Search samples .

Our Samples Page showcases a collection of expertly crafted MATLAB solutions, complete with code examples, simulations, and detailed explanations. Whether you're working on image processing, data analysis, or algorithm development, these samples demonstrate the quality and precision we bring to every project.

matlabexcelsolutions samples

Campus Area Network System Design and Implementation Scenario Description: Campus Area Network:

Campus Area Network System Design and Implementation

Scenario Description: Campus Area Network:

Read More

The t/k-Diagnosability of Star Graph Networks

The t/k-Diagnosability of Star Graph Networks

 

The t/k-diagnosis is a diagnostic strategy at system level that can significantly enhance the system’s self-diagnosing capability. It can detect up to t faulty processors (or nodes, units) which might include at most k misdiagnosed processors, where k is typically a small number. Somani and Peleg ([26], 1996) claimed that an n-dimensional Star Graph (denoted Sn), a well-studied interconnection model for multiprocessor systems, is ((k + 1)n – 3k – 2)/k-diagnosable. Recently, Chen and Liu ([5], 2012) found counterexamples for the diagnosability obtained in [26], without further pursuing the cause of the flawed result.

In this paper, we provide a new, complete proof that an n-dimensional Star Graph is actually ((k + 1)n – 3k – 1)/k-diagnosable, where 1 ≤ k ≤ 3, and investigate the reason that caused the flawed result in [26]. Based on our newly obtained fault-tolerance properties, we will also outline an O(N log N) diagnostic algorithm ( N = n! is the number of nodes in Sn) to locate all (up to (k + 1)n – 3k – 1) faulty processors, among which at most k (1 ≤ k ≤ 3) fault-free processors might be wrongly diagnosed as faulty.

Read More

Immune particle swarm optimization of linear frequency modulation in acoustic communication

 

 

With the exploration of the ocean, underwater acoustic communication has attracted more and more attention in recent years. The underwater acoustic channel is considered to be one of the most complicated channels because it suffers from more serious multipath effect, fewer available bandwidths and quite complex noise. Since the signals experience a serious distortion after being transmitted through the underwater acoustic channel, the underwater acoustic communication experiences a high bit error rate (BER). To solve this problem, carrier waveform inter-displacement (CWID) modulation is proposed. It has been proved that CWID modulation is an effective method to decrease BER.

The linear frequency modulation (LFM) carrier-waves are used in CWID modulation. The performance of thecommunication using CWID modulation is sensitive to the change of the frequency band of LFM carrier-waves. The immune particle swarm optimization (IPSO) is introduced to search for the optimal frequency band of the LFM carrier-waves, due to its excellent performance in solving complicated optimization problems. The multi-objective and multi-peak optimization nature of the IPSO gives a suitable description of the relationship between the upper band and the lower band of the LFM carrier-waves. Simulations verify the improved performance and effectiveness of the optimization method

Read More

Implementation of network intrusion detection system using variant of decision tree algorithm

Implementation of network intrusion detection system using variant of decision tree algorithm

 

As the need of internet is increasing day by day, the significance of security is also increasing. The enormous usage of internet has greatly affected the security of the system. Hackers do monitor the system minutely or keenly, therefore the security of the network is under observation. A conventional intrusion detection technology indicates more limitation like low detection rate, high false alarm rate and so on. Performance of the classifier is an essential concern in terms of its effectiveness; also number of feature to be examined by the IDS should be improved.

In our work, we have proposed two techniques, C4.5 Decision tree algorithm and C4.5 Decision tree with Pruning, using feature selection. In C4.5 Decision tree with pruning we have considered only discrete value attributes for classification. We have used KDDCup’99 and NSL_KDD dataset to train and test the classifier. The Experimental Result shows that, C4.5 decision tree with pruning approach is giving better results with all most 98% of accuracy.

Read More

Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey

Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey

 

Mobile ad-hoc networks have to suffer with different types of packet dropping attacks. Therefore, we need strong mechanism to detect these malevolent nodes and to classify normal and abnormal nodes as per the behavior of nodes. Machine learning techniques distinguish outlier nodes quickly and accurately provide classification by observing behavior of those nodes in the network.

