This document provides a survey of systems for detecting deepfake videos. It begins with an abstract discussing how freely available deep learning software can generate highly realistic fake content, and the need to develop detection methods to mitigate the negative impacts. The document then reviews several techniques for creating face-based manipulated videos, including face swapping, attribute manipulation, and expression transfer. It also examines popular deepfake generation tools like FaceSwap, Deepfakes, and Face2Face. Several datasets used for deepfake detection are presented, and detection methods based on convolutional neural networks, recurrent neural networks, and generative adversarial networks are explored. Key deep learning techniques for both generating and detecting deepfakes are summarized.
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
This paper proposes a convolutional neural network model to recognize handwritten digits using the MNIST dataset. The model is built using TensorFlow and consists of convolutional, pooling and fully connected layers. The model is trained on 60,000 images and tested on 10,000 images, achieving 98% accuracy on the training set and classifying digits with low error of 0.03% on the test set. Previous methods for handwritten digit recognition are discussed and the CNN approach is shown to provide superior performance with faster training times compared to other models.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
IRJET- Car Defect Detection using Machine Learning for InsuranceIRJET Journal
This document discusses using machine learning and convolutional neural networks to detect defects in cars from images for insurance purposes. The proposed system would use transfer learning with pre-trained models to classify car damage in images. A larger dataset of car damage images with detailed labels is needed to train more accurate models. The system architecture includes preprocessing techniques like color conversion, feature extraction using CNN models, and classifying damage types. Preliminary results show 99% accuracy can be achieved through transfer learning, but a larger dataset is required to develop more robust models for car defect detection.
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET Journal
This document discusses and compares different techniques for object and text detection from real-time images, including OCR, RCNN, Mask RCNN, Fast RCNN, and Faster RCNN algorithms. It finds that Mask RCNN, an extension of Faster RCNN, is generally the best algorithm for object detection in real-time images, as it outperforms other models in accuracy for tasks like object detection, segmentation, and captioning challenges. The document provides background on machine learning and neural networks approaches to image recognition and object detection.
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
This document reviews deep learning applications and frameworks. It begins by defining deep learning and discussing how deep neural networks can be used to automatically identify patterns in large datasets. It then discusses several applications of deep learning, including self-driving cars, news aggregation, natural language processing, virtual assistants, and visual recognition. The document also describes artificial neural networks and deep neural networks. Finally, it reviews several popular deep learning frameworks, including TensorFlow, PyTorch, Keras, Caffe, and Chainer.
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
This document presents a neural network approach for detecting deepfake videos. Deepfakes are videos generated using artificial intelligence that can make people appear to say or do things they did not actually say or do. The proposed system uses a convolutional neural network (CNN) to extract frame-level features from videos, which are then used to train a recurrent neural network (RNN) to classify whether a video has been manipulated or not. The system aims to detect inconsistencies in deepfake videos caused during their creation. It is tested on several public deepfake datasets and shows potential for achieving competitive results in detecting such manipulated media.
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...IJCI JOURNAL
Presently, generative AI has taken center stage in the news media, educational institutions, and the world
at large. Machine learning has been a decades-old phenomenon, with little exposure to the average person
until very recently. In the natural world, the oldest and best example of a “generative” model is the human
being - one can close one’s eyes and imagine several plausible different endings to one’s favorite TV show.
This paper focuses on the impact of generative and machine learning AI on the financial industry.
Although generative AI is an amazing tool for a discriminant user, it also challenges us to think critically
about the ethical implications and societal impact of these powerful technologies on the financial industry.
It requires ethical considerations to guide decision-making, mitigate risks, and ensure that generative AI is
developed and used to align with ethical principles, social values, and in the best interests of communities.
Predictive maintenance of electromechanical systems based on enhanced generat...IAESIJAI
Predictive maintenance (PdM) is a cost-cutting method that involves avoiding breakdowns and production losses. Deep learning (DL) algorithms can be used for defect prediction and diagnostics due to the huge amount of data generated by the integration of analog and digital systems in manufacturing operations. To improve the predictive maintenance strategy, this study uses a hybrid of the convolutional neural network (CNN) and conditional generative adversarial neural network (CGAN) model. The proposed CNN-CGAN algorithm improves forecast accuracy while substantially reducing model complexity. A comparison with standalone CGAN utilizing a public dataset is performed to evaluate the proposed model. The results show that the proposed CNN-CGAN model outperforms the conditional GAN (CGAN) in terms of prediction accuracy. The average F-Score is increased from 97.625% for the CGAN to 100% for the CNN-CGAN.
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
This paper proposes a convolutional neural network model to recognize handwritten digits using the MNIST dataset. The model is built using TensorFlow and consists of convolutional, pooling and fully connected layers. The model is trained on 60,000 images and tested on 10,000 images, achieving 98% accuracy on the training set and classifying digits with low error of 0.03% on the test set. Previous methods for handwritten digit recognition are discussed and the CNN approach is shown to provide superior performance with faster training times compared to other models.
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
People Counting and mask detection based on video is an important field in a Computer Vision. There is growing interest in video-based solutions for people monitoring and counting in business and security applications using Computer Vision technology. It has been effectively used in many Artificial Intelligence fields. Compareing to normal sensor based solutions the one with video based allows more flexible performance, improved functionalities with lower costs. The system with people counter program requires more processing because that deals with real-time video, so this particular proposed technique converts a color image into binary in order to minimize data of image. Reducing processing time is an important term in Software Engineering to build a good working system. People counting methods based on head detection and tracking to evaluate the total number of people who move under an overhead camera and check whether that people are wearing a mask or not. There basically four main features in this proposed system: People counting, Mask detection, Alarm alert and Scan ID. Based on tracking of head, this method uses the crossing-line judgment to determine whether the particular head object will get counted or not to be counted. The two main challenges overcome in this system are: tough estimation of the background scene and the number of persons in merge split scenarios. A technique for masked face detection using three different steps of estimating eye line detection, facial part detection and eye detection is used in this system. On exceeding the count of people or in case mask is not worn then alarm gets alerted
IRJET- Car Defect Detection using Machine Learning for InsuranceIRJET Journal
This document discusses using machine learning and convolutional neural networks to detect defects in cars from images for insurance purposes. The proposed system would use transfer learning with pre-trained models to classify car damage in images. A larger dataset of car damage images with detailed labels is needed to train more accurate models. The system architecture includes preprocessing techniques like color conversion, feature extraction using CNN models, and classifying damage types. Preliminary results show 99% accuracy can be achieved through transfer learning, but a larger dataset is required to develop more robust models for car defect detection.
IRJET- Comparative Study of Different Techniques for Text as Well as Object D...IRJET Journal
This document discusses and compares different techniques for object and text detection from real-time images, including OCR, RCNN, Mask RCNN, Fast RCNN, and Faster RCNN algorithms. It finds that Mask RCNN, an extension of Faster RCNN, is generally the best algorithm for object detection in real-time images, as it outperforms other models in accuracy for tasks like object detection, segmentation, and captioning challenges. The document provides background on machine learning and neural networks approaches to image recognition and object detection.
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
This document reviews deep learning applications and frameworks. It begins by defining deep learning and discussing how deep neural networks can be used to automatically identify patterns in large datasets. It then discusses several applications of deep learning, including self-driving cars, news aggregation, natural language processing, virtual assistants, and visual recognition. The document also describes artificial neural networks and deep neural networks. Finally, it reviews several popular deep learning frameworks, including TensorFlow, PyTorch, Keras, Caffe, and Chainer.
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
This document presents a neural network approach for detecting deepfake videos. Deepfakes are videos generated using artificial intelligence that can make people appear to say or do things they did not actually say or do. The proposed system uses a convolutional neural network (CNN) to extract frame-level features from videos, which are then used to train a recurrent neural network (RNN) to classify whether a video has been manipulated or not. The system aims to detect inconsistencies in deepfake videos caused during their creation. It is tested on several public deepfake datasets and shows potential for achieving competitive results in detecting such manipulated media.
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...IJCI JOURNAL
Presently, generative AI has taken center stage in the news media, educational institutions, and the world
at large. Machine learning has been a decades-old phenomenon, with little exposure to the average person
until very recently. In the natural world, the oldest and best example of a “generative” model is the human
being - one can close one’s eyes and imagine several plausible different endings to one’s favorite TV show.
This paper focuses on the impact of generative and machine learning AI on the financial industry.
Although generative AI is an amazing tool for a discriminant user, it also challenges us to think critically
about the ethical implications and societal impact of these powerful technologies on the financial industry.
It requires ethical considerations to guide decision-making, mitigate risks, and ensure that generative AI is
developed and used to align with ethical principles, social values, and in the best interests of communities.
Predictive maintenance of electromechanical systems based on enhanced generat...IAESIJAI
Predictive maintenance (PdM) is a cost-cutting method that involves avoiding breakdowns and production losses. Deep learning (DL) algorithms can be used for defect prediction and diagnostics due to the huge amount of data generated by the integration of analog and digital systems in manufacturing operations. To improve the predictive maintenance strategy, this study uses a hybrid of the convolutional neural network (CNN) and conditional generative adversarial neural network (CGAN) model. The proposed CNN-CGAN algorithm improves forecast accuracy while substantially reducing model complexity. A comparison with standalone CGAN utilizing a public dataset is performed to evaluate the proposed model. The results show that the proposed CNN-CGAN model outperforms the conditional GAN (CGAN) in terms of prediction accuracy. The average F-Score is increased from 97.625% for the CGAN to 100% for the CNN-CGAN.
IRJET- Generating 3D Models Using 3D Generative Adversarial NetworkIRJET Journal
This document discusses using a 3D generative adversarial network (GAN) to generate 3D models without needing 3D modeling software. A 3D GAN uses 3D convolutional layers in both the generator and discriminator networks. The generator maps random noise to a 3D voxel space, and the discriminator tries to determine if a 3D model is real or generated. The networks are trained adversarially, with the generator trying to fool the discriminator and the discriminator trying to accurately classify models. The goal is for the generator to learn the data distribution and output realistic 3D models without supervision by sampling latent vectors and passing them through the generator network.
IRJET- A Study of Different Convolution Neural Network Architectures for Huma...IRJET Journal
This document compares the performance of different convolutional neural network architectures for human facial emotion detection, including ResNet, VGG19, MobileNet, DenseNet, and the authors' proposed 17-layer sequential model. It finds that the authors' model achieves the highest accuracy (69%) and lowest loss, outperforming the other models. The document also proposes an application of this facial emotion detection system to remotely monitor patients' emotions in hospitals using cameras and alert medical staff if fearful or shocked expressions are detected.
This document describes a wearable AI device that uses computer vision and speech synthesis to help blind individuals. The device uses a Raspberry Pi with a camera to perform three main functions: facial recognition using convolutional neural networks and linear discriminant analysis, optical character recognition (OCR) to convert text to speech using a text-to-speech system, and object detection. The facial recognition and text are conveyed to the blind user through a speaker. The system is designed to be portable and help blind people identify faces, read text, and detect objects to assist them in daily life.
Exploring The Potential of Generative Adversarial Network: A Comparative Stud...IRJET Journal
The document discusses generative adversarial networks (GANs) and provides an overview and comparative analysis of several GAN architectures, including vanilla GANs, StyleGANs, CycleGANs, and MedGANs. It examines the designs, training approaches, applications, challenges, and advancements of different GAN types. The key advantages and limitations of each GAN model are discussed. The future potential of GANs is also explored, including using them for unsupervised representation learning and developing novel architectures to address current issues and broaden their applications.
Object and Currency Detection for the Visually ImpairedIRJET Journal
The document describes a proposed system to detect objects and currency using computer vision and deep learning to help visually impaired people. The system uses two neural networks - one based on MobileNet trained on COCO dataset for object and obstacle detection, and another MobileNet trained on a currency dataset using transfer learning for currency detection. When the mobile app is opened, it will use the camera to detect objects and currency in real-time, and provide voice feedback to the user. The goal is to help visually impaired people navigate surroundings and identify currency independently.
GANs, short for Generative Adversarial Networks, are a type of generative model based on deep learning. They were first introduced in the 2014 paper “Generative Adversarial Networks” by Ian Goodfellow and his team. GANs are a type of neural network used for unsupervised learning, meaning they can create new data without being explicitly told what to generate. To understand GANs, having some knowledge of Convolutional Neural Networks (CNNs) is helpful. CNNs are used to classify images based on their labels. In contrast, GANs can be divided into two parts: the Generator and the Discriminator. The Discriminator is similar to a CNN, as it is trained on real data and learns to recognize what real data looks like. However, the Discriminator only has two output values – 1 or 0 – depending on whether the data is real or fake. The Generator, on the other hand, is an inverse CNN. It takes a random noise vector as input and generates new data based on that input. The Generator’s goal is to create realistic data that can fool the Discriminator into thinking it’s real. The Generator keeps improving its output until the Discriminator can no longer distinguish between real and generated data.
Convolutional Neural Networks (CNNs) are the preferred models for both the generator and discriminator in Generative Adversarial Networks (GANs), typically used with image data. This is because the original concept of GANs was introduced in computer vision, where CNNs had already shown remarkable progress in tasks such as face recognition and object detection. By modeling image data, the generator’s input space, also known as the latent space, provides a compressed representation of the image or photograph set used to train the GAN model. This makes it easy for developers or users of the model to assess the quality of the output, as it is in a visually assessable form. This attribute, among others, has likely contributed to the focus on CNNs for computer vision applications and the incredible advancements made by GANs compared to other generative models, whether they are based on deep learning or not.
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
This document discusses techniques for identifying fake news using social network analysis. It first reviews literature on existing fake news identification methods that use feature extraction from news content and social context. Deep learning models are then proposed to classify news as real or fake using datasets of news and social network information. The implementation achieves 99% accuracy on binary classification of news. Social network analysis factors like bot accounts, echo chambers, and information spread are discussed as enabling the spread of fake news online.
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
The short access to facts on social media networks in addition to its exponential upward push also made it
tough to distinguish among faux information or actual facts. The quick dissemination thru manner of sharing has more high quality its falsification exponentially. It is also essential for the credibility of social media networks to avoid the spread of fake facts. So its miles rising research task to robotically check for
misstatement of information thru its source, content material, or author and save you the unauthenticated
assets from spreading rumours. This paper demonstrates an synthetic intelligence primarily based completely approach for the identification of the fake statements made by way of the use of social network
entities. Versions of Deep neural networks are being applied to evalues datasets and have a look at for
fake information presence. The implementation setup produced most volume 99% category accuracy, even
as dataset is tested for binary (real or fake) labelling with multiple epochs.
An Extensive Review on Generative Adversarial Networks GAN’sijtsrd
This paper is to provide a high level understanding of Generative Adversarial Networks. This paper will be covering the working of GAN’s by explaining the background idea of the framework, types of GAN’s in the industry, it’s advantages and disadvantages, history of how GAN’s are developed and enhanced along the timeline and some applications where GAN’s outperforms themselves. Atharva Chitnavis | Yogeshchandra Puranik "An Extensive Review on Generative Adversarial Networks (GAN’s)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42357.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42357/an-extensive-review-on-generative-adversarial-networks-gan’s/atharva-chitnavis
Development of 3D convolutional neural network to recognize human activities ...journalBEEI
This document describes the development of a 3D convolutional neural network (CNN) model to recognize human activities using moderate computation capabilities. The model is trained on the KTH dataset, which contains activities like walking, running, jogging, handwaving, handclapping, and boxing. The proposed model uses 3D CNN layers and max pooling layers to extract both spatial and temporal features from video frames. Testing achieved an accuracy of 93.33% for activity recognition. The number of model parameters and operations are also calculated to show the model can perform human activity recognition with reasonable computational requirements suitable for devices with moderate capabilities.
Image Captioning Generator using Deep Machine Learningijtsrd
Technologys scope has evolved into one of the most powerful tools for human development in a variety of fields.AI and machine learning have become one of the most powerful tools for completing tasks quickly and accurately without the need for human intervention. This project demonstrates how deep machine learning can be used to create a caption or a sentence for a given picture. This can be used for visually impaired persons, as well as automobiles for self identification, and for various applications to verify quickly and easily. The Convolutional Neural Network CNN is used to describe the alphabet, and the Long Short Term Memory LSTM is used to organize the right meaningful sentences in this model. The flicker 8k and flicker 30k datasets were used to train this. Sreejith S P | Vijayakumar A "Image Captioning Generator using Deep Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42344.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42344/image-captioning-generator-using-deep-machine-learning/sreejith-s-p
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
Noteworthy advancements in the field of deep learning have led to the rise of highly realistic AI generated fake videos, these videos are commonly known as Deepfakes. They refer to manipulated videos, that are generated by sophisticated AI, that yield formed videos and tones that seem to be original. Although this technology has numerous beneficial applications, there are also significant concerns about the disadvantages of the same. So there is a need to develop a system that would detect and mitigate the negative impact of these AI generated videos on society. The videos that get transferred through social media are of low quality, so the detection of such videos becomes difficult. Many researchers in the past have done analysis on Deepfake detection which were based on Machine Learning, Support Vector Machine and Deep Learning based techniques such as Convolution Neural Network with or without LSTM .This paper analyses various techniques that are used by several researchers to detect Deepfake videos.
DETECTING EMOTION FROM FACIAL EXPRESSION HAS BECOME AN URGENT NEED BECAUSE OF
ITS IMMENSE APPLICATIONS IN ARTIFICIAL INTELLIGENCE SUCH AS HUMAN-COMPUTER
COLLABORATION, DATA DRIVEN ANIMATION, HUMAN-ROBOT COMMUNICATION ETC. SINCE IT
IS A DEMANDING AND INTERESTING PROBLEM IN COMPUTER VISION, SEVERAL WORKS HAD
BEEN CONDUCTED REGARDING THIS TOPIC. THE OBJECTIVE OF THIS PROJECT IS TO DEVELOP A
FACIAL EXPRESSION RECOGNITION SYSTEM BASED ON CONVOLUTIONAL NEURAL NETWORK
WITH DATA AUGMENTATION. THIS APPROACH ENABLES TO CLASSIFY SEVEN BASIC EMOTIONS
CONSIST OF ANGRY, DISGUST, FEAR, HAPPY, NEUTRAL, SAD AND SURPRISE FROM IMAGE DATA.
CONVOLUTIONAL NEURAL NETWORK WITH DATA AUGMENTATION LEADS TO HIGHER
VALIDATION ACCURACY THAN THE OTHER EXISTING MODELS (WHICH IS 96.24%) AS WELL AS
HELPS TO OVERCOME THEIR LIMITATIONS.
This document is a 36-page bachelor's thesis written by Duc Minh Luong Nguyen titled "Detect COVID-19 from Chest X-Ray images using Deep Learning". The thesis was submitted to Metropolia University of Applied Sciences in May 2020. It aims to build a deep convolutional neural network to detect COVID-19 using only chest X-ray images. The model achieves an accuracy of 93% at detecting COVID-19 patients versus healthy patients, despite being trained on a small dataset of 115 images for each class.
This document is a 36-page bachelor's thesis written by Duc Minh Luong Nguyen titled "Detect COVID-19 from Chest X-Ray images using Deep Learning". The thesis was submitted to Metropolia University of Applied Sciences in May 2020. It aims to build a deep convolutional neural network to detect COVID-19 using only chest X-ray images. The model achieves an accuracy of 93% at detecting COVID-19 patients versus healthy patients, despite being trained on a small dataset of 115 images for each class.
A Literature Survey on Image Linguistic Visual Question AnsweringIRJET Journal
This document discusses a literature survey on image and linguistic visual question answering. It aims to develop a model that achieves higher performance than state-of-the-art solutions by exploring different existing models and developing a custom model. The paper reviews several existing models for visual question answering and image classification using convolutional neural networks. It also discusses developing a new dataset for visual question answering using automated question generation from image descriptions.
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...IRJET Journal
This document discusses an approach for human activity recognition using deep neural networks, computer vision, and machine learning. It summarizes key approaches for activity recognition using deep learning models like CNNs, RNNs, and reviewing commonly used datasets. The proposed approach uses a deep LSTM network to learn features from raw sensor data and encode temporal dependencies, while also learning from a shallow SLFN network to improve recognition accuracy. It evaluates the approach on several activity recognition benchmarks and finds it achieves better performance than state-of-the-art methods.
Abstract: Detection of fake news based on deep learning techniques is a major issue used to mislead people. For
the experiments, several types of datasets, models, and methodologies have been used to detect fake news. Also,
most of the datasets contain text id, tweets id, and user-based id and user-based features. To get the proper results
and accuracy various models like CNN (Convolution neural network), DEEP CNN, and LSTM (Long short-term
memory) are used
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
1. The document proposes a system using object and color recognition and convolutional neural networks to enhance the capabilities of visually impaired people.
2. The system uses a camera mounted on glasses to capture images which are then preprocessed, compressed, and used to train a classifier model to recognize common objects.
3. The proposed hardware implementation uses a Raspberry Pi for its small size and open source software support, including TensorFlow for training convolutional neural network models.
SOCIAL DISTANCING MONITORING IN COVID-19 USING DEEP LEARNINGIRJET Journal
This document discusses social distance monitoring using deep learning to help control the spread of COVID-19. It proposes using a deep learning model with OpenCV, YOLO object detection, and ToF camera to measure social distances and identify safety distance violations in real-time. The model achieves good performance with a 97.84% mean average precision and mean absolute error of 1.01 cm between actual and measured distances. Deep learning techniques like YOLO help enable fast, accurate object detection which is important for effective social distance monitoring during an epidemic.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to System for Detecting Deepfake in Videos – A Survey
IRJET- Generating 3D Models Using 3D Generative Adversarial NetworkIRJET Journal
This document discusses using a 3D generative adversarial network (GAN) to generate 3D models without needing 3D modeling software. A 3D GAN uses 3D convolutional layers in both the generator and discriminator networks. The generator maps random noise to a 3D voxel space, and the discriminator tries to determine if a 3D model is real or generated. The networks are trained adversarially, with the generator trying to fool the discriminator and the discriminator trying to accurately classify models. The goal is for the generator to learn the data distribution and output realistic 3D models without supervision by sampling latent vectors and passing them through the generator network.
IRJET- A Study of Different Convolution Neural Network Architectures for Huma...IRJET Journal
This document compares the performance of different convolutional neural network architectures for human facial emotion detection, including ResNet, VGG19, MobileNet, DenseNet, and the authors' proposed 17-layer sequential model. It finds that the authors' model achieves the highest accuracy (69%) and lowest loss, outperforming the other models. The document also proposes an application of this facial emotion detection system to remotely monitor patients' emotions in hospitals using cameras and alert medical staff if fearful or shocked expressions are detected.
This document describes a wearable AI device that uses computer vision and speech synthesis to help blind individuals. The device uses a Raspberry Pi with a camera to perform three main functions: facial recognition using convolutional neural networks and linear discriminant analysis, optical character recognition (OCR) to convert text to speech using a text-to-speech system, and object detection. The facial recognition and text are conveyed to the blind user through a speaker. The system is designed to be portable and help blind people identify faces, read text, and detect objects to assist them in daily life.
Exploring The Potential of Generative Adversarial Network: A Comparative Stud...IRJET Journal
The document discusses generative adversarial networks (GANs) and provides an overview and comparative analysis of several GAN architectures, including vanilla GANs, StyleGANs, CycleGANs, and MedGANs. It examines the designs, training approaches, applications, challenges, and advancements of different GAN types. The key advantages and limitations of each GAN model are discussed. The future potential of GANs is also explored, including using them for unsupervised representation learning and developing novel architectures to address current issues and broaden their applications.
Object and Currency Detection for the Visually ImpairedIRJET Journal
The document describes a proposed system to detect objects and currency using computer vision and deep learning to help visually impaired people. The system uses two neural networks - one based on MobileNet trained on COCO dataset for object and obstacle detection, and another MobileNet trained on a currency dataset using transfer learning for currency detection. When the mobile app is opened, it will use the camera to detect objects and currency in real-time, and provide voice feedback to the user. The goal is to help visually impaired people navigate surroundings and identify currency independently.
GANs, short for Generative Adversarial Networks, are a type of generative model based on deep learning. They were first introduced in the 2014 paper “Generative Adversarial Networks” by Ian Goodfellow and his team. GANs are a type of neural network used for unsupervised learning, meaning they can create new data without being explicitly told what to generate. To understand GANs, having some knowledge of Convolutional Neural Networks (CNNs) is helpful. CNNs are used to classify images based on their labels. In contrast, GANs can be divided into two parts: the Generator and the Discriminator. The Discriminator is similar to a CNN, as it is trained on real data and learns to recognize what real data looks like. However, the Discriminator only has two output values – 1 or 0 – depending on whether the data is real or fake. The Generator, on the other hand, is an inverse CNN. It takes a random noise vector as input and generates new data based on that input. The Generator’s goal is to create realistic data that can fool the Discriminator into thinking it’s real. The Generator keeps improving its output until the Discriminator can no longer distinguish between real and generated data.
Convolutional Neural Networks (CNNs) are the preferred models for both the generator and discriminator in Generative Adversarial Networks (GANs), typically used with image data. This is because the original concept of GANs was introduced in computer vision, where CNNs had already shown remarkable progress in tasks such as face recognition and object detection. By modeling image data, the generator’s input space, also known as the latent space, provides a compressed representation of the image or photograph set used to train the GAN model. This makes it easy for developers or users of the model to assess the quality of the output, as it is in a visually assessable form. This attribute, among others, has likely contributed to the focus on CNNs for computer vision applications and the incredible advancements made by GANs compared to other generative models, whether they are based on deep learning or not.
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
This document discusses techniques for identifying fake news using social network analysis. It first reviews literature on existing fake news identification methods that use feature extraction from news content and social context. Deep learning models are then proposed to classify news as real or fake using datasets of news and social network information. The implementation achieves 99% accuracy on binary classification of news. Social network analysis factors like bot accounts, echo chambers, and information spread are discussed as enabling the spread of fake news online.
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
The short access to facts on social media networks in addition to its exponential upward push also made it
tough to distinguish among faux information or actual facts. The quick dissemination thru manner of sharing has more high quality its falsification exponentially. It is also essential for the credibility of social media networks to avoid the spread of fake facts. So its miles rising research task to robotically check for
misstatement of information thru its source, content material, or author and save you the unauthenticated
assets from spreading rumours. This paper demonstrates an synthetic intelligence primarily based completely approach for the identification of the fake statements made by way of the use of social network
entities. Versions of Deep neural networks are being applied to evalues datasets and have a look at for
fake information presence. The implementation setup produced most volume 99% category accuracy, even
as dataset is tested for binary (real or fake) labelling with multiple epochs.
An Extensive Review on Generative Adversarial Networks GAN’sijtsrd
This paper is to provide a high level understanding of Generative Adversarial Networks. This paper will be covering the working of GAN’s by explaining the background idea of the framework, types of GAN’s in the industry, it’s advantages and disadvantages, history of how GAN’s are developed and enhanced along the timeline and some applications where GAN’s outperforms themselves. Atharva Chitnavis | Yogeshchandra Puranik "An Extensive Review on Generative Adversarial Networks (GAN’s)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42357.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42357/an-extensive-review-on-generative-adversarial-networks-gan’s/atharva-chitnavis
Development of 3D convolutional neural network to recognize human activities ...journalBEEI
This document describes the development of a 3D convolutional neural network (CNN) model to recognize human activities using moderate computation capabilities. The model is trained on the KTH dataset, which contains activities like walking, running, jogging, handwaving, handclapping, and boxing. The proposed model uses 3D CNN layers and max pooling layers to extract both spatial and temporal features from video frames. Testing achieved an accuracy of 93.33% for activity recognition. The number of model parameters and operations are also calculated to show the model can perform human activity recognition with reasonable computational requirements suitable for devices with moderate capabilities.
Image Captioning Generator using Deep Machine Learningijtsrd
Technologys scope has evolved into one of the most powerful tools for human development in a variety of fields.AI and machine learning have become one of the most powerful tools for completing tasks quickly and accurately without the need for human intervention. This project demonstrates how deep machine learning can be used to create a caption or a sentence for a given picture. This can be used for visually impaired persons, as well as automobiles for self identification, and for various applications to verify quickly and easily. The Convolutional Neural Network CNN is used to describe the alphabet, and the Long Short Term Memory LSTM is used to organize the right meaningful sentences in this model. The flicker 8k and flicker 30k datasets were used to train this. Sreejith S P | Vijayakumar A "Image Captioning Generator using Deep Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42344.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42344/image-captioning-generator-using-deep-machine-learning/sreejith-s-p
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
Noteworthy advancements in the field of deep learning have led to the rise of highly realistic AI generated fake videos, these videos are commonly known as Deepfakes. They refer to manipulated videos, that are generated by sophisticated AI, that yield formed videos and tones that seem to be original. Although this technology has numerous beneficial applications, there are also significant concerns about the disadvantages of the same. So there is a need to develop a system that would detect and mitigate the negative impact of these AI generated videos on society. The videos that get transferred through social media are of low quality, so the detection of such videos becomes difficult. Many researchers in the past have done analysis on Deepfake detection which were based on Machine Learning, Support Vector Machine and Deep Learning based techniques such as Convolution Neural Network with or without LSTM .This paper analyses various techniques that are used by several researchers to detect Deepfake videos.
DETECTING EMOTION FROM FACIAL EXPRESSION HAS BECOME AN URGENT NEED BECAUSE OF
ITS IMMENSE APPLICATIONS IN ARTIFICIAL INTELLIGENCE SUCH AS HUMAN-COMPUTER
COLLABORATION, DATA DRIVEN ANIMATION, HUMAN-ROBOT COMMUNICATION ETC. SINCE IT
IS A DEMANDING AND INTERESTING PROBLEM IN COMPUTER VISION, SEVERAL WORKS HAD
BEEN CONDUCTED REGARDING THIS TOPIC. THE OBJECTIVE OF THIS PROJECT IS TO DEVELOP A
FACIAL EXPRESSION RECOGNITION SYSTEM BASED ON CONVOLUTIONAL NEURAL NETWORK
WITH DATA AUGMENTATION. THIS APPROACH ENABLES TO CLASSIFY SEVEN BASIC EMOTIONS
CONSIST OF ANGRY, DISGUST, FEAR, HAPPY, NEUTRAL, SAD AND SURPRISE FROM IMAGE DATA.
CONVOLUTIONAL NEURAL NETWORK WITH DATA AUGMENTATION LEADS TO HIGHER
VALIDATION ACCURACY THAN THE OTHER EXISTING MODELS (WHICH IS 96.24%) AS WELL AS
HELPS TO OVERCOME THEIR LIMITATIONS.
This document is a 36-page bachelor's thesis written by Duc Minh Luong Nguyen titled "Detect COVID-19 from Chest X-Ray images using Deep Learning". The thesis was submitted to Metropolia University of Applied Sciences in May 2020. It aims to build a deep convolutional neural network to detect COVID-19 using only chest X-ray images. The model achieves an accuracy of 93% at detecting COVID-19 patients versus healthy patients, despite being trained on a small dataset of 115 images for each class.
This document is a 36-page bachelor's thesis written by Duc Minh Luong Nguyen titled "Detect COVID-19 from Chest X-Ray images using Deep Learning". The thesis was submitted to Metropolia University of Applied Sciences in May 2020. It aims to build a deep convolutional neural network to detect COVID-19 using only chest X-ray images. The model achieves an accuracy of 93% at detecting COVID-19 patients versus healthy patients, despite being trained on a small dataset of 115 images for each class.
A Literature Survey on Image Linguistic Visual Question AnsweringIRJET Journal
This document discusses a literature survey on image and linguistic visual question answering. It aims to develop a model that achieves higher performance than state-of-the-art solutions by exploring different existing models and developing a custom model. The paper reviews several existing models for visual question answering and image classification using convolutional neural networks. It also discusses developing a new dataset for visual question answering using automated question generation from image descriptions.
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...IRJET Journal
This document discusses an approach for human activity recognition using deep neural networks, computer vision, and machine learning. It summarizes key approaches for activity recognition using deep learning models like CNNs, RNNs, and reviewing commonly used datasets. The proposed approach uses a deep LSTM network to learn features from raw sensor data and encode temporal dependencies, while also learning from a shallow SLFN network to improve recognition accuracy. It evaluates the approach on several activity recognition benchmarks and finds it achieves better performance than state-of-the-art methods.
Abstract: Detection of fake news based on deep learning techniques is a major issue used to mislead people. For
the experiments, several types of datasets, models, and methodologies have been used to detect fake news. Also,
most of the datasets contain text id, tweets id, and user-based id and user-based features. To get the proper results
and accuracy various models like CNN (Convolution neural network), DEEP CNN, and LSTM (Long short-term
memory) are used
IRJET- Object Detection and Recognition for Blind AssistanceIRJET Journal
1. The document proposes a system using object and color recognition and convolutional neural networks to enhance the capabilities of visually impaired people.
2. The system uses a camera mounted on glasses to capture images which are then preprocessed, compressed, and used to train a classifier model to recognize common objects.
3. The proposed hardware implementation uses a Raspberry Pi for its small size and open source software support, including TensorFlow for training convolutional neural network models.
SOCIAL DISTANCING MONITORING IN COVID-19 USING DEEP LEARNINGIRJET Journal
This document discusses social distance monitoring using deep learning to help control the spread of COVID-19. It proposes using a deep learning model with OpenCV, YOLO object detection, and ToF camera to measure social distances and identify safety distance violations in real-time. The model achieves good performance with a 97.84% mean average precision and mean absolute error of 1.01 cm between actual and measured distances. Deep learning techniques like YOLO help enable fast, accurate object detection which is important for effective social distance monitoring during an epidemic.
Similar to System for Detecting Deepfake in Videos – A Survey (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.