This document provides a literature review of various techniques for automatic facial expression recognition. It discusses approaches such as principal component analysis (PCA), linear discriminant analysis (LDA), independent component analysis (ICA), 2D PCA, global eigen approaches using color images, subpattern extended 2D PCA, multilinear image analysis, color subspace LDA, 2D Gabor filter banks, and local Gabor binary patterns. It provides a table comparing the performance and disadvantages of these different methods. Recently, tensor perceptual color frameworks have been introduced that apply tensor concepts and perceptual color spaces to improve recognition performance under varying illumination conditions.
Our visit to the local mall showed us how three stores - "Real", "Edeka", and "Subway" - manage their waste. "Real", the largest supermarket, produces over 2.5 tons of fruit and vegetable waste per week which is donated to food banks. Both "Edeka" and "Subway" also donate unsold food items. We also learned about waste management at our school and visited IAG, one of the largest toxic waste disposal sites in Europe, to learn about their chemical treatment and disposal processes.
This document evaluates the performance of different content management systems (CMS). It discusses how CMS have evolved from basic HTML authoring tools to provide more dynamic websites. The document analyzes several open source CMS, including Joomla, in terms of usability, return on investment, and factors for choosing a CMS. It finds that Joomla has the highest user frequency and that contents and audience determine the best CMS choice. ROI can be measured both tangibly and intangibly for all CMS.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
This document discusses reducing false positives and false negatives in intrusion detection for zigbee wireless networks. It proposes a new approach called service-oriented traffic classification (SOTC) that uses information about previously discovered network services to classify traffic flows. The key advantages of SOTC are robustness, accuracy, and low computational requirements compared to traditional port-based and payload-based classification methods. The document provides background on related work, describes how SOTC works, and discusses some implementation considerations to make it effective in practice.
The document outlines plans for an "MGoPro Combine" event modeled after the NFL Combine that would include physical and skills tests conducted by Kinesiology students to promote the school of Kinesiology. The event is aimed at health-conscious students and sports fans and would have a charitable component with proceeds going to Mott Children's Hospital. Survey data was collected from students to assess interest in different aspects of the proposed event.
This document provides information about working in healthcare markets overseas, including:
1. It lists mature markets like Australia, New Zealand, Canada, the UK, and Europe and high growth markets like the Middle East and Far East.
2. It compares mature and developing markets, noting factors like advanced healthcare systems vs. lack of trained staff in developing markets.
3. It focuses on the growing Middle East healthcare sector, with the Saudi market projected to reach $27 billion by 2020 due to factors like population growth and lifestyle diseases.
A framework for an Operating System-based Mobile Agent InteroperabilityIOSR Journals
This document proposes a framework for mobile agent interoperability by embedding a static agent into the Windows operating system kernel as a service. This eliminates the need for separate mobile agent platforms, which are typically non-interoperable. The embedded agent would receive incoming mobile agents, provide an execution environment, and allow agents to complete tasks and migrate between hosts. The goal is to provide a common platform where agents from different vendors can execute and interact without additional overhead from separate agent platforms. Currently, the framework has been implemented on Windows XP, Vista and 7, and future work involves implementing it on other operating systems and enabling interoperability between agents from different vendors and platforms.
This document provides a literature review of various techniques for automatic facial expression recognition. It discusses approaches such as principal component analysis (PCA), linear discriminant analysis (LDA), independent component analysis (ICA), 2D PCA, global eigen approaches using color images, subpattern extended 2D PCA, multilinear image analysis, color subspace LDA, 2D Gabor filter banks, and local Gabor binary patterns. It provides a table comparing the performance and disadvantages of these different methods. Recently, tensor perceptual color frameworks have been introduced that apply tensor concepts and perceptual color spaces to improve recognition performance under varying illumination conditions.
Our visit to the local mall showed us how three stores - "Real", "Edeka", and "Subway" - manage their waste. "Real", the largest supermarket, produces over 2.5 tons of fruit and vegetable waste per week which is donated to food banks. Both "Edeka" and "Subway" also donate unsold food items. We also learned about waste management at our school and visited IAG, one of the largest toxic waste disposal sites in Europe, to learn about their chemical treatment and disposal processes.
This document evaluates the performance of different content management systems (CMS). It discusses how CMS have evolved from basic HTML authoring tools to provide more dynamic websites. The document analyzes several open source CMS, including Joomla, in terms of usability, return on investment, and factors for choosing a CMS. It finds that Joomla has the highest user frequency and that contents and audience determine the best CMS choice. ROI can be measured both tangibly and intangibly for all CMS.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
This document discusses reducing false positives and false negatives in intrusion detection for zigbee wireless networks. It proposes a new approach called service-oriented traffic classification (SOTC) that uses information about previously discovered network services to classify traffic flows. The key advantages of SOTC are robustness, accuracy, and low computational requirements compared to traditional port-based and payload-based classification methods. The document provides background on related work, describes how SOTC works, and discusses some implementation considerations to make it effective in practice.
The document outlines plans for an "MGoPro Combine" event modeled after the NFL Combine that would include physical and skills tests conducted by Kinesiology students to promote the school of Kinesiology. The event is aimed at health-conscious students and sports fans and would have a charitable component with proceeds going to Mott Children's Hospital. Survey data was collected from students to assess interest in different aspects of the proposed event.
This document provides information about working in healthcare markets overseas, including:
1. It lists mature markets like Australia, New Zealand, Canada, the UK, and Europe and high growth markets like the Middle East and Far East.
2. It compares mature and developing markets, noting factors like advanced healthcare systems vs. lack of trained staff in developing markets.
3. It focuses on the growing Middle East healthcare sector, with the Saudi market projected to reach $27 billion by 2020 due to factors like population growth and lifestyle diseases.
A framework for an Operating System-based Mobile Agent InteroperabilityIOSR Journals
This document proposes a framework for mobile agent interoperability by embedding a static agent into the Windows operating system kernel as a service. This eliminates the need for separate mobile agent platforms, which are typically non-interoperable. The embedded agent would receive incoming mobile agents, provide an execution environment, and allow agents to complete tasks and migrate between hosts. The goal is to provide a common platform where agents from different vendors can execute and interact without additional overhead from separate agent platforms. Currently, the framework has been implemented on Windows XP, Vista and 7, and future work involves implementing it on other operating systems and enabling interoperability between agents from different vendors and platforms.
Transmission Loss Minimization Using Optimization Technique Based On PsoIOSR Journals
This document discusses using particle swarm optimization (PSO) to minimize transmission losses in power systems. PSO is applied to solve the optimal power flow problem, with the objective of minimizing transmission losses. The optimal power flow problem is formulated as a nonlinear optimization problem with an objective function to minimize losses and constraints related to generator output, voltage levels, reactive power injection and transformer taps. PSO is used to search the solution space and iteratively update the particle positions and velocities to find the optimal solution that minimizes losses while satisfying all constraints. The method is tested on the IEEE 30-bus system to demonstrate minimizing transmission losses through optimal settings of control variables.
This document discusses a method for identifying thematic objects in videos. The method first extracts local feature points from each video frame using Harris corner detection. Descriptors are extracted around each corner point. The descriptors of a reference image are compared to the descriptors of video frames to find similarity and identify frames containing the same object. Identifying frequently appearing objects in this way helps with tasks like object search, tagging, and video summarization. The approach is able to identify objects even when there is partial occlusion or viewpoint variation between frames.
This document proposes a scheme for public verifiability in cloud computing using signcryption based on elliptic curves. The key components of the proposed system include users, a cloud service provider, an authentication server, and a certificate authority. The scheme relies on erasure-correcting codes to distribute and redundantly store user data across multiple cloud servers. It uses signcryption/unsigncryption based on elliptic curves to generate verification tokens for the stored data and enable public verifiability, allowing an authentication server to verify the integrity and accuracy of user data on cloud servers without involving the user. The scheme aims to simultaneously detect any data errors and identify the misbehaving servers upon verification.
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...IOSR Journals
This document proposes a novel methodology to detect tampering and forgery in images submitted for authenticity verification in security systems. The method reconstructs the test image from its gradients by solving a Poisson equation, forming a model. It then compares the original and reconstructed images using absolute difference and histogram matching to determine if tampering occurred. Experimental results demonstrate the technique can accurately verify authentic versus forged images, securing information and detecting fraud. The gradient-based reconstruction approach is a unique mechanism for digital image forensics and authenticity verification in security systems.
Diabetes is a disease caused by inadequate production of insulin. Insulin shock results from too much insulin causing low blood sugar, while diabetic coma results from not enough insulin causing high blood sugar. The goal in managing diabetes is to maintain target blood glucose levels. Signs of insulin shock include rapid pulse and confusion, while signs of diabetic coma include rapid breathing and dehydrated skin. Treatment involves monitoring vital signs, giving oral glucose if conscious, and transporting to advanced care. Diabetes is managed through balancing food, medication, exercise and monitoring blood glucose levels.
This document presents an algorithm for mining negative association rules from transactional databases. Negative association rules consider items that are absent from transactions in addition to items that are present. The proposed algorithm uses the conviction measure in addition to support and confidence to mine both positive and negative association rules without requiring extra database scans. Experimental results on a real dataset show the algorithm performs better than an existing approach in discovering stronger positive and negative rules. Future work plans to test the algorithm on additional real datasets and compare its performance to other related algorithms.
Santa Fe Relocation Services is an international relocation company that provides global immigration services. They have over 126 offices in 46 countries and can assist with all aspects of relocation, from moving services to helping clients obtain the necessary visas and work permits. The presentation provides an overview of the immigration services Santa Fe offers, including consulting, applications, and managing immigration programs. It also presents a case study of the immigration process for a South African obtaining an employment pass to work in Singapore as a cardiologist along with dependent passes for his family. The presentation concludes with some quick global immigration facts and contact information.
This document provides an index and overview of a published collection of essays, stories, poems and other works by Christopher G. Burley exploring philosophical and social issues. The preface introduces some of the key themes to be examined, including the nature of perception, duality, free will and the possibility of meaning or purpose to life. It references concepts like omnipotence, omniscience and a singular creative force or god behind the universe. The first work in the collection, "Subject and Object", is a short story that uses allegory to examine the emergence of duality and relationships between self and other.
Query- And User-Dependent Approach for Ranking Query Results in Web DatabasesIOSR Journals
This document presents a new approach for ranking query results from web databases called Query and User Dependent Ranking. The approach considers two aspects: query similarity, which accounts for different users having similar queries, and user similarity, which accounts for different queries having similar user preferences. A prototype application was built to test the model. Empirical results found the approach to be efficient and suitable for real-world applications. The approach uses a workload file that is updated with ranking functions as new queries are made to track user and query similarities over time.
Social Network Based Learning Management SystemIOSR Journals
This document describes a social network-based learning management system (LMS) that integrates an LMS into Facebook. The system allows learning activities and course content to be shared on Facebook. It was tested with 74 test cases across user types, and all functions worked as intended. Positives included socializing learning on Facebook, but limitations were a lack of online exams, managed discussions, and video chat capabilities. The system aimed to leverage social networking to enhance education.
Performance on Image Segmentation Resulting In Canny and MoGIOSR Journals
The document discusses image segmentation techniques using the Canny edge detector and Mixture of Gaussians (MoG) classifier. It begins with an abstract discussing how images are analyzed using features like edges, color, texture, and shape. It then discusses the Canny edge detector, noting it was developed to detect a wide range of edges in a multi-stage algorithm. The document focuses on improving image classification accuracy by combining natural image statistics and scene semantics features in a MoG classifier with an integrated feature weighting model.
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
This document discusses prototyping future potentials of location-based services in e-governance. It begins by defining ubiquitous computing, context-aware applications, and location-based services. It then outlines two classes of LBS - pull, where users actively request location-based data, and push, where networks proactively provide information to users. The document also describes the key components of an LBS communication model, including user devices, communication networks, positioning systems, application servers, and data servers. Lastly, it discusses challenges with incorporating location and context into existing governance models.
Transmission Loss Minimization Using Optimization Technique Based On PsoIOSR Journals
This document discusses using particle swarm optimization (PSO) to minimize transmission losses in power systems. PSO is applied to solve the optimal power flow problem, with the objective of minimizing transmission losses. The optimal power flow problem is formulated as a nonlinear optimization problem with an objective function to minimize losses and constraints related to generator output, voltage levels, reactive power injection and transformer taps. PSO is used to search the solution space and iteratively update the particle positions and velocities to find the optimal solution that minimizes losses while satisfying all constraints. The method is tested on the IEEE 30-bus system to demonstrate minimizing transmission losses through optimal settings of control variables.
This document discusses a method for identifying thematic objects in videos. The method first extracts local feature points from each video frame using Harris corner detection. Descriptors are extracted around each corner point. The descriptors of a reference image are compared to the descriptors of video frames to find similarity and identify frames containing the same object. Identifying frequently appearing objects in this way helps with tasks like object search, tagging, and video summarization. The approach is able to identify objects even when there is partial occlusion or viewpoint variation between frames.
This document proposes a scheme for public verifiability in cloud computing using signcryption based on elliptic curves. The key components of the proposed system include users, a cloud service provider, an authentication server, and a certificate authority. The scheme relies on erasure-correcting codes to distribute and redundantly store user data across multiple cloud servers. It uses signcryption/unsigncryption based on elliptic curves to generate verification tokens for the stored data and enable public verifiability, allowing an authentication server to verify the integrity and accuracy of user data on cloud servers without involving the user. The scheme aims to simultaneously detect any data errors and identify the misbehaving servers upon verification.
Fraud and Tamper Detection in Authenticity Verification through Gradient Bas...IOSR Journals
This document proposes a novel methodology to detect tampering and forgery in images submitted for authenticity verification in security systems. The method reconstructs the test image from its gradients by solving a Poisson equation, forming a model. It then compares the original and reconstructed images using absolute difference and histogram matching to determine if tampering occurred. Experimental results demonstrate the technique can accurately verify authentic versus forged images, securing information and detecting fraud. The gradient-based reconstruction approach is a unique mechanism for digital image forensics and authenticity verification in security systems.
Diabetes is a disease caused by inadequate production of insulin. Insulin shock results from too much insulin causing low blood sugar, while diabetic coma results from not enough insulin causing high blood sugar. The goal in managing diabetes is to maintain target blood glucose levels. Signs of insulin shock include rapid pulse and confusion, while signs of diabetic coma include rapid breathing and dehydrated skin. Treatment involves monitoring vital signs, giving oral glucose if conscious, and transporting to advanced care. Diabetes is managed through balancing food, medication, exercise and monitoring blood glucose levels.
This document presents an algorithm for mining negative association rules from transactional databases. Negative association rules consider items that are absent from transactions in addition to items that are present. The proposed algorithm uses the conviction measure in addition to support and confidence to mine both positive and negative association rules without requiring extra database scans. Experimental results on a real dataset show the algorithm performs better than an existing approach in discovering stronger positive and negative rules. Future work plans to test the algorithm on additional real datasets and compare its performance to other related algorithms.
Santa Fe Relocation Services is an international relocation company that provides global immigration services. They have over 126 offices in 46 countries and can assist with all aspects of relocation, from moving services to helping clients obtain the necessary visas and work permits. The presentation provides an overview of the immigration services Santa Fe offers, including consulting, applications, and managing immigration programs. It also presents a case study of the immigration process for a South African obtaining an employment pass to work in Singapore as a cardiologist along with dependent passes for his family. The presentation concludes with some quick global immigration facts and contact information.
This document provides an index and overview of a published collection of essays, stories, poems and other works by Christopher G. Burley exploring philosophical and social issues. The preface introduces some of the key themes to be examined, including the nature of perception, duality, free will and the possibility of meaning or purpose to life. It references concepts like omnipotence, omniscience and a singular creative force or god behind the universe. The first work in the collection, "Subject and Object", is a short story that uses allegory to examine the emergence of duality and relationships between self and other.
Query- And User-Dependent Approach for Ranking Query Results in Web DatabasesIOSR Journals
This document presents a new approach for ranking query results from web databases called Query and User Dependent Ranking. The approach considers two aspects: query similarity, which accounts for different users having similar queries, and user similarity, which accounts for different queries having similar user preferences. A prototype application was built to test the model. Empirical results found the approach to be efficient and suitable for real-world applications. The approach uses a workload file that is updated with ranking functions as new queries are made to track user and query similarities over time.
Social Network Based Learning Management SystemIOSR Journals
This document describes a social network-based learning management system (LMS) that integrates an LMS into Facebook. The system allows learning activities and course content to be shared on Facebook. It was tested with 74 test cases across user types, and all functions worked as intended. Positives included socializing learning on Facebook, but limitations were a lack of online exams, managed discussions, and video chat capabilities. The system aimed to leverage social networking to enhance education.
Performance on Image Segmentation Resulting In Canny and MoGIOSR Journals
The document discusses image segmentation techniques using the Canny edge detector and Mixture of Gaussians (MoG) classifier. It begins with an abstract discussing how images are analyzed using features like edges, color, texture, and shape. It then discusses the Canny edge detector, noting it was developed to detect a wide range of edges in a multi-stage algorithm. The document focuses on improving image classification accuracy by combining natural image statistics and scene semantics features in a MoG classifier with an integrated feature weighting model.
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
This document discusses prototyping future potentials of location-based services in e-governance. It begins by defining ubiquitous computing, context-aware applications, and location-based services. It then outlines two classes of LBS - pull, where users actively request location-based data, and push, where networks proactively provide information to users. The document also describes the key components of an LBS communication model, including user devices, communication networks, positioning systems, application servers, and data servers. Lastly, it discusses challenges with incorporating location and context into existing governance models.
2. Stedfestingmodul
• Stedfestingsmodulen skal være en generisk
modul som skal kunne presentere geografiske
punkter i et kart
• Den skal også kunne benyttes til å fange opp
stedfesting fra brukere ved at de trykker på et
punkt i kartet eller søker opp et geopunkt
• Modulen er primært tiltenkt bruk i Asta, men
må være såpass generisk at også andre kan
benytte den til andre formål i andre
applikasjoner
3. • Søke
Brukeren skal kunne
søke etter steder
basert på stedsnavn,
adresse, kommune
eller Gnr/Bnr.
Brukeren taster inn
et navn eller deler av
et navn og en liste
med treff blir vist.
4. • Kartfunksjoner
Det legges opp til et utvalg av "standard" kartfunksjoner i modulen,
som f.eks. zooming, panorering, informasjonslag o.s.v.
5. • Markering
Brukeren skal kunne markere et punkt i kartet. Dette punktet skal kunne
fanges opp av applikasjonen som benytter modulen.
6. • Visning
Modulen skal kunne presentere geografiske punkter i et kart.
7. • Teknisk plattform
Løsningen skal baseres på etablerte og åpne standarder og i størst
mulig grad benytte fri programvare (Open Source).
Dette vil gjøre at eventuelle lisenskostnader holdes på et minimum
og at modulen fritt kan benyttes av andre.
• Kartgrunnlag
Kartgrunnlaget vil bli utvekslet etter spesifikasjonen Web Map
Service (WMS) med eventuelle cache-tjenester. WMS en
spesifikasjon for utveksling av kartbilder over Internett utviklet av
The Open Geospatial Consortium (OGC).
• Rik klient
Funksjonalitet i rike klienter vil bli utviklet i Java med bruk av
komponenter fra Open Source. Her er komponenter fra GeoTools
de mest aktuelle.
• Web
Presentasjon på web vil bli basert Open Source webklient som f.eks.
OpenLayers.