This document describes a proposed method for automated object detection and suspicious behavior alert in ATMs using an embedded system. The method uses facial recognition with occlusion handling to identify users at an ATM and detect suspicious behaviors in real-time video. It trains a model on sample input images and recognizes faces in video sequences despite occlusions like eyeglasses or masks. When an unknown face or suspicious behaviors like fighting are detected, an alert is triggered. The method was implemented on an ARM 11 embedded system connected to a camera and tested on a database of ATM user images with results showing it can reasonably perform recognition in practical ATM environments.
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Presentation on Face Recognition: A facial recognition is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
This document discusses face recognition technology. It begins with an abstract stating that face recognition is the identification of humans by unique facial characteristics. It then discusses how face recognition works by identifying distinguishing facial features from images and comparing them to stored data. The document then provides an introduction to biometrics and how face recognition can be used for applications like criminal identification. It describes different face recognition algorithms and provides summaries of several research papers on face recognition techniques.
This document summarizes a seminar presentation on face recognition technology. It begins with an introduction to facial recognition systems and what biometrics are. It then discusses why facial recognition is chosen over other biometrics, the differences between facial recognition and face detection, and how facial recognition systems work. Application areas are identified, such as security, government ID, casinos. Advantages include convenience and cost-effectiveness, while disadvantages include issues with lighting, pose, and privacy concerns. The growth rate of the facial recognition market is projected to be nearly 14% annually through 2022.
This document summarizes a research paper that proposes using face recognition with the eigenface approach for security at automated teller machines (ATMs). It discusses how current ATM systems have security issues and the eigenface approach could help with identification. The document outlines the eigenface algorithm methodology and implementation steps. It provides examples of screenshots from a prototype system. In conclusion, it discusses how the system could improve security at ATMs and help identify criminals, while future work may enhance the face recognition performance.
The document summarizes face recognition techniques. It discusses how face recognition involves detecting faces, extracting and matching features. Common feature extraction methods discussed include principal component analysis, linear discriminant analysis, and neural networks. The document also summarizes different categories of face recognition approaches, such as template-based, statistical, neural network-based, and hybrid approaches. Local geometry-based features and other approaches like using range, infrared, or profile images are also mentioned.
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
The presentation is about our project which helps to identify any unconscious person with help of face or fingerprint recognition, which is based on biometrics.
The presentation also explains the algorithm we used in our project
SourceAFIS used for Fingerprint Recognition
CNN ( Convolution Neural Network ) used for Face Recognition
The presentation also includes IEEE Reference Papers
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Presentation on Face Recognition: A facial recognition is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
This document discusses face recognition technology. It begins with an abstract stating that face recognition is the identification of humans by unique facial characteristics. It then discusses how face recognition works by identifying distinguishing facial features from images and comparing them to stored data. The document then provides an introduction to biometrics and how face recognition can be used for applications like criminal identification. It describes different face recognition algorithms and provides summaries of several research papers on face recognition techniques.
This document summarizes a seminar presentation on face recognition technology. It begins with an introduction to facial recognition systems and what biometrics are. It then discusses why facial recognition is chosen over other biometrics, the differences between facial recognition and face detection, and how facial recognition systems work. Application areas are identified, such as security, government ID, casinos. Advantages include convenience and cost-effectiveness, while disadvantages include issues with lighting, pose, and privacy concerns. The growth rate of the facial recognition market is projected to be nearly 14% annually through 2022.
This document summarizes a research paper that proposes using face recognition with the eigenface approach for security at automated teller machines (ATMs). It discusses how current ATM systems have security issues and the eigenface approach could help with identification. The document outlines the eigenface algorithm methodology and implementation steps. It provides examples of screenshots from a prototype system. In conclusion, it discusses how the system could improve security at ATMs and help identify criminals, while future work may enhance the face recognition performance.
The document summarizes face recognition techniques. It discusses how face recognition involves detecting faces, extracting and matching features. Common feature extraction methods discussed include principal component analysis, linear discriminant analysis, and neural networks. The document also summarizes different categories of face recognition approaches, such as template-based, statistical, neural network-based, and hybrid approaches. Local geometry-based features and other approaches like using range, infrared, or profile images are also mentioned.
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
The presentation is about our project which helps to identify any unconscious person with help of face or fingerprint recognition, which is based on biometrics.
The presentation also explains the algorithm we used in our project
SourceAFIS used for Fingerprint Recognition
CNN ( Convolution Neural Network ) used for Face Recognition
The presentation also includes IEEE Reference Papers
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
1. The document discusses facial recognition systems and algorithms. It provides details on how facial recognition works, factors to consider when selecting a biometric system, and performance metrics.
2. It then describes two algorithms for facial recognition - one based on spatial domain matching of pixel values, and another using discrete wavelet transform on preprocessed images.
3. Results on the JAFFE database show the first algorithm achieves equal error rates between 0-20% and true match rates of 80-100%, depending on the number of images used.
A facial recognition system uses computer applications to identify or verify a person from images or video by comparing facial features to a database. It can be used for security systems and is similar to other biometrics like fingerprints. Some key parts of faces used for comparison include the distance between the eyes, width of the nose, and structure of cheek bones. Algorithms continue improving to account for challenges like changes in lighting or facial expressions. Facial recognition has various applications and is expected to become more widespread and integrated into security and social networks in the future.
Facial Recognition: The Science, The Technology, and Market ApplicationsInvestorideas.com
Ravi Das
Technical Writer
BiometricNews.net
Ravi is a technical writer for BiometricNews.net, Inc., and independent news and information business about the Biometrics Industry. Ravi has been involved in Biometrics for 10+ years. He holds a BS in Ag Econ from Purdue, and MS in Ag Bus Economics (International Trade) from Southern Illinois University, Carbondale, and an MBA (MIS) from Bowling Green State University.
Human face detection and recognition is an important technology used in various applications such as video monitor system. Traditional method for taking attendance is Roll Number of student and record the attendance in sheet which takes a lot of time. Because of that systems like automatic attendance is used. To overcome the problems like wastage of time, incorrect attendance, the proposed system gives a method like when he enters the class room , system marks the attendance by extracting the image using Principal Component Analysis algorithm. The system will record the attendance of the student automatically. The student database is collected, it includes name of the students, there images and roll number. It carries an entry in log report of every student of each subject and generates a pdf report of the attendance of the student.
NEC NEOFACE- Biometric Face Recognition SystemNECIndia
NEC NeoFace combines an extracted analysis of the eyes with a
detailed determination of facial feature, using a GLVQ based multiple matching face recognition system.Providing a reliable verification solution.
This document summarizes face recognition techniques. It discusses three levels of facial details, from gross to micro features, and how they require different image resolutions. It also outlines the major components of a face recognition system: image acquisition, face detection, and face matching. Finally, it describes common image formats like 2D photos and 3D scans, and detection methods like Viola-Jones that use Haar-like features and AdaBoost training.
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
Face recognition technology uses unique facial features to identify or verify individuals. It works by measuring distances between nodal points on the face, like the eyes, nose, and chin. The technology has various applications and advantages over other biometrics like fingerprints. It does not require physical contact and can identify people quickly without an expert. While very accurate, face recognition may have issues distinguishing between identical twins. The document discusses the components, implementation, advantages and uses of face recognition systems.
Face recognition technology uses digital images and video frames to automatically identify or verify a person. It works by comparing selected facial features from an image to a facial database containing 80 landmarks on each face, such as distance between eyes, width of nose, and jaw lines. This is done using local feature analysis algorithms to encode faces and create unique numerical codes, or "face prints", that can be matched against large databases. While face recognition provides convenience over other biometrics like fingerprints, it has disadvantages such as an inability to distinguish identical twins and potential issues with database searching speeds. However, decreasing costs are leading to more widespread deployment of this technology in applications like access control, advertising, and retail point-of-sale systems.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
This document provides an overview of various approaches for feature extraction in face recognition. It discusses common feature extraction algorithms such as PCA, DCT, LDA, and ICA. PCA is aimed at data compression while ensuring no information loss. DCT transforms images from spatial to frequency domains. LDA maximizes between-class variations and minimizes within-class variations. ICA determines statistically independent variables and minimizes higher-order dependencies. The document reviews several papers comparing the performance of these algorithms individually and in combination for face recognition applications.
This document discusses face detection, analysis, and recognition using different techniques. It begins by introducing Matteo Valoriani and Luigi Oliveto. It then discusses doing face analysis at home using OpenCV/EmguCV. It covers using cloud services like Betaface and Microsoft Project Oxford. It also discusses using special cameras like Kinect and RealSense for face analysis. It concludes with discussing common problems and limits of face analysis techniques.
Face recognition technology may help solve problems with identity verification by analyzing facial features instead of passwords or pins. The document outlines the key stages of face recognition systems including data acquisition, input processing, and image classification. It also discusses advantages like convenience and ease of use, as well as limitations such as an inability to distinguish identical twins. Potential applications are identified in government, security, and commercial sectors.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.
This slide is all about a detailed description of the Face Recognition System.
Sandeep Sharma presented on face recognition. He discussed the history and types of face recognition including 2D and 3D. He explained how face recognition works by measuring facial landmarks and using algorithms like PCA and LDA to analyze features. Challenges included disguises and large crowds. Future uses could include law enforcement, banking security, and airports. Advancements are still needed for widescale deployment.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
The document discusses face recognition technology as a biometric authentication method. It describes how face recognition works by detecting nodal points on faces and creating unique faceprints. The advantages are that face recognition is convenient, socially acceptable and inexpensive compared to other biometrics. However, face recognition has difficulties with identical twins and environmental/appearance changes reducing accuracy over time. The document also outlines applications in security, law enforcement, banking, and commercial access control.
Mobile to server face recognition. Skripsi 1.Adryan Rezza
Mobile to Server Face Recognition is a face recognition application developed for mobile phones that sends images taken from mobile cameras to a server for processing. The application aims to provide a convenient way to recognize people and retrieve their information. It uses mobile phones as clients that send input images over a server for detection and recognition using Matlab programs. The system was inspired by existing face recognition technologies in mobile devices and recent research achieving better accuracy for occlusion images using sparse linear representation.
Attendance System using Face RecognitionIRJET Journal
This document describes an automated attendance system using face recognition. It discusses using algorithms like Viola-Jones for face detection and PCA for feature extraction and SVM for classification. The system works by capturing images of students' faces with a camera as they enter the classroom. It then detects faces, recognizes the students, and automatically marks their attendance on an attendance sheet. The system is presented as an improvement over previous biometric-based attendance systems in that it is faster, more convenient, and helps monitor students.
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
This document proposes a free and generic facial attendance system using Android that can automatically detect students' faces and mark attendance. It uses face detection and recognition algorithms to capture images from a camera and identify students by matching faces to a database. If a face is detected, attendance is marked as present. The system then creates a Google Sheet to store and access attendance records. This provides a low-cost alternative to commercial biometric systems for tracking student attendance.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
1. The document discusses facial recognition systems and algorithms. It provides details on how facial recognition works, factors to consider when selecting a biometric system, and performance metrics.
2. It then describes two algorithms for facial recognition - one based on spatial domain matching of pixel values, and another using discrete wavelet transform on preprocessed images.
3. Results on the JAFFE database show the first algorithm achieves equal error rates between 0-20% and true match rates of 80-100%, depending on the number of images used.
A facial recognition system uses computer applications to identify or verify a person from images or video by comparing facial features to a database. It can be used for security systems and is similar to other biometrics like fingerprints. Some key parts of faces used for comparison include the distance between the eyes, width of the nose, and structure of cheek bones. Algorithms continue improving to account for challenges like changes in lighting or facial expressions. Facial recognition has various applications and is expected to become more widespread and integrated into security and social networks in the future.
Facial Recognition: The Science, The Technology, and Market ApplicationsInvestorideas.com
Ravi Das
Technical Writer
BiometricNews.net
Ravi is a technical writer for BiometricNews.net, Inc., and independent news and information business about the Biometrics Industry. Ravi has been involved in Biometrics for 10+ years. He holds a BS in Ag Econ from Purdue, and MS in Ag Bus Economics (International Trade) from Southern Illinois University, Carbondale, and an MBA (MIS) from Bowling Green State University.
Human face detection and recognition is an important technology used in various applications such as video monitor system. Traditional method for taking attendance is Roll Number of student and record the attendance in sheet which takes a lot of time. Because of that systems like automatic attendance is used. To overcome the problems like wastage of time, incorrect attendance, the proposed system gives a method like when he enters the class room , system marks the attendance by extracting the image using Principal Component Analysis algorithm. The system will record the attendance of the student automatically. The student database is collected, it includes name of the students, there images and roll number. It carries an entry in log report of every student of each subject and generates a pdf report of the attendance of the student.
NEC NEOFACE- Biometric Face Recognition SystemNECIndia
NEC NeoFace combines an extracted analysis of the eyes with a
detailed determination of facial feature, using a GLVQ based multiple matching face recognition system.Providing a reliable verification solution.
This document summarizes face recognition techniques. It discusses three levels of facial details, from gross to micro features, and how they require different image resolutions. It also outlines the major components of a face recognition system: image acquisition, face detection, and face matching. Finally, it describes common image formats like 2D photos and 3D scans, and detection methods like Viola-Jones that use Haar-like features and AdaBoost training.
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
Face recognition technology uses unique facial features to identify or verify individuals. It works by measuring distances between nodal points on the face, like the eyes, nose, and chin. The technology has various applications and advantages over other biometrics like fingerprints. It does not require physical contact and can identify people quickly without an expert. While very accurate, face recognition may have issues distinguishing between identical twins. The document discusses the components, implementation, advantages and uses of face recognition systems.
Face recognition technology uses digital images and video frames to automatically identify or verify a person. It works by comparing selected facial features from an image to a facial database containing 80 landmarks on each face, such as distance between eyes, width of nose, and jaw lines. This is done using local feature analysis algorithms to encode faces and create unique numerical codes, or "face prints", that can be matched against large databases. While face recognition provides convenience over other biometrics like fingerprints, it has disadvantages such as an inability to distinguish identical twins and potential issues with database searching speeds. However, decreasing costs are leading to more widespread deployment of this technology in applications like access control, advertising, and retail point-of-sale systems.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
This document provides an overview of various approaches for feature extraction in face recognition. It discusses common feature extraction algorithms such as PCA, DCT, LDA, and ICA. PCA is aimed at data compression while ensuring no information loss. DCT transforms images from spatial to frequency domains. LDA maximizes between-class variations and minimizes within-class variations. ICA determines statistically independent variables and minimizes higher-order dependencies. The document reviews several papers comparing the performance of these algorithms individually and in combination for face recognition applications.
This document discusses face detection, analysis, and recognition using different techniques. It begins by introducing Matteo Valoriani and Luigi Oliveto. It then discusses doing face analysis at home using OpenCV/EmguCV. It covers using cloud services like Betaface and Microsoft Project Oxford. It also discusses using special cameras like Kinect and RealSense for face analysis. It concludes with discussing common problems and limits of face analysis techniques.
Face recognition technology may help solve problems with identity verification by analyzing facial features instead of passwords or pins. The document outlines the key stages of face recognition systems including data acquisition, input processing, and image classification. It also discusses advantages like convenience and ease of use, as well as limitations such as an inability to distinguish identical twins. Potential applications are identified in government, security, and commercial sectors.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.
This slide is all about a detailed description of the Face Recognition System.
Sandeep Sharma presented on face recognition. He discussed the history and types of face recognition including 2D and 3D. He explained how face recognition works by measuring facial landmarks and using algorithms like PCA and LDA to analyze features. Challenges included disguises and large crowds. Future uses could include law enforcement, banking security, and airports. Advancements are still needed for widescale deployment.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
The document discusses face recognition technology as a biometric authentication method. It describes how face recognition works by detecting nodal points on faces and creating unique faceprints. The advantages are that face recognition is convenient, socially acceptable and inexpensive compared to other biometrics. However, face recognition has difficulties with identical twins and environmental/appearance changes reducing accuracy over time. The document also outlines applications in security, law enforcement, banking, and commercial access control.
Mobile to server face recognition. Skripsi 1.Adryan Rezza
Mobile to Server Face Recognition is a face recognition application developed for mobile phones that sends images taken from mobile cameras to a server for processing. The application aims to provide a convenient way to recognize people and retrieve their information. It uses mobile phones as clients that send input images over a server for detection and recognition using Matlab programs. The system was inspired by existing face recognition technologies in mobile devices and recent research achieving better accuracy for occlusion images using sparse linear representation.
Attendance System using Face RecognitionIRJET Journal
This document describes an automated attendance system using face recognition. It discusses using algorithms like Viola-Jones for face detection and PCA for feature extraction and SVM for classification. The system works by capturing images of students' faces with a camera as they enter the classroom. It then detects faces, recognizes the students, and automatically marks their attendance on an attendance sheet. The system is presented as an improvement over previous biometric-based attendance systems in that it is faster, more convenient, and helps monitor students.
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
This document proposes a free and generic facial attendance system using Android that can automatically detect students' faces and mark attendance. It uses face detection and recognition algorithms to capture images from a camera and identify students by matching faces to a database. If a face is detected, attendance is marked as present. The system then creates a Google Sheet to store and access attendance records. This provides a low-cost alternative to commercial biometric systems for tracking student attendance.
Automatic Attendance system using Facial RecognitionNikyaa7
It is a boimetric based App,which is gradually evolving in the universal boimetric solution with a virtually zero effort from the user end when compared with other boimetric options.
An efficient system for real time fatigue detectionAlexander Decker
This document summarizes a research paper that proposes an efficient system for real-time fatigue detection. The system uses computer vision and image processing techniques to measure eye closure count, blinking rate, and yawning to detect user fatigue. Face detection is performed using the Viola-Jones algorithm. Abnormalities in eye and mouth behavior are then analyzed to determine if the user is fatigued. The system aims to detect fatigue early enough to avoid accidents in applications where user attentiveness is critical. It is designed to have low time and space complexity, be low cost, and not significantly impact normal user interactions. The proposed approach and algorithm are described, and example results of fatigue detection are provided.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
The document describes a face mask detection and counting system with email alerts. The system was developed using OpenCV, Keras, and TensorFlow to detect faces in images and video in real-time and determine if the person is wearing a mask or not. It counts the number of people outside and sends an email alert if anyone is detected without a mask. The system was trained on a dataset using a ResNet classifier and integrated with ThingSpeak to display the real-time person count. It aims to help enforce mask-wearing and reduce virus transmission in public areas.
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
Abstract: Face detection and Facial recognition technology has emerged as a striking solution to address
many contemporary prerequisites for identification and the verification of identity prerogatives. It brings
together the potential of supplementary biometric systems, which attempt to link identity to individually
distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current
decades face recognition has experienced significant consideration from both research communities and the
marketplace, conversely still remained very electrifying in real applications. The assignment of face detection
and recognition has been dynamically researched in current eternities. This paper offers a conversant
evaluation of foremost human face recognition research. We first present a summary of face detection, face
recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques
is accessible.
Clarification and restrictions of the performance of these face recognition algorithms are specified.
Here we present a vital assessment of the current researches concomitant with the face recognition process. In
this paper, we present a broad range review of major researches on face recognition process based on various
circumstances. In addition, we present a summarizing description of Face detection and recognition process
and development along with the techniques connected with the various influences that affects the face
recognition process.
Keywords: Face Detection, Face Recognition System, Biometric System, Review Research.
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
This document provides a comprehensive review of techniques for face detection and recognition systems. It begins with an abstract that outlines face detection and recognition technology and its use in identification and verification. The introduction discusses the challenges of automatic face recognition compared to human face recognition abilities. Section II reviews recent face detection techniques, including feature-based and image-based approaches. Section III discusses unsupervised classification-based approaches for face recognition, including Eigenfaces, dynamic graph matching, and geometrical feature matching. Section IV addresses intelligent supervised approaches like neural networks and support vector machines. The conclusion compares different face databases and provides an overall assessment of current face recognition research.
Face and liveness detection with criminal identification using machine learni...IAESIJAI
In the past, real-world photos have been used to train classifiers for face liveness identification since the related face presentation attacks (PA) and real-world images have a high degree of overlap. The use of deep convolutional neural networks (CNN) and real-world face photos together to identify the liveness of a face, however, has received very little study. A face recognition system should be able to identify real faces as well as efforts at faking utilizing printed or digital presentations. A true spoofing avoidance method involves observing facial liveness, such as eye blinking and lip movement. However, this strategy is rendered useless when defending against replay assaults that use video. The anti-spoofing technique consists of two modules: the ConvNet classifier module and the blinking eye module, which measure lip and eye movement. The results of the testing demonstrate that the developed module is capable of identifying various face spoof assaults, including those made with the use of posters, masks, or smartphones. To assess the convolutional features in this study adaptively fused from deep CNN produced face pictures and convolutional layers learned from real-world identification. Extensive tests using intra-database and cross-database scenarios on cutting-edge face anti-spoofing databases including CASIA, OULU, NUAA and replay-attack dataset demonstrate that the proposed solution methods for face liveness detection. The algorithm has a 94.30% accuracy rate.
Attendance management system using face recognitionIAESIJAI
Traditional attendance systems consist of registers marked by teachers, leading to human error and a lot of maintenance. Time consumption is a key point in this system. We wanted to revolutionize the digital tools available in today's time i.e., facial recognition. This project has revolutionized to overcome the problems of the traditional system. Face recognition and marking the present is our project. A database of all students in the class is kept in single folder, and attendance is marked if each student's face matches with one of the stored faces. Otherwise, the face is ignored and not marked for attendance. In our project, face detection (machine learning) is used.
Real Time Eye Blinking and Yawning Detectionijtsrd
Detecting eye blink and yawning is important, for example in systems that monitor the vigilance of the human operator, eg Driver's drowsiness. Driver fatigue is one of the leading causes of the worlds deadliest road accidents. This shows that in the transport sector in particular, where a driver of heavy vehicles is often open to hours of monotonous driving which causes fatigue without frequent rest periods. It is therefore essential to design a road accident prevention system that can detect the drivers drowsiness, determine the drivers level of carelessness and warn when an imminent danger occurs. In this article, we propose a real time system that uses eye detection techniques, blinking and yawning. The system is designed as a non intrusive real time monitoring system. The priority is to improve driver safety without being intrusive. In this work, the blink of an eye and the drivers yawn are detected. If the drivers eyes remain closed for more than a certain time and the drivers mouth is open to yawning, the driver is said to be fatigue. Ohnmar Win "Real Time Eye Blinking and Yawning Detection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28004.pdfPaper URL: https://www.ijtsrd.com/engineering/electrical-engineering/28004/real-time-eye-blinking-and-yawning-detection/ohnmar-win
IRJET- Driver Drowsiness Detection System using Computer VisionIRJET Journal
This document presents a driver drowsiness detection system that uses computer vision and eye tracking. The system detects drowsiness by analyzing eye behavior and blink patterns using an algorithm that detects facial landmarks and calculates an eye aspect ratio (EAR). It can run in real-time and is robust to variations in head position, lighting, and facial expressions. The system works by using a camera to capture video of the driver's face, detecting facial landmarks to isolate the eye region, and calculating the EAR which measures eye openness. A low and sustained EAR value would indicate eye closure and drowsiness. If detected, the system would alert the driver. The authors propose this system could help prevent accidents caused by driver fatigue or
Integrated system for monitoring and recognizing students during class sessionijma
In this paper we propose a new student attendance system based on biometric authentication protocol. This
system is basically using the face detection and the recognition protocols to facilitate checking students’
attendance in the classroom. In the proposed system, the classroom’s camera is capturing the students’
photo, directly the face detection and recognition processes will be implemented to produce the instructor
attendance report. Actually, this system is more efficient than others student attendance methods since the
detection and the recognition are considered to be the best and fastest method for biometric attendance
system. Regarding to the students and instructor sides, the system is working without any preparation and
with no more effort.
Face recognition systems are becoming increasingly important for security applications like surveillance cameras. They use biometric facial features which are easier for non-collaborating individuals compared to other biometrics. The document outlines the steps for a face recognition system as acquiring an image, detecting faces, recognizing faces to identify individuals. It discusses challenges like illumination, occlusion and methods are categorized as knowledge-based or appearance-based. The problem is to design a system for a robotics lab to detect and recognize frontal faces under changing lighting of at least 50 people, excluding sunglasses. The thesis outline covers literature review, proposed system theory, experiments and results, discussion and future work.
1. The document discusses using facial recognition technology for ATM security to prevent unauthorized access through stolen cards or PINs. It analyzes existing facial recognition methods like eigenfaces and proposes using 3D recognition to address spoofing issues.
2. The methodology section outlines the steps - locating an open source facial recognition program using local feature analysis, extracting features from faces, and searching databases to find matches.
3. Results show that Bank United was the first to use iris recognition at ATMs for a cardless, password-free way to withdraw money. The conclusion is that facial recognition is highly secure and widely used in security applications due to technological advances in identification and verification.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Effective driver distraction warning system incorporating fast image recognit...IJECEIAES
Modern cars are equipped with advanced automatic technology featuring various safety measures for car occupants. However, the growing density of vehicles, especially in areas where infrastructure development lags, poses potential dangers, particularly accidents caused by driver subjectivity. These incidents may occur due to driver distraction or the presence of high-risk obstacles on the road. This article presents a comprehensive solution to assist drivers in mitigating these risks. Firstly, the study introduces a novel method to enhance the recognition of a driver's facial features by analyzing benchmarks and the whites of the eyes to assess the distraction level. Secondly, a domain division method is proposed to identify obstacles and lanes in front of the vehicle, enabling the assessment of the danger level. This information is promptly relayed to the driver and relevant individuals, such as the driver's manager or supervisor. An experimental device has also been developed to evaluate the effectiveness of the algorithms, solutions, and processing capabilities of the system.
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
In the field of computer sciences such as
graphics and also analyzing the image and its processing,
face recognition is the most prominent problem due to the
comprehensive variation of faces and the complexity of
noises and image backgrounds. The purpose and working
of this system is that it identifies the face of a person from
the real time video and verifies the person from the images
store in the database. This paper provides a review of the
methodologies and techniques used for face detection and
recognition. Firstly a brief introduction of Facial
Recognition is given then the review of the face
recognition’s working which has been done until now, is
briefly introduced. Then the next sections covered the
approaches, methodologies, techniques and their
comparison. Holistic, Feature based and Hybrid
approaches are basically used for face recognition
methodologies. Eigen Faces, Fisher Faces and LBP
methodologies were introduced for recognition purpose.
Eigen Faces is most frequently used because of its
efficiencies. To observe the efficient techniques of facial
recognition, there are many scenarios to measure its
performance which are based on real time.
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document presents a hybrid approach for face detection and feature extraction. It combines the Viola-Jones face detection framework with a neural network classifier to first classify images as containing a face or not. If a face is detected, Viola-Jones algorithms like integral images and cascading classifiers are used to detect the face features. Edge-based feature maps and feature vectors are also extracted and used as inputs to the neural network classifier and for future facial feature extraction. The proposed approach aims to leverage the strengths of Viola-Jones and neural networks to accurately detect faces and then extract facial features from images.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
Segmentation and Automatic Counting of Red Blood Cells Using Hough TransformIJARBEST JOURNAL
Authors:- V. Antony Asir Daniel1, J. Surendiran2, K. Kalaiselvi3
Abstract- Red blood cells are specialized as oxygen carrier RBC plays a crucial role in
medical diagnosis and pathological study. The blood samples are collected using the smear
glass slide. These samples are taken under the test using the image of the blood. Filtering
process are carries out to remove the noise. Morphological operation are applied on the
blood image and using Hough transform method the RBC are counted which is the
effective segmentation process.
Performance Analysis of PAPR Reduction in MIMO-OFDMIJARBEST JOURNAL
Authors: Jayaraman.G1, VeeraKumar K2, Selvakani.S3
Abstract— In communication system, it is aimed to provide highest possible
transmission rate at the lowest possible power and with the least possible noise. MIMOOFDM
has been chosen for high data rate communications and widely deployed in many
wireless communication standards. The major drawback in OFDM signal transmission is
high PAPR. In previous, use clipping technique to tackle this problem. In this paper, use
EM-GAMP algorithm to reduce PAPR in considerable amount.
High Speed and Low Power ASIC Using Threshold LogicIJARBEST JOURNAL
Authors : Navaneetha Velammal M1, Sharanabasaveshwar G. Hiremath2, R.Prem Ananth3, Rama S4
In this paper, a new circuit architecture of a differential threshold logic gate
called PNAND is proposed. The main purpose of this work to reduce the leakage, power
and area of standard ASIC Circuits. By predicting the performance comparison of some
electrical quantity such as charge, voltage or current, the implementation of threshold
logic gates (TLG) is considered in this paper. Next a hybridization technique is done by
replacing the flipflops and parts of their clocks with PNAND cells is Proposed. At last the
proposed PNAND cell is hybridized with conventional logic cells, which will result in
lower power consumption, leakage and area. This paper is proposed using Cadence®
Virtuoso Schematic Editor at 180nm technology. Several design circuit methodologies
such as retiming and asynchronous circuit design can used by the proposed threshold
logic gate effectively.
Multipath routing protocol for effective local route recoveryIJARBEST JOURNAL
In mobile Ad hoc network, frequent mobility during the data transmission of data
causes route failure which results in route discovery. In this we propose multipath routing protocol
for effective local route recovery in mobile Ad hoc networks. In this protocol each source and
destination pair establishes multiple paths in single route discovery and they are cached in their route
caches. The cached routes are sorted on the basis of their bandwidth availability. In case of route
failure in the primary route, a recovery node which is an over heading neighbor, detects it and
establishes a local recovery path with maximum bandwidth from its route cache. This proposed
technique improves network performance and it prevents frequent collision.
Simulation of an adaptive digital beamformer using matlabIJARBEST JOURNAL
Beam forming is the process of combining the weighted signals received on an array of
sensors to improve the directionality. Adaptive beamforming is the ability of the beamformer to
receive the signal only from the desired direction and to reject all other signals from undesired
directions. The weight vector for the adaptive beamformer continuously changes based on some
adaptive algorithm. Therefore, adaptive digital beam formers can point the antenna to the signal
direction without changing the physical architecture of the array antenna. The beam pointing
direction can be varied electronically with this technique. This paper focuses on Least Mean
Square (LMS) adaptive algorithm.
Quantification of rate of air pollution by means ofIJARBEST JOURNAL
To develop efficient strategies for pollution control, it is essential to assess
both the costs of control and the benefits that may result. These benefits will often include
improvements in public health, including reductions in both morbidity and premature
mortality. Until recently, there has been little guidance about how to calculate the benefits
of air pollution controls and how to use those estimates to assign priorities to different air
pollution control strategies. In this work, a method is described for quantifying the benefits
of reduced ambient concentrations of pollutants (such as ozone and particulate matter)
typically found in urban areas worldwide. The method applies the data on Jakara, Indonesia,
an area characterized by little wind, high population density (8 million people), congested
roads, and ambient air pollution. The magnitude of the benefits of pollution control depends
on the level of air pollution, the expected effects on health of the pollutants (dose-response),
the size of the population affected, and the economic value of these effects. In the case of
Jakarta, the methodology suggests that reducing exposure to lead and nitrogen dioxide
should also be a high priority. An important consequence of ambient lead pollution is a
reduction in learning abilities for children, measured as I.Q. loss. Apart from that, reducing
the proportion of respirable particles can reduce the amount of illness and premature
mortality.
Simulation and Implementation of Electric Bicycle employing BLDC DriveIJARBEST JOURNAL
Electric Bicycles have been gaining attention as an efficient and clean means of
transportation. This paper focuses on the design and implementation of a hybrid powered
electric bicycle employing a dc-dc power converter. Two DC sources are used: battery and
super capacitor. The super capacitor is connected in parallel to the battery and a dc-dc
converter is designed in closed loop which arbitrates power between the battery and super
capacitor. The purpose of employing super capacitor is to drive the vehicle during the peak
power required by the load. The main components of the proposed electric bicycle are:
battery, super capacitors, dc-dc converter, controller and BLDC motor. These components
are modeled in MATLAB. Three topologies of dc-dc converter are investigated for the
electric bicycle and they are compared in terms of ripple at the input and the output and
from the results it is found that the modified boost converter results in reduced ripple. The
lead acid battery and super capacitor are modeled in SIMULINK to obtain the voltage and
current waveform. A prototype of the proposed dc-dc converter is built alongwith
controller and it is tested. A real-time working model of electric bicycle is built and the
performance of the sources and the power converter are analyzed and the results are
verified.
Review of Integrated Power Factor Correction (PFC) Boost converter topologies...IJARBEST JOURNAL
This paper provides a review of various Power Factor Correction (PFC) boost
converter topologies suitable for telecoms. A novel integrated PFC topology is proposed which acts
as a backup power supply for telecommunication systems. The advantage of the proposed circuit is
that it operates based on soft switching principle thereby reducing the switching losses in the
converter. The topologies analyzed in this paper are conventional average current mode control
boost PFC, bridgeless boost PFC, semi-bridgeless boost PFC, totem-pole bridgeless boost PFC and
proposed integrated boost PFC. All these topology studies are investigated by carrying out the
simulation of the converter circuits using PSIM software. A detailed comparison of all the
topologies have been done and they are compared in terms of supply power factor, supply current
THD and displacement factor. From the results, it is inferred that the proposed integrated PFC
provides a reduced supply current THD and improved power factor. The results are validated.
Analysis of Modulation Strategies for Two-Stage Interleaved Voltage Source In...IJARBEST JOURNAL
This paper deals with the investigation of interleaved voltage source inverter for
photovoltaic applications. This topology focuses on the reduction of inductor current ripple
content, total harmonic distortion (THD) of the proposed topology. In addition, the filter size is
reduced when compared to single-stage voltage source inverter. The design of filter for the
proposed topology is highlighted. The paper discusses the different modulation strategies for the
proposed topology with different values of modulation index. A comparison made between the
different strategies is reported. And comparison is done between single-stage and two-stage
voltage source inverter with chosen modulation strategies. Simulation studies of the proposed VSI
are carried out in MATLAB/SIMULINK.
A SURVEY ON QUESTION AND ANSWER SYSTEM BY RETRIEVING THE DESCRIPTIONS USING L...IJARBEST JOURNAL
Question answering is a modern type of data recovery described by data needs
are at any rate somewhat communicated as normal dialect articulations or addresses, and
standout amongst the most regular types of human PC cooperation. This article gives an exten
and relative review of Question Answering Technology (QAT). Question retrieval in cur
community-based question answering (CQA) administrations does not, all in all, func
admirably for long and complex inquiries. This paper introduces the quality question and an
(QA) sets amassed as thorough information bases of human knowledge. It helps clients to look
exact data by acquiring right answers straightforwardly, as opposed to skimming thro
substantial ranked arrangements of results. Hence to retrieve relevant questions and t
corresponding answers becomes an important task for information acquisition. This p
discusses different focus of the QA task which is transformed from answer extraction, an
matching and answer ranking to searching for relevant questions with good ready answers.
Fermentation Process for Manufacturing of Wine from Emblica officinalis fruitsIJARBEST JOURNAL
Amla fruits can be used as a valuable ingredient for
the production of an amla wine with all the important properties
of wine having medicinal characteristics of amla fruits. A
fermenting strain of Saccharomyces cerevisiae was utilized for
alcoholic fermentation using sugarcane molasses. Temperature
is one of the major constraints that determine the ethanol
production. The fermentation process was carried out at 25, 30,
35 and 40°C with 20% initial sugar concentration. It was
concluded that an increase in alcohol concentration,
productivity as well as efficiency with an increase in pH (4.0-5.0)
and it was also found that this optimum pH range was suitable
for S. cerevisiae strain. The fermentation process using S.
cerevisiae under optimized conditions i.e. pH 6, sugar
concentration 20% and temperature 30°C revealed an increase
in ethanol production i.e. 8.9 % (v/v) with good fermentation
efficiency
The document discusses the development of an optimal green room management system to conserve energy by taking advantage of the thermal inertia effect where a room's temperature does not immediately rise or fall after heating/cooling is turned off. It proposes collecting indoor/outdoor temperature and electricity usage data using a wireless sensor network to build energy-temperature correlation models for each room and develop room scheduling algorithms to maximize energy savings. Experimental validation of the system using an actual sensor network deployment showed potential for 30% energy savings compared to existing room scheduling practices.
The Performance Tuning of Seven Level Diode Clamped Multi Level Inverter Mr.M.Madhivhanan
PG Scholar,
Department of Electrical and Electronics Engineering,
Arignar Anna Institute of Science and Technology, Chennai
E-mail: madhivhanan@gmail.com
Prevention of Cybercrime by Suspicious URL Detection in Social Networks Using Enhanced DBSCAN Algorithm R. Ravi,
Department of Computer Science & Engineering,
Francis Xavier Engineering College, Tamil Nadu, India
Dr. Beulah Shekhar,
Department of Criminology,
Manonmanium Sundaranar University, Tamil Nadu, India
SQL Vulnerability Prevention in Cybercrime using Dynamic Evaluation of Shell and Remote File Injection Attacks R. Ravi,
Department of Computer Science & Engineering,
Francis Xavier Engineering College, Tamil Nadu, India
Dr. Beulah Shekhar,
Department of Criminology,
Manonmanium Sundaranar University, Tamil Nadu, India
Parametric Blur Estimation Using Modified Radon Transform for Natural Images Restoration Vedhapriya Vadhana R – Associate Professor,
Department of ECE,
Maheswari E – PG scholar,
VLSI DESIGN,
Francis Xavier Engineering College, Tirunelveli,India
A Novel Visual Cryptographic Scheme Using Floyd Steinberg Half Toning and Block Replacement Algorithms Nisha Menon K – PG Scholar,
Minu Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
An Equipped Sensorized Glove with Bent Sensor for Measuring Finger Flexion Selvi K – PG Scholar,
Embedded System and Technologies,
Rajeswari S – Assistant Professor,
Department of ECE,
PSN college of Engineering and Technology, Tirunelveli, India
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.