In this paper, we study various machine learning techniques as artificial neural network, support vector machine, decision tree, Q-learning, Bayesian network for identifying the malicious nodes. These techniques are able to detect black hole, gray hole, flooding attacks and other packet dropping attacks. These types of misbehaving nodes are identified and future behaviors of the nodes are predicted with supervised, un-supervised, reinforcement machine learning techniques.

 

Read More

A novel performability assessment approach of Mobile Ad Hoc Network

A novel performability assessment approach of Mobile Ad Hoc Network

 Omnet++ Simulator  November 30, 2015  2015 OMNeT++ Projectsmixim omnetOMNeT++ WBAN

In Mobile Ad hoc Networks (MANETs), system performance degrades when some switching nodes and/or communication links fail to operate. As a result, the performability (performance reliability) assessment of MANETs is very important. However, because of the impact of dynamic topology, the traditional system performability analysis methods, such as Dynamic Fault Tree (DFT) and Dynamic Reliability Block Diagrams (DRBD), can’t be applied to evaluate MANETs. In this paper, we propose a hierarchical modeling approach for performability analysis of MANETs with repairable components. The lower level network components are described by Markov Reward Chains (MRC), which allow complex component failure/repair behaviors to be modeled.

At the upper level, the MANET is considered as a small-world network, and the characteristic path length of the network is used to ascertain the global status of the network. The proposed hierarchical modeling approach combines the characteristics of small-world network and Markov chain theories together. A specific case of MANET is presented to support our approach in this paper. What’s more, we build the same network scenario in OPNET and implement some simulation experiments. The results show a very good correspondence of performability analysis between our approach and the OPNET simulation.

Read More

Transmission network expansion planning considering uncertainties in loads and renewable energy resources

Transmission network expansion planning considering uncertainties in loads and renewable energy resources

 

This paper proposes a novel method for transmission network expansion planning (TNEP) that take into account uncertainties in loads and renewable energy resources. The goal of TNEP is to minimize the expansion cost of candidate lines without any load curtailment. A robust linear optimization algorithm is adopted to minimize the load curtailment with uncertainties considered under feasible expansion costs. Hence, the optimal planning scheme obtained through an iterative process would be to serve loads and provide a sufficient margin for renewable energy integration.

In this paper, two uncertainty budget parameters are introduced in the optimization process to limit the considered variation ranges for both the load and the renewable generation. Simulation results obtained from two test systems indicate that the uncertainty budget parameters used to describe uncertainties are essential to arrive at a compromise for the robustness and optimality, and hence, offer a range of preferences to power system planners and decision makers.

Read More

A Comparative Performance Analysis of Interweave and Underlay Multi-Antenna Cognitive Radio Networks

A Comparative Performance Analysis of Interweave and Underlay Multi-Antenna Cognitive Radio Networks

 

In this paper, an analytical performance study for multi-antenna Cognitive Radio (CR) systems is presented. The two most popular CR approaches, namely, the interweave and underlay system designs, are considered and based on the derived analytical framework, a throughput-based comparison of these two system designs is presented. The system parameters are selected such that a quality of service (QoS) constraint on primary communication, is satisfied. Closed form expressions for the outage probability at the Primary User (PU), as well as expressions for the ergodic rate of the Secondary User (SU) are derived, for both system designs. The derived expressions are functions of key design parameters, such as the sensing time and the detection threshold in the case of interweave CR, and the maximum allowable interference power received by the PU, in the case of underlay CR.

Based on the derived expressions, for interweave CR, the sensing parameters, i.e., sensing time and energy detection threshold, are optimized such as to maximize the secondary system rate. By comparing the throughput performance for both system designs, the existence of specific regimes (in terms of primary activity, number of transmit and receive antennas as well as the outage probability of the PU), where one CR approach outperforms the other, is highlighted.

Read More

A Comparative Performance Analysis of Interweave and Underlay Multi-Antenna Cognitive Radio Networks

A Comparative Performance Analysis of Interweave and Underlay Multi-Antenna Cognitive Radio Networks

 

In this paper, an analytical performance study for multi-antenna Cognitive Radio (CR) systems is presented. The two most popular CR approaches, namely, the interweave and underlay system designs, are considered and based on the derived analytical framework, a throughput-based comparison of these two system designs is presented. The system parameters are selected such that a quality of service (QoS) constraint on primary communication, is satisfied. Closed form expressions for the outage probability at the Primary User (PU), as well as expressions for the ergodic rate of the Secondary User (SU) are derived, for both system designs. The derived expressions are functions of key design parameters, such as the sensing time and the detection threshold in the case of interweave CR, and the maximum allowable interference power received by the PU, in the case of underlay CR.

Based on the derived expressions, for interweave CR, the sensing parameters, i.e., sensing time and energy detection threshold, are optimized such as to maximize the secondary system rate. By comparing the throughput performance for both system designs, the existence of specific regimes (in terms of primary activity, number of transmit and receive antennas as well as the outage probability of the PU), where one CR approach outperforms the other, is highlighted.

Read More

Mobile Sink based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks

Mobile Sink based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks

 

Energy hole problem is a critical issue for data gathering in Wireless Sensor Networks. Sensors near the static sink act as relays for far sensor and thus will deplete their energy very quickly, resulting energy holes in the sensor field. Exploiting the mobility of a sink has been widely accepted as an efficient way to alleviate this problem. However, determining an optimal moving trajectory for a mobile sink is an NP-hard problem. Thus, this paper proposed a Mobile Sink based adaptive Immune Energy-Efficient clustering Protocol (MSIEEP) to alleviate the energy holes. MSIEEP uses the Adaptive Immune Algorithm (AIA) to guide the mobile sink based on minimizing the total dissipated energy in communication and overhead control packets.

Moreover, AIA is used to find the optimum number of Cluster Heads (CHs) to improve the lifetime and stability period of the network. The performance of MSIEEP is compared with the previously published protocols; namely LEACH, LEACHGA, A-LEACH, rendezvous and MIEEPB using Matlab. Simulation results show that MSIEEP is more reliable and energy efficient as compared to other protocols. Furthermore, it improves the lifetime, the stability and the instability periods over the previous protocols, because it always selects CHs from highenergy nodes. Moreover, the mobile sink increases the ability of the proposed protocol to deliver packets to the destination.

Read More

Search in Combined Social and Wireless Communication Networks: Delay and Success Analysis  

Search in Combined Social and Wireless Communication Networks: Delay and Success Analysis

 

Read More

Sophisticated Traffic Lights Control using Neural Networks

Sophisticated Traffic Lights Control using Neural Networks

 

This research work presents the previous results of implementing autonomous traffic light control system based on sophisticated agents to overcome problems like congestion, pollutant emissions and fuel consumption in modern cities. The proposed agent based approach uses back propagation neural networks to provide green light intervals according to the demand level of the intersection. The effectiveness of this proposal is tested simulating two traffic intersections.

To do this, the paper also introduces a novel simulator and emission analyzer developed to run a set of tests in order to compare the presented methodology with traditional traffic control methods. Preliminary results demonstrate the efficiency of the introduced approach, offering significant mobility and environmental benefits. For example, for the first test and using observed traffic volumes, our approach increase mobility in 28% and reduce the fuel consumption in 20%.

Read More

Self-Diagnosis Technique for Virtual Private Networks Combining Bayesian Networks and Case-Based Reasoning

 

 

Fault diagnosis is a critical task for operators in the context of e-TOM (enhanced Telecom Operations Map) assurance process. Its purpose is to reduce network maintenance costs and to improve availability, reliability and performance of network services. Although necessary, this operation is complex and requires significant involvement of human expertise. The study of the fundamental properties of fault diagnosis shows that the diagnosis process complexