud computing examples include Dropbox, Microsoft SkyDrive, Google Drive, and Apple iCloud. The document also discusses how cloud computing can benefit education through e-learning and how initiatives in Malaysia like the Shared Cloud Enterprise Services project aim to accelerate cloud adoption.
Chapter 01: A brief introduction to cloud computingSsendiSamuel
IT is a fast-changing industry. Cloud computing has been developing rapidly in recent years and has become the foundation of a wide range of major applications. So, what is cloud computing? How has it evolved to what it is today? This chapter will offer you a brief introduction to the history and present of cloud computing.
What is cloud computing?
Advantages of cloud computing.
Disadvantages of cloud computing.
Mainly Four Deployment Models.
What is private cloud?
DRAWBACK
Two models for cloud services can be delivered in a private cloud.
Cloud Computing Service Models.
The document proposes a CloudDrop technique for securely storing files in the cloud. It divides files into fragments that are duplicated across multiple cloud nodes. This makes it difficult for attackers to retrieve meaningful data even if one node is compromised, improving security. The method also considers factors like node selection and access time to enhance performance during file retrieval from the cloud.
In this talk, we will briefly review the current trend toward Edge Computing first. Then, characteristics and requirements for the Industrial Edge Computing will be addressed and discussed. Among them, Decentralized Fault-Resilient Architecture, Time-sensitive Operations, Data-centric Computation, Autonomous Systems and Flexibility are the most important ones. Some influential open-source projects for the industrial edge computing will also be introduced in this talk, including Cyclone DDS, ROS2, Autoware and zenoh.
An i5 processor has either 2 or 4 cores, depending on the model. It provides the ability to perform multitasking by running two processor cores simultaneously. The turbo boost technology allows the i5 processor to increase its processing speed to handle intensive applications more efficiently. Compared to the i3 processor, the i5 has a higher clock speed and larger cache size, making it better suited for running more demanding tasks.
Hyper-Threading Technology allows two logical processors to simultaneously share one physical processor's execution resources. It appears to the operating system as two processors. While the die size increase is small, adding Hyper-Threading Technology presented large complexity challenges. Different microarchitecture components use different resource sharing approaches, such as partitioning resources between logical processors, using thresholds to limit maximum usage, or fully sharing caches between logical processors. Performance tests showed good gains from Hyper-Threading Technology, especially when running dissimilar applications simultaneously.
This document provides an introduction to cloud computing, including definitions and types of cloud services. It discusses cloud computing in education and Malaysia. Cloud computing refers to software and hardware managed remotely by third parties and accessed over the internet. There are three main types of cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Common cloud computing examples include Dropbox, Microsoft SkyDrive, Google Drive, and Apple iCloud. The document also discusses how cloud computing can benefit education through e-learning and how initiatives in Malaysia like the Shared Cloud Enterprise Services project aim to accelerate cloud adoption.
Chapter 01: A brief introduction to cloud computingSsendiSamuel
IT is a fast-changing industry. Cloud computing has been developing rapidly in recent years and has become the foundation of a wide range of major applications. So, what is cloud computing? How has it evolved to what it is today? This chapter will offer you a brief introduction to the history and present of cloud computing.
What is cloud computing?
Advantages of cloud computing.
Disadvantages of cloud computing.
Mainly Four Deployment Models.
What is private cloud?
DRAWBACK
Two models for cloud services can be delivered in a private cloud.
Cloud Computing Service Models.
The document proposes a CloudDrop technique for securely storing files in the cloud. It divides files into fragments that are duplicated across multiple cloud nodes. This makes it difficult for attackers to retrieve meaningful data even if one node is compromised, improving security. The method also considers factors like node selection and access time to enhance performance during file retrieval from the cloud.
In this talk, we will briefly review the current trend toward Edge Computing first. Then, characteristics and requirements for the Industrial Edge Computing will be addressed and discussed. Among them, Decentralized Fault-Resilient Architecture, Time-sensitive Operations, Data-centric Computation, Autonomous Systems and Flexibility are the most important ones. Some influential open-source projects for the industrial edge computing will also be introduced in this talk, including Cyclone DDS, ROS2, Autoware and zenoh.
An i5 processor has either 2 or 4 cores, depending on the model. It provides the ability to perform multitasking by running two processor cores simultaneously. The turbo boost technology allows the i5 processor to increase its processing speed to handle intensive applications more efficiently. Compared to the i3 processor, the i5 has a higher clock speed and larger cache size, making it better suited for running more demanding tasks.
Hyper-Threading Technology allows two logical processors to simultaneously share one physical processor's execution resources. It appears to the operating system as two processors. While the die size increase is small, adding Hyper-Threading Technology presented large complexity challenges. Different microarchitecture components use different resource sharing approaches, such as partitioning resources between logical processors, using thresholds to limit maximum usage, or fully sharing caches between logical processors. Performance tests showed good gains from Hyper-Threading Technology, especially when running dissimilar applications simultaneously.
The document provides information about various cloud computing services including Microsoft Azure, Apple iCloud, Google Drive, and Amazon Web Services (AWS). It discusses what cloud computing is, the benefits of cloud computing, different types of cloud services and deployments. It then provides more detailed overviews of the features and pricing of Microsoft Azure, Apple iCloud, Google Drive, and AWS. It concludes with a price comparison chart of the storage costs for 1TB of storage on each platform and identifies AWS as the best choice based on price.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
The document discusses cloud computing from the perspectives of application developers, quality assurance teams, and enterprises. It provides rationales for why cloud computing can reduce capital expenditures and operational expenditures compared to maintaining their own on-premise hardware and software. The document also summarizes the NIST definition of cloud computing and describes its essential characteristics, service models, and deployment models.
This document discusses green cloud computing. It begins by defining cloud computing and green computing, noting that cloud computing requires large data centers that consume significant energy. It then discusses how green cloud computing aims to reduce this energy usage through techniques like server virtualization and energy-aware resource allocation. Specific strategies that cloud providers and data centers are taking to improve energy efficiency are also summarized, such as geographic placement of data centers and measures to optimize cooling.
This document discusses green cloud computing. It begins by defining green computing and cloud computing individually. Green computing aims to reduce power consumption and environmental impact of IT, while cloud computing involves virtualized and interconnected computers. Green cloud computing combines these concepts by making cloud infrastructure and operations more energy efficient. The document then covers benefits like reduced energy use, the role of dynamic provisioning and multi-tenancy in cloud enabling green computing, and a case study on a green cloud architecture and scheduling policies that can reduce carbon emissions by 20%.
Slides for a discussion about Cloud Computing organised by the Isle of Man Branch of the BCS in September 2012. These slides introduce Cloud Computing, delve into some detail on Mcirosoft Azue and Amazon Web Services and pose some questions as to suitability, consideration and risks to be discussed. This talk was presented by Arron Clague from Synapse Consulting and Owen Cutajar from Intelligence Ltd
The document discusses the Sky-X technology, which replaces TCP with the Xpress Transport Protocol (XTP) for satellite communication. The Sky-X gateway intercepts TCP connections and converts data to XTP for transmission over the satellite link, then back to TCP. This improves performance over satellite links by optimizing for high loss environments compared to TCP. The Sky-X system allows networks to take full advantage of satellite bandwidth and provides fast, reliable data transfer and multicast file transfers without requiring client/server modifications.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
The document discusses cloud computing, including that it allows multiple users to access data through a single server without separate licenses. It describes cloud infrastructure models like full virtualization and para-virtualization. The pros of cloud computing are applications can be accessed without installation, unlimited data storage, and access from anywhere, while cons include internet outages, site access issues, and lack of secrecy. Cloud service models like SaaS, PaaS, and IaaS are also outlined.
PowerPoint Presentation on the popular topic Multi Core Processors,History of multi core processors, comparison between single core and multi core processors, advantages and disadvantages of multi core processors.
Federated Learning: ML with Privacy on the Edge 11.15.18Cloudera, Inc.
Join Cloudera Fast Forward Labs Research Engineer, Mike Lee Williams, to hear about their latest research report and prototype on Federated Learning. Learn more about what it is, when it’s applicable, how it works, and the current landscape of tools and libraries.
Edge computing involves pushing applications, data, and computing to the edge of networks, near devices, sensors and users. It provides benefits like lower latency, bandwidth optimization, privacy, and handling lack of cloud connectivity. Various entities are working on edge computing - telecoms see opportunities in network infrastructure, cloud providers in content delivery and IoT, and appliance vendors provide on-premises solutions. Edge computing can support military, humanitarian, public safety, and other government missions through disconnected operations and resource-constrained environments. Challenges include hardware, privacy, security, resource allocation, and discovery.
This document provides an overview of processors, including their history, types, performance, need, memory types, market statistics, advantages, and disadvantages. It discusses Moore's Law and how the number of transistors in integrated circuits doubles every two years. It outlines the history of early microprocessors in the 1970s and introduces common processor types like single-core, multi-core, dual-core, and quad-core. The document also discusses how multi-core processors provide benefits like improved performance, economical efficiency, and parallel computing.
This document discusses cloud computing, defining it as storing and accessing data and programs over the Internet instead of a computer's hard drive. It describes the types of cloud computing including public, private, hybrid, and community clouds. The advantages of cloud computing are reduced costs, increased storage, flexibility, mobility, and automation. Potential applications include word processing, customized programs, and data storage. The document also outlines some disadvantages like being unable to access the cloud without an Internet connection.
A talk presented at IEEE ComSoc workshop on Evolution of Data-centers in the context of 5G.
Discuss about what is edge computing and management issues in Edge Computing
The document discusses green cloud computing and describes a technical seminar presented by S.Sai Madhuri. It defines cloud computing and discusses types including SaaS, PaaS, and IaaS. It then explains green computing and green cloud computing, describing the core components and architecture of data centers. The document outlines the objective of calculating energy consumption using a green cloud simulator in VMWare Player to analyze existing systems and develop more efficient solutions.
The document discusses cloud computing, including what it is, its history and benefits. It defines cloud as the delivery of computing services over the internet and discusses common cloud characteristics like on-demand self-service and rapid elasticity. It describes the different cloud models including infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). The document also provides an overview of Microsoft Azure, a flexible cloud platform, and concludes by noting that while cloud computing offers benefits, security remains a challenge that could slow adoption.
The document discusses the specifications and technologies of the Intel Core i5-3550S processor. It uses the Ivy Bridge microarchitecture with a 22nm process. It has 4 cores with 4 threads each, supports up to 32GB of RAM, and has cache memory including a shared 8MB L3 cache. It supports many Intel technologies like Turbo Boost, Hyper-Threading, Virtualization, and AES-NI.
This document describes a proposed sign language interpreter system that uses machine learning and computer vision techniques. It aims to enable deaf and mute users to communicate through computers and the internet by recognizing static hand gestures from camera input and translating them to text. The proposed system extracts features from captured images of signs and uses a support vector machine model to classify the gestures by comparing to a dataset of labeled images. If implemented, this system could help overcome communication barriers for deaf users in an increasingly digital world.
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLEIRJET Journal
The document describes a proposed sign language interface system for hearing impaired people. The system aims to use machine learning algorithms like convolutional neural networks to classify hand gestures captured by a webcam into corresponding letters or words. The system would preprocess the images, extract features, then use a trained CNN model to predict the sign and output it as text and speech for better understanding by users. The goal is to help bridge communication between deaf/mute and normal people without requiring specialized gloves or sensors.
The document provides information about various cloud computing services including Microsoft Azure, Apple iCloud, Google Drive, and Amazon Web Services (AWS). It discusses what cloud computing is, the benefits of cloud computing, different types of cloud services and deployments. It then provides more detailed overviews of the features and pricing of Microsoft Azure, Apple iCloud, Google Drive, and AWS. It concludes with a price comparison chart of the storage costs for 1TB of storage on each platform and identifies AWS as the best choice based on price.
Cloud computing is rapidly emerging due to the provisioning of elastic, flexible, and on demand storage and computing services for customers. The data is usually encrypted before storing to the cloud. The access control, key management, encryption, and decryption processes are handled by the customers to ensure data security. A single key shared between all group members will result in the access of past data to a newly joining member. The aforesaid situation violates the confidentiality and the principle of least privilege.
The document discusses cloud computing from the perspectives of application developers, quality assurance teams, and enterprises. It provides rationales for why cloud computing can reduce capital expenditures and operational expenditures compared to maintaining their own on-premise hardware and software. The document also summarizes the NIST definition of cloud computing and describes its essential characteristics, service models, and deployment models.
This document discusses green cloud computing. It begins by defining cloud computing and green computing, noting that cloud computing requires large data centers that consume significant energy. It then discusses how green cloud computing aims to reduce this energy usage through techniques like server virtualization and energy-aware resource allocation. Specific strategies that cloud providers and data centers are taking to improve energy efficiency are also summarized, such as geographic placement of data centers and measures to optimize cooling.
This document discusses green cloud computing. It begins by defining green computing and cloud computing individually. Green computing aims to reduce power consumption and environmental impact of IT, while cloud computing involves virtualized and interconnected computers. Green cloud computing combines these concepts by making cloud infrastructure and operations more energy efficient. The document then covers benefits like reduced energy use, the role of dynamic provisioning and multi-tenancy in cloud enabling green computing, and a case study on a green cloud architecture and scheduling policies that can reduce carbon emissions by 20%.
Slides for a discussion about Cloud Computing organised by the Isle of Man Branch of the BCS in September 2012. These slides introduce Cloud Computing, delve into some detail on Mcirosoft Azue and Amazon Web Services and pose some questions as to suitability, consideration and risks to be discussed. This talk was presented by Arron Clague from Synapse Consulting and Owen Cutajar from Intelligence Ltd
The document discusses the Sky-X technology, which replaces TCP with the Xpress Transport Protocol (XTP) for satellite communication. The Sky-X gateway intercepts TCP connections and converts data to XTP for transmission over the satellite link, then back to TCP. This improves performance over satellite links by optimizing for high loss environments compared to TCP. The Sky-X system allows networks to take full advantage of satellite bandwidth and provides fast, reliable data transfer and multicast file transfers without requiring client/server modifications.
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
The document discusses cloud computing, including that it allows multiple users to access data through a single server without separate licenses. It describes cloud infrastructure models like full virtualization and para-virtualization. The pros of cloud computing are applications can be accessed without installation, unlimited data storage, and access from anywhere, while cons include internet outages, site access issues, and lack of secrecy. Cloud service models like SaaS, PaaS, and IaaS are also outlined.
PowerPoint Presentation on the popular topic Multi Core Processors,History of multi core processors, comparison between single core and multi core processors, advantages and disadvantages of multi core processors.
Federated Learning: ML with Privacy on the Edge 11.15.18Cloudera, Inc.
Join Cloudera Fast Forward Labs Research Engineer, Mike Lee Williams, to hear about their latest research report and prototype on Federated Learning. Learn more about what it is, when it’s applicable, how it works, and the current landscape of tools and libraries.
Edge computing involves pushing applications, data, and computing to the edge of networks, near devices, sensors and users. It provides benefits like lower latency, bandwidth optimization, privacy, and handling lack of cloud connectivity. Various entities are working on edge computing - telecoms see opportunities in network infrastructure, cloud providers in content delivery and IoT, and appliance vendors provide on-premises solutions. Edge computing can support military, humanitarian, public safety, and other government missions through disconnected operations and resource-constrained environments. Challenges include hardware, privacy, security, resource allocation, and discovery.
This document provides an overview of processors, including their history, types, performance, need, memory types, market statistics, advantages, and disadvantages. It discusses Moore's Law and how the number of transistors in integrated circuits doubles every two years. It outlines the history of early microprocessors in the 1970s and introduces common processor types like single-core, multi-core, dual-core, and quad-core. The document also discusses how multi-core processors provide benefits like improved performance, economical efficiency, and parallel computing.
This document discusses cloud computing, defining it as storing and accessing data and programs over the Internet instead of a computer's hard drive. It describes the types of cloud computing including public, private, hybrid, and community clouds. The advantages of cloud computing are reduced costs, increased storage, flexibility, mobility, and automation. Potential applications include word processing, customized programs, and data storage. The document also outlines some disadvantages like being unable to access the cloud without an Internet connection.
A talk presented at IEEE ComSoc workshop on Evolution of Data-centers in the context of 5G.
Discuss about what is edge computing and management issues in Edge Computing
The document discusses green cloud computing and describes a technical seminar presented by S.Sai Madhuri. It defines cloud computing and discusses types including SaaS, PaaS, and IaaS. It then explains green computing and green cloud computing, describing the core components and architecture of data centers. The document outlines the objective of calculating energy consumption using a green cloud simulator in VMWare Player to analyze existing systems and develop more efficient solutions.
The document discusses cloud computing, including what it is, its history and benefits. It defines cloud as the delivery of computing services over the internet and discusses common cloud characteristics like on-demand self-service and rapid elasticity. It describes the different cloud models including infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). The document also provides an overview of Microsoft Azure, a flexible cloud platform, and concludes by noting that while cloud computing offers benefits, security remains a challenge that could slow adoption.
The document discusses the specifications and technologies of the Intel Core i5-3550S processor. It uses the Ivy Bridge microarchitecture with a 22nm process. It has 4 cores with 4 threads each, supports up to 32GB of RAM, and has cache memory including a shared 8MB L3 cache. It supports many Intel technologies like Turbo Boost, Hyper-Threading, Virtualization, and AES-NI.
This document describes a proposed sign language interpreter system that uses machine learning and computer vision techniques. It aims to enable deaf and mute users to communicate through computers and the internet by recognizing static hand gestures from camera input and translating them to text. The proposed system extracts features from captured images of signs and uses a support vector machine model to classify the gestures by comparing to a dataset of labeled images. If implemented, this system could help overcome communication barriers for deaf users in an increasingly digital world.
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLEIRJET Journal
The document describes a proposed sign language interface system for hearing impaired people. The system aims to use machine learning algorithms like convolutional neural networks to classify hand gestures captured by a webcam into corresponding letters or words. The system would preprocess the images, extract features, then use a trained CNN model to predict the sign and output it as text and speech for better understanding by users. The goal is to help bridge communication between deaf/mute and normal people without requiring specialized gloves or sensors.
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET Journal
This document presents a survey of previous research on vision-based hand gesture recognition. It discusses various methods that have been used, including discrete wavelet transforms, skin color segmentation, orientation histograms, and neural networks. The document proposes a new methodology using webcam image capture, static and dynamic gesture definition, image processing techniques like localization, enhancement, segmentation, and morphological filtering, and a convolutional neural network for classification. The goal is to develop a more efficient and accurate system for hand gesture recognition and human-computer interaction.
Sign Language Identification based on Hand GesturesIRJET Journal
This document presents a study on sign language identification based on hand gestures. The researchers aim to develop a system that can recognize American Sign Language gestures from video sequences. They use two different models - a Convolutional Neural Network (CNN) to analyze the spatial features of video frames, and a Recurrent Neural Network (RNN) to analyze the temporal features across frames. The document discusses the methodology used, including data collection from videos, pre-processing of frames, feature extraction using CNN models, and gesture classification. It also provides a literature review on previous studies related to sign language recognition and communication systems for deaf people.
IRJET - Hand Gestures Recognition using Deep LearningIRJET Journal
This document discusses a proposed system to allow deaf or mute individuals to use voice-controlled digital assistants through hand gesture recognition. The system would use deep learning models to recognize hand gestures in real-time and convert them to text to query an assistant, and then convert the assistant's audio response to text for the user to read. This approach aims to provide an accessible alternative to audio-based assistants for those unable to use voice commands. The proposed system is designed to accurately recognize a series of gestures in real-time without requiring the user to wear any hardware.
Design of a Communication System using Sign Language aid for Differently Able...IRJET Journal
This document describes a proposed system to design a communication system using sign language to aid differently abled people. The system aims to use image processing and artificial intelligence techniques to recognize characters in sign language from video input and convert them to text and speech output. It discusses technologies like blob detection, skin color recognition and template matching that would be used for sign recognition. The system is intended to help deaf and mute people communicate by translating their sign language to a format understandable by others.
Sign Language Recognition using MediapipeIRJET Journal
This document summarizes a student research project that aims to develop a sign language recognition system using the Mediapipe framework. The system takes video input of signed letters from the American Sign Language alphabet and outputs the recognized letters in text format. The document provides background on sign language and gesture recognition, describes the Mediapipe framework and implementation methodology using KNN classification, and presents preliminary results of the system detecting hand positions and recognizing letters in real-time. The overall goal is to reduce communication barriers for deaf individuals by translating sign language to written text.
Sign Language Recognition using Machine LearningIRJET Journal
This document describes a study on sign language recognition using machine learning. The researchers developed a convolutional neural network model to detect hand movements and classify them as letters of the alphabet from sign language. They used a dataset of images of American Sign Language letters and trained their CNN model on this data. Their model was able to accurately recognize the letters in real-time using input from a webcam. The document also discusses using background subtraction and other techniques to improve the model's performance at sign language recognition.
The document describes a hand gesture recognition system for deaf persons to communicate their thoughts to others. It aims to bridge the communication gap between deaf-mute people and the general public by converting gestures captured in real-time via camera, which are trained using a convolutional neural network (CNN), into text output. The system allows deaf-mute users to interact with computer applications using gestures detected by their webcam without needing to install additional applications. It discusses the background and relevance of the project, as well as objectives like designing the gesture training, extracting features from images, and recognizing gestures to translate them to text.
The document describes a hand gesture recognition system for deaf persons to communicate their thoughts to others. It aims to bridge the communication gap between deaf-mute people and the general public by converting gestures captured in real-time via camera, which are trained using a convolutional neural network (CNN), into text output. The system allows deaf-mute users to interact with computer applications using gestures detected by their webcam without needing to install additional applications. It discusses the background and relevance of the project, as well as objectives like designing the gesture training, extracting features from images, and recognizing gestures to translate them to text.
IRJET - Chatbot with Gesture based User InputIRJET Journal
The document describes a proposed system for building a chatbot that takes gesture-based user input. The system would use either a deep learning model or convexity defect algorithm to recognize gestures from video input. Recognized gestures would be mapped to text commands and fed into a keyword-based chatbot. The chatbot would execute commands or responses based on the gesture input. The proposed system aims to provide a natural interface for applications helping deaf/mute users or in places like museums. It reviews related work on gesture recognition and discusses the technical components and workflow of the envisioned chatbot system.
IRJET - Mutecom using Tensorflow-Keras ModelIRJET Journal
This document describes a system called MuteCom that uses machine learning and computer vision to enable communication between deaf or mute people and people who do not understand sign language. The system takes hand gestures as input from a webcam and uses a TensorFlow-Keras model trained on American Sign Language databases to recognize the gestures and output the predicted meaning in text and/or speech. The goal is to bridge the communication gap by allowing deaf/mute people to express themselves easily to others through a mobile application that recognizes their hand signs.
IRJET- Sign Language Interpreter using Image Processing and Machine LearningIRJET Journal
This document describes a system to translate sign language gestures to text or audio using image processing and machine learning techniques. The system takes an image of a sign language gesture as input using a webcam. It then performs preprocessing steps like skin detection and edge detection. Features are extracted from the preprocessed image using a Histogram of Oriented Gradients algorithm. These features are fed into a Support Vector Machine classifier that has been trained on a dataset of 6000 images of English alphabet signs. The system is able to recognize the signs with 88% accuracy and translate them to text or audio output, aiding communication for deaf individuals.
The document describes a project to develop a real-time sign language detection system using computer vision and deep learning techniques. The researchers collected over 500 images of 5 different signs and trained a convolutional neural network model using transfer learning with a pre-trained SSD MobileNet V2 model. The model takes input from a webcam video stream and classifies each frame in real-time to detect the sign language. Some key applications of this system include improving communication for deaf individuals and teaching sign language. The researchers achieved reliable detection results under controlled lighting conditions and aim to expand the dataset and model capabilities in future work.
Hand Gesture Recognition System Using Holistic MediapipeIRJET Journal
This document summarizes a research paper on developing a hand gesture recognition system using the Holistic Mediapipe framework. The system aims to recognize Indian sign language gestures in real-time using pose estimation and LSTM neural networks. It extracts 3D keypoints of the hands using Mediapipe and feeds this input into an LSTM model for classification. The system was able to achieve higher accuracy compared to models using only CNN layers, and was also faster to train due to using fewer parameters. Limitations of current pose estimation approaches for sign language recognition are also discussed.
IRJET- ASL Language Translation using MLIRJET Journal
This document presents a survey of technologies for hand sign language recognition and translation to text using machine learning. It discusses using CNN models to identify hand gestures in real-time from video input and translate the gestures to words rather than individual letters for better communication between deaf and hearing people. The system architecture involves hand detection, gesture recognition using a CNN model, and a login system for users. Previous approaches discussed include using sequential pattern mining and hidden Markov models on extracted motion features from video frames. The goal is to build an effective communication medium between deaf and hearing individuals.
IRJET- Vision Based Sign Language by using MatlabIRJET Journal
This document discusses vision-based sign language translation using MATLAB. It describes a system that uses a camera to capture images of hand gestures representing letters or words in sign language. MATLAB is used to analyze the images, recognize the gestures, and translate them into spoken words that are output through a speaker. The system aims to help deaf, mute, and blind individuals communicate more easily. Several image processing and machine learning techniques for hand segmentation, feature extraction, and classification are reviewed from previous studies. The results suggest this type of system could accurately translate sign language in real-time.
HAND GESTURE BASED SPEAKING SYSTEM FOR THE MUTE PEOPLEIRJET Journal
1) The document describes a hand gesture-based speaking system to help mute people communicate through converting hand gestures to audio messages.
2) The system uses flex sensors to detect finger movements and a Raspberry Pi microcontroller to identify predefined gestures and convert them to speech using text-to-speech.
3) The flex sensors are attached to gloves to allow mute users to easily convey common messages through natural hand gestures that are translated to audio by the system.
IRJET - Sign Language Text to Speech Converter using Image Processing and...IRJET Journal
This document describes a sign language text-to-speech converter system using image processing and convolutional neural networks (CNNs). The system captures images of hand gestures using a camera, applies image processing techniques like thresholding and blurring, and then uses a CNN model trained on a dataset of gestures to recognize the gestures and convert them to text and speech. The system was able to accurately recognize gestures for letters and numbers with about 85% accuracy. Future work may involve expanding the dataset to include more signs and working towards word and sentence recognition.
IRJET- Review on Text Recognization of Product for Blind Person using MATLABIRJET Journal
This document summarizes a research paper that proposes a system to help blind people read text on product labels and documents using a camera and MATLAB software. The system uses image processing techniques like converting images to grayscale, binarization, and filtering to isolate text from complex backgrounds. It then applies optical character recognition to identify the text and provide information to blind users. The proposed system aims to address limitations of prior methods that struggled with non-horizontal text, complex backgrounds, and positioning objects in the camera view. It extracts a region of interest around a product using motion detection and recognizes text regardless of orientation.
Similar to Sign Language Detection using Action Recognition (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.