Scenario Description: Campus Area Network:
Read More
The t/k-diagnosis is a diagnostic strategy at system level that can significantly enhance the system’s self-diagnosing capability. It can detect up to t faulty processors (or nodes, units) which might include at most k misdiagnosed processors, where k is typically a small number. Somani and Peleg ([26], 1996) claimed that an n-dimensional Star Graph (denoted Sn), a well-studied interconnection model for multiprocessor systems, is ((k + 1)n – 3k – 2)/k-diagnosable. Recently, Chen and Liu ([5], 2012) found counterexamples for the diagnosability obtained in [26], without further pursuing the cause of the flawed result.
In this paper, we provide a new, complete proof that an n-dimensional Star Graph is actually ((k + 1)n – 3k – 1)/k-diagnosable, where 1 ≤ k ≤ 3, and investigate the reason that caused the flawed result in [26]. Based on our newly obtained fault-tolerance properties, we will also outline an O(N log N) diagnostic algorithm ( N = n! is the number of nodes in Sn) to locate all (up to (k + 1)n – 3k – 1) faulty processors, among which at most k (1 ≤ k ≤ 3) fault-free processors might be wrongly diagnosed as faulty.
Read More
With the exploration of the ocean, underwater acoustic communication has attracted more and more attention in recent years. The underwater acoustic channel is considered to be one of the most complicated channels because it suffers from more serious multipath effect, fewer available bandwidths and quite complex noise. Since the signals experience a serious distortion after being transmitted through the underwater acoustic channel, the underwater acoustic communication experiences a high bit error rate (BER). To solve this problem, carrier waveform inter-displacement (CWID) modulation is proposed. It has been proved that CWID modulation is an effective method to decrease BER.
The linear frequency modulation (LFM) carrier-waves are used in CWID modulation. The performance of thecommunication using CWID modulation is sensitive to the change of the frequency band of LFM carrier-waves. The immune particle swarm optimization (IPSO) is introduced to search for the optimal frequency band of the LFM carrier-waves, due to its excellent performance in solving complicated optimization problems. The multi-objective and multi-peak optimization nature of the IPSO gives a suitable description of the relationship between the upper band and the lower band of the LFM carrier-waves. Simulations verify the improved performance and effectiveness of the optimization method
Read More
As the need of internet is increasing day by day, the significance of security is also increasing. The enormous usage of internet has greatly affected the security of the system. Hackers do monitor the system minutely or keenly, therefore the security of the network is under observation. A conventional intrusion detection technology indicates more limitation like low detection rate, high false alarm rate and so on. Performance of the classifier is an essential concern in terms of its effectiveness; also number of feature to be examined by the IDS should be improved.
In our work, we have proposed two techniques, C4.5 Decision tree algorithm and C4.5 Decision tree with Pruning, using feature selection. In C4.5 Decision tree with pruning we have considered only discrete value attributes for classification. We have used KDDCup’99 and NSL_KDD dataset to train and test the classifier. The Experimental Result shows that, C4.5 decision tree with pruning approach is giving better results with all most 98% of accuracy.
Read More
Mobile ad-hoc networks have to suffer with different types of packet dropping attacks. Therefore, we need strong mechanism to detect these malevolent nodes and to classify normal and abnormal nodes as per the behavior of nodes. Machine learning techniques distinguish outlier nodes quickly and accurately provide classification by observing behavior of those nodes in the network.
In this paper, we study various machine learning techniques as artificial neural network, support vector machine, decision tree, Q-learning, Bayesian network for identifying the malicious nodes. These techniques are able to detect black hole, gray hole, flooding attacks and other packet dropping attacks. These types of misbehaving nodes are identified and future behaviors of the nodes are predicted with supervised, un-supervised, reinforcement machine learning techniques.
Read More
Omnet++ Simulator November 30, 2015 2015 OMNeT++ Projects, mixim omnet, OMNeT++ WBAN
In Mobile Ad hoc Networks (MANETs), system performance degrades when some switching nodes and/or communication links fail to operate. As a result, the performability (performance reliability) assessment of MANETs is very important. However, because of the impact of dynamic topology, the traditional system performability analysis methods, such as Dynamic Fault Tree (DFT) and Dynamic Reliability Block Diagrams (DRBD), can’t be applied to evaluate MANETs. In this paper, we propose a hierarchical modeling approach for performability analysis of MANETs with repairable components. The lower level network components are described by Markov Reward Chains (MRC), which allow complex component failure/repair behaviors to be modeled.
At the upper level, the MANET is considered as a small-world network, and the characteristic path length of the network is used to ascertain the global status of the network. The proposed hierarchical modeling approach combines the characteristics of small-world network and Markov chain theories together. A specific case of MANET is presented to support our approach in this paper. What’s more, we build the same network scenario in OPNET and implement some simulation experiments. The results show a very good correspondence of performability analysis between our approach and the OPNET simulation.
Read More
This paper proposes a novel method for transmission network expansion planning (TNEP) that take into account uncertainties in loads and renewable energy resources. The goal of TNEP is to minimize the expansion cost of candidate lines without any load curtailment. A robust linear optimization algorithm is adopted to minimize the load curtailment with uncertainties considered under feasible expansion costs. Hence, the optimal planning scheme obtained through an iterative process would be to serve loads and provide a sufficient margin for renewable energy integration.
In this paper, two uncertainty budget parameters are introduced in the optimization process to limit the considered variation ranges for both the load and the renewable generation. Simulation results obtained from two test systems indicate that the uncertainty budget parameters used to describe uncertainties are essential to arrive at a compromise for the robustness and optimality, and hence, offer a range of preferences to power system planners and decision makers.
Read More
In this paper, an analytical performance study for multi-antenna Cognitive Radio (CR) systems is presented. The two most popular CR approaches, namely, the interweave and underlay system designs, are considered and based on the derived analytical framework, a throughput-based comparison of these two system designs is presented. The system parameters are selected such that a quality of service (QoS) constraint on primary communication, is satisfied. Closed form expressions for the outage probability at the Primary User (PU), as well as expressions for the ergodic rate of the Secondary User (SU) are derived, for both system designs. The derived expressions are functions of key design parameters, such as the sensing time and the detection threshold in the case of interweave CR, and the maximum allowable interference power received by the PU, in the case of underlay CR.
Based on the derived expressions, for interweave CR, the sensing parameters, i.e., sensing time and energy detection threshold, are optimized such as to maximize the secondary system rate. By comparing the throughput performance for both system designs, the existence of specific regimes (in terms of primary activity, number of transmit and receive antennas as well as the outage probability of the PU), where one CR approach outperforms the other, is highlighted.
Read More
In this paper, an analytical performance study for multi-antenna Cognitive Radio (CR) systems is presented. The two most popular CR approaches, namely, the interweave and underlay system designs, are considered and based on the derived analytical framework, a throughput-based comparison of these two system designs is presented. The system parameters are selected such that a quality of service (QoS) constraint on primary communication, is satisfied. Closed form expressions for the outage probability at the Primary User (PU), as well as expressions for the ergodic rate of the Secondary User (SU) are derived, for both system designs. The derived expressions are functions of key design parameters, such as the sensing time and the detection threshold in the case of interweave CR, and the maximum allowable interference power received by the PU, in the case of underlay CR.
Based on the derived expressions, for interweave CR, the sensing parameters, i.e., sensing time and energy detection threshold, are optimized such as to maximize the secondary system rate. By comparing the throughput performance for both system designs, the existence of specific regimes (in terms of primary activity, number of transmit and receive antennas as well as the outage probability of the PU), where one CR approach outperforms the other, is highlighted.
Read More
Energy hole problem is a critical issue for data gathering in Wireless Sensor Networks. Sensors near the static sink act as relays for far sensor and thus will deplete their energy very quickly, resulting energy holes in the sensor field. Exploiting the mobility of a sink has been widely accepted as an efficient way to alleviate this problem. However, determining an optimal moving trajectory for a mobile sink is an NP-hard problem. Thus, this paper proposed a Mobile Sink based adaptive Immune Energy-Efficient clustering Protocol (MSIEEP) to alleviate the energy holes. MSIEEP uses the Adaptive Immune Algorithm (AIA) to guide the mobile sink based on minimizing the total dissipated energy in communication and overhead control packets.
Moreover, AIA is used to find the optimum number of Cluster Heads (CHs) to improve the lifetime and stability period of the network. The performance of MSIEEP is compared with the previously published protocols; namely LEACH, LEACHGA, A-LEACH, rendezvous and MIEEPB using Matlab. Simulation results show that MSIEEP is more reliable and energy efficient as compared to other protocols. Furthermore, it improves the lifetime, the stability and the instability periods over the previous protocols, because it always selects CHs from highenergy nodes. Moreover, the mobile sink increases the ability of the proposed protocol to deliver packets to the destination.
Read More
Read More
This research work presents the previous results of implementing autonomous traffic light control system based on sophisticated agents to overcome problems like congestion, pollutant emissions and fuel consumption in modern cities. The proposed agent based approach uses back propagation neural networks to provide green light intervals according to the demand level of the intersection. The effectiveness of this proposal is tested simulating two traffic intersections.
To do this, the paper also introduces a novel simulator and emission analyzer developed to run a set of tests in order to compare the presented methodology with traditional traffic control methods. Preliminary results demonstrate the efficiency of the introduced approach, offering significant mobility and environmental benefits. For example, for the first test and using observed traffic volumes, our approach increase mobility in 28% and reduce the fuel consumption in 20%.
Read More
Fault diagnosis is a critical task for operators in the context of e-TOM (enhanced Telecom Operations Map) assurance process. Its purpose is to reduce network maintenance costs and to improve availability, reliability and performance of network services. Although necessary, this operation is complex and requires significant involvement of human expertise. The study of the fundamental properties of fault diagnosis shows that the diagnosis process complexity needs to be addressed using more intelligent and efficient approaches. In this paper, we present a hybrid approach that combines Bayesian networks and case-based reasoning in order to overcome the usual limits of fault diagnosis techniques and to reduce human intervention in this process.
The proposed mechanism allows the identification of the root cause with a finer precision and a higher reliability. At the same time, it helps to reduce computation time while taking into account the network dynamicity. Furthermore, a study case is presented to show the feasibility and performance of the proposed approach based on a real-world use case: a Virtual Private Network topology.
Read More
Machine Learning and Robotics for Advanced Medical Applications: Developing Robotic-Based Systems for Targeted Drug Delivery
Need original Research Paper?
Over the last few years, minimally invasive operations have improved drastically due to medical robotics, which has transformed how complex operations are conducted. The InTarget project, which wants to take medical robotics to the next level, seeks EPSRC financing to build a robotic-based system capable of intelligent magnetic field control for targeted drug delivery (Al-Mamun et al., 2018; Sadeghi et al., 2020). But this proposal seeks to construct a robotic system that addresses current drug delivery methods' drawbacks, increasing patient safety and treatment efficacy.
Current invasive therapies can cause difficulties despite minimally invasive ones. Robotic-based systems for drug delivery can enable precise, non-invasive delivery of medication to precise physical targets. This mitigates complications from off-target impacts and open surgery. Magnetic fields can control drug delivery systems, thanks to technological advances in robotics. Liu et al. Welcome this technology so clinicians may give medication more accurately, improving patient safety and decreasing adverse effects. Machine learning can improve robotic drug delivery devices by facilitating real-time monitoring. The Artificial Intelligence-powered technology can adapt to patient-specific conditions and variables during the operation to improve its accuracy, efficacy, and safety. These systems may change magnetic force and other production factors to ensure constant synchronization (Wang et al., 2021). Thus, minimally invasive operations have become standard and offer several advantages, including fewer complications compared to traditional invasive methods. Robotics and machine learning give new advantages and opportunities to advanced medical treatments should developments in medicine continue. It is an effort greatly required by our world today.
References
Al-Mamun, A., Khanam, S., Rahman, M. F., Ullah, M. S., Nazuous, A. H. I. E., Khan, B. S., & Istiaq, A. (2018). Minimally invasive surgery: A review. Journal of Surgical Research, 229, 90–100. https://doi.org/10.1016/j.jss.2018.03.015
Liu, K. J., Zheng, P., Ma, L., Qiu, F., Xu, Y., Ding, L., Wu, W., & Jiang, W. (2021). Application of magnetic targeting therapy with multifunctional magnetic nanoparticles in periarticular osteolysis in a rabbit model. International Journal of Nanomedicine, 16, 5751–5769. https://doi.org/10.2147/ijn.s314048
Sadeghi, K. T., Gharahdaghi, T., & Karamalkov, A. (2020). Magnetic artificial periodic bionic system for smart drug delivery. Journal of Biomedical Materials Research Part A, 108(11), 2335–2341. https://doi.org/10.1002/jbm.a.36889
Wang, Y., Wei, Z., Wu, B., Zhang, L., Yang, J., Zhang, X., Xu, R., Chen, S., & Nebe, J. B. (2021). Machine learning prediction of titanium surface roughness on the osseointegration of endosseous implants in preclinical rabbits. Frontiers in Bioengineering and Biotechnology, 8, 694871. https://doi.org/10.3389/fbioe.2020.694871
Read More
Non 1:1 Mappings of Physical and Virtual Environments: A New Perspective
I agree with the authors' assertion regarding non 1:1 mappings of virtual and physical realities. The non-standard mapping of the magnetic sensor to the viewpoint is particularly useful when vertical viewpoint motion is restricted or blocked (de Chardin et al., 2019). This could happen, for instance, while engaging with a virtual environment (VE) of a building with tall ceilings when riding an escalator or immersed in a VE of a forest with a tall canopy while riding a bike on the forest floor. Therefore, in this instance, the non 1:1 mapping will allow a user to enjoy a completely different experience of riding a bike in the forest while using virtual reality technology. Despite the possibility of the user detecting incongruence between the actual and virtual activity (de Chardin et al., 2019), the purpose of entertaining is valued more than realism. In this vein, while the mapping could cause incongruence, it is possible to implement have fun and enjoy.
In addition, this mapping allows the possibility of experimenting with the VE from various angles, which would normally demand a physical body with different physical attributes and abilities as well as movements to accommodate. For instance, a child is learned to comprehend the world as an owl with such physical experience for moving its body and head at an angle of 180 degrees. While the mapping allows for kinesthetic incongruence, the opportunity to engage with various forms of VE almost is incomparable. Therefore, while this mode of mapping creates incongruence, the ability to play, learn, adapt, and understand different environments is perhaps the most useful, especially from the perspectives of entertainment and child development.
Need original Essay?
References
De Chardin, G., Geumpels, M., Lefebvre, R., & Tordeux, A. (2019). You suffer from an extreme form of VR sickness! Measurement Olfactory exogenous cues influence multisensory interactions. Proceedings of the ACM on Human-Computer Interaction, 3, 1–23. https://doi.org/10.1145/3226065
Read More
Methods
The authors propose a novel re-authentication protocol while investigating the issue of whether a re-authentication procedure and an accompanying improvement algorithm would help attain better security and performance over brute-force attacks and improve handshaking performance. In doing this, the researchers achieve a better outcome in terms of the highest electromagnetic vector similarity (HEVS) as well as average throughput and packet loss rate. Clearly laid out research questions help the authors in coming up with a research design and methods that are pertinent to the research question. This is mainly achieved by examining the De ?authentication end result followed by Grunting Feasibility (DoSGF) in 4WHEPSK-centered to authenticate the interplay to land the less complicated choice. Therefore, the following steps were taken:
Selection of variables that are associated with better methods and victory of intruders. In this way, the authors localize a comparable indicator that can deal with re-authentication features (Afzal et al., 2022). This also entails realigning the cryptographic algorithm into a new re-authentication process for further robustness in particle rate and throughput.
Formulation of Hypotheses: includes defining the Delta and NS1NSS1 among cycles of the related indicator and formulating the hypothesis. If the values of Delta < NS1NSS1 echoing in cycles of the related index, the null hypothesis is upheld.
Establishing a function upgrade Performance (FUP) to comparison process stability between 4WHEPSK-focused re-authentication algorithms - 802.1x re-authentic- (HAFRITURA) and 802.11i re-authenticated.
Calculations and model passages to evaluate the theoretical capacity, packet loss rate, and electromagnetic vector similarity. Forward and reverse 4WHS model requires extracting and modifying entity ninety-three. The mathematical formulas are presented, and the researchers catalog the required variables metrics and configurations.
Read More
Compare and Contrast the Three Operating Systems
It is worth noting that there are many types of software programs available in the current
market currently. Most of the operating systems available are open-source platforms accessible
for customization by manufacturers to fulfill the specific demands of their various devices.
Windows, macOS, and Linux are the three most popular operating systems available today. All
the three have their own set of pros and downsides, although they all contribute to a more
adaptable user experience, albeit they each shine differently.
Windows is a commonly used operating system (OS) with a big user base with most
applications written for it. Windows OS has a greater degree of hardware support than any other
operating system. Because Windows is so extensively applied across the globe, most new games
are released for it first (Malallah et al. 25). However, because they are used so extensively
compared to other operating systems, Windows are highly sensitive to infections. Ninety-five
percent of viruses are programmed for Windows. The Windows OS is proprietary. Windows is
more costly than other competing operating systems like Android since it has a Microsoft-
exclusive license. In addition to that, windows also possess extra features and are compatible
with practically any brand of hardware and software program out there (Jana 3). To crown it all,
windows has made significant strides forward in terms of security compared to previous
versions. It also needs a large number of resources.
Surname 2
The other operating system in the list is Linux which is known to be completely free to
download, install, and distribute since it is an open-source operating system, there are many
different varieties available because you may customize it to your liking. According to Malallah
et al. (18), Linux is built on a monolithic kernel. Compared to Windows, it is more efficient in
terms of operations since it uses the forward slash as a path separator between directories. It is
also quite stable, but it is also extremely susceptible to infection (Tsvetkov 170). However, many
Windows applications will not operate on Linux, and there are far fewer drivers available for
Linux than for Windows.
The macOS operating system offers a simplified user interface that is consistent with its
hardware integration. The OS includes many free productivity apps that come with it (Malallah
et al. 20). Apps were added and deleted from the operating system as it progressed from the
original MacOS. It enjoys the advantage of not being very susceptible to viruses and malware
like other competitors. The iPod music player and music applications for the Mac, such as
iTunes and GarageBand, were created by Apple because they considered music a major market.
Multitasking and ease of usage with a number of other Apple devices are two of its main
advantages. However, macOS has been deemed prohibitively costly and only available for
Apple-approved hardware, making them incompatible with computer upgrades (Malallah et al.
29). Another issue with these operating systems is that very few game titles are available for
them in the market.
In conclusion, depending on an individual’s requirements, some operating systems will
perform better than others. However, the above comparison shows that Windows and Linux give
the greatest hardware and program support than Mac OS. When it comes to Windows, they can
run practically any application currently available. It is also possible to interact with a computer
Surname 3
using an operating system even if one does not understand the machine’s language. As a result, a
computer is rendered inoperable if it does not have an operating system.
Surname 4
Works Cited
Hasnain, Sk Golam Muhammad, and Farhan Ar Rafi. “Windows, Linux, Mac Operating System
and Decision Making.” International Journal of Computer Applications 975: 8887.
Jana, Indranil. “Effect of ARP poisoning attacks on modern operating systems.” Information
Security Journal: A Global Perspective 26.1 (2017): 1-6.
Malallah, HayfaaSubhi, et al. “A comprehensive study of kernel (issues and concepts) in
different operating systems.” Asian Journal of Research in Computer Science (2021): 16-
31.
Tsvetkov, Konstantin. “OPERATING SYSTEMS: PAST, PRESENT AND FUTURE.” New
knowledge Journal of science 9.2 (2020): 167-175.
MAJOR CASE STUDY OVERVIEW 1.1. Case Study Overview Daemons Frequent and Urgent Net-traders (DaFUN) is a hedge fund company that uses the same amount of money for both domestic and international dealings, they have a minimum of $1 million funds that get multiplied after the business is successfully done. A hedge company is the one that sets the goals and once the goals are set half of the success is ensured as they invest large amounts at an international and domestic level such that the probability of profit is increased (Brav et al., 2010). DaFUN is a company that uses proprietary trading algorithms to buy and sell stocks. The business requirements for this company are the funds and business goals that they need to plan effectively to ensure that their stock business goes in profit. The technical requirements of the company are proprietary trading algorithms that are made by programmers to keep the confidentiality and the security set up of their application. They will create a secure network for domestic and international businesspeople who can access the network and bid according to their choice for the stock business. Thus, business requirements include managing the funds and profit goals, and as for the technical requirements they need to work a network plan effectively to have a sustainable future. The research manufacturer will use a strong network for comprehensive and complex communication infrastructure, they will use effective material for the construction where the different parts of the office are arranged in a way that they are connected and allow easy communication. The components that will be used for secure and effective communication in an office, a sturdy infrastructure will be designed. The manufacturers will use walls, connectors, IBM, door, network, spaces, beams, building envelope, column, electric fixture, equipment, fixtures, flow terminals, furniture, grid line, HVAC, movable and non-movable furnishings, service bay, notation, vertical services, vertical circulation, windows, cabinet, computer, electric appliances, NET_594, Spring 2022 JP Labruyère / GB Brewster/A Chung DaFUN - 6 - Major Case Study opening element, plumbing fixture, power column, printer, and stairs. Thus, this equipment and materials will be used for the design that will be analyzed and explained in the report. The design will be a detailed one where using walls, windows, furniture, beams, and cabinets placement will be assured that the communication within the area is safe and for ensuring that the communication is coherent between the office’s different networks, connectors, and electrical equipment will be used to transmit the messages within a closed setup. Thus, the two main aspects of the design will be to make sure that the messages and information do not get out of the building and to ensure that the communication within the building is smooth and audible to every employee in good quality for a proper business. To implement the plan, the design will be followed according to the Visio drawing such that each component will be placed as shown in the figures of the drawings. The following case study will be a detailed infrastructure design of the three official locations of
Read More
This area assessed the nurse’s ability to implement evidence-based learning in their professional practice where they support their actions with theoretical knowledge that is supported by research articles (Nascimento et al., 2021).
A universal basic income is where the government pays each citizen a set amount of money per month. The idea behind this concept is to put most citizens on an equal playing field in terms of income. A pro of this concept is a reduction of the stigma that surrounds government benefits such as food assistance and welfare (Gaille, 2019). If there are parameters around who qualifies for the payments, it would encourage people to still work while getting the payment (Gaille, 2019).
Read More
The platform should offer an administration interface where the taxi company can manage the content, and access all bookings and customer information. More and more Taxi companies are looking for integrated taxi booking systems as it makes life much easier for (1) The traveler - this is highly important and in today's internet age people should be able to book taxis online without having to pick up the phone and (2) the taxi company as all their bookings are now managed via an automated system which means they have an electronic record of future and historic bookings A Cab Booking/Hiring is a system that can be used temporarily for a period of time with a fee. Hiring a car assists people to get around even when they do not have access to their own personal vehicle or don't own a vehicle at all. The individual who want to hire/rent a car must first contact the cab hiring company for the desire vehicle. This can be done online. At this point, this person has to supply some information such as: dates of rental, and type of car. After these details are worked out, the individual renting the car must present a valid Identification Card. Most companies throughout the industry make a profit based of the type of cars. The hiring cabs are categorized into economy, compact, compact
Read More
Question 3
clc;
close all;
clear all;
Am=1; % Amplitude of modulating signal
fm=400; % Frequency of modulating signal
Fs = 16000; % Sampling frequency
t = 0:1/Fs:0.01; % Time vector of 1 second
ym=Am*sin(2*pi*fm*t); % Eqation of modulating signal
figure(1)
subplot(3,1,1);
plot(t,ym), grid on;% Graphical representation of Modulating signal
title ( ' Modulating Signal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
% carrier signal generation
fc=6000;% Frequency of carrier signal
Tc=1/fc;% Time period of carrier signal
yc= sin(2*pi*fc*t);% Eqation of carrier signal
subplot(3,1,2);
plot(t,yc), grid on;% Graphical representation of carrier signal
title ( ' Carrier Signal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
% AM Modulation
y=(1+Am*sin(2*pi*fm*t)).*sin(2*pi*fc*t); % Equation of Amplitude
%modulated signal
subplot(3,1,3);
plot(t,y);% Graphical representation of AM signal
title ( ' Amplitude Modulated signal ');
xlabel ( ' time(sec) ');
ylabel (' Amplitud(volt) ');
grid on;
Read More
Question 2
f = 250:250:2000
Fs = 16000; % Sampling frequency
t = 0:1/Fs:0.005; % Time vector of 1 second
amp = 1;
Read More
Question 1
f = 250:250:2000
Fs = 16000; % Sampling frequency
t = 0:1/Fs:0.005; % Time vector of 1 second
amp = 1;
x = amp * sin(2*pi*t'*f);
plot(t,x)
title('Sine wave generator');
xlabel('Time in seconds');
ylabel('Sinusoidal waveform');
grid on
Question1code
f =
250 500 750 1000 1250 1500 1750 2000
Read More
ABSTRACT
Detection, extraction, segmentation, and recognition of face as part of the intelligent living application is very vital in our daily life. Alignment and segmentation are part and play a significant role in face recognition systems. The landmarks derived from the shape of the faces by alignment methods are used in many applications, including real face classification and virtual face animation. In this paper, Sklearn, Keras, Skimage, and TensorFlow methods will be used to train the model with provided datasets, align the image data to identify facial landmarks, and segment data to realize face vector points for the segmented image.
INTRODUCTION
Image identification is very fundamental in application areas such as Biometric systems and computer vision. The objective of this paper is to implement a Face Segmentation system that can partition a human face into sections, identify and align corresponding landmarks of that image. This paper also focuses on implementing simple graphical effects that use the information extracted from the human face. Face segmentation will be of focus in this paper rather than face detection, which only involves determining whether objects are faced or not.
This paper is significant due to many ongoing and emerging applications in the field of computer vision. Such applications include Facial Recognition System, which can identify and recognize human faces uniquely based on pixels properties. Facial recognition system has several applications such as login credentials in android and computer systems, video surveillance using the concept of face tracking, among others.
Extensive accelerated research has been done on face segmentation, but still, there is a lot to be fully and convincingly solved. The problem has been fueled by the existence of complex content of images and their applications.
This paper is organized into distinct parts, preprocessing, face alignment, face segmentation, and graphical effect implementation. The paper will also have a recommendation and a conclusion.
PREPROCESSING
Machine learning algorithms will only work with vectors alone. There is, therefore, the need to convert training data into vectors. In this paper, the dataset provided is in matrix form. We will take advantage of the TensorFlow iterator object known as image_data_generator, which creates several variables that can be used to preprocess the data.
Read More
AQUIRED INTELLIGENCE AND ADDAPTIVE BEHAVIOUR
ARTIFICIAL NEURAL NETWORKAQUIRED INTELLIGENCE AND ADDAPTIVE BEHAVIOUR
ARTIFICIAL NEURAL NETWORK
Impressive operative administrator may be answerable for statistics get admission to, workforce, debts payable, supply file access, dealing with the associations, human resources helping and generating managerial and software assets in cooperation with this system upfront, and different responsibilities (Scheeres, 2010). It’s accountable for improving the operational frameworks, processes and approaches in backing of affiliation project, in particular, bolster better administration, reporting, data movement and management, business system and authoritative arranging ( Scheeres, 2010). It fills a huge component in a business, governm
Read More
On the basis of electrical and electronic equipment, we are building a minor project of water level indicator with the alert system. This project helps to detect the different water tank levels (like overflow condition, top, middle, and bottom) with the help of three different LED notifications. We can also set the buzzer along with LED. Let’s see which equipments are required for this project. Components Used for this Project For a project, we required multiple electronic components to build the circuit. Thus, I am listing the name of the required equipment with the quantity. Three different colors LEDs Three 220Ω Resistor Four BC547 Transistor 9v DC Battery with clip connector Buzzer Electric Switch Zero PCB Board Breadboard and Connecting wire (Jumper wire) You can buy these components from Amazon. Electronic components used in this project does not cost you much. You can try this project at your home. You can make the circuit by two ways i.e. with soldering and without soldering. If you are using zero PCB board, you need a soldering iron for connecting the components and making a circuit. You can also make the circuit without using the PCB board. For that, you need a breadboard and connecting wires. You don’t need a soldering iron. You can choose either way. Here, I’m using the PCB board with soldering iron. Circuit Diagram of Water Level Indicator System You can see the following circuit diagram of the water level indicator for the water tank. With this circuit we have connected various electronics components. Circuit Diagram: circuit diagram of Water-tank-level-detector The above transistor (T) terminal is connected with a buzzer (B). And below three transistors are connected to three different LEDs like Red
Read More
In terms of health implications, making these changes can have profound positive effects on patient outcomes. By implementing the proposed changes, we can address medication errors more effectively, preventing patients from complicated health outcomes and adverse drug events, and improving overall patient safety. Similarly, medication reconciliation processes help ensure that patients receive accurate and appropriate medications throughout their hea
Read More
The type of scholarly information chosen is quite useful in explaining the issues of medication errors by sharing knowledge-based information on the possible causes of medication errors and the consequences that patients are likely to face. For example, communication failures investigations explain that general problems, including ambiguous directions and low e-health record interoperability, foster settings vulnerable to medical adverse
Read More
The interdisciplinary teams, such as physicians, pharmacists, nurses, fitness experts, and nutritionists, will all play their roles in providing patient-centered care. Nurses will undermine patients’ health status and provide care treatments as per patients’ health demands and desires (Hong et al., 2020). A nutritionist will delve into the patient’s dietary preferences and tailor meal plans that include healthy nutrients and are palatable to the patient. Fitness experts will guide patients on weight management and exercises to maintain regular weight. Physicians and pharmacists will collaboratively plan a pharmacological plan for patients to manage diabetes (Hong et al., 2020).
Read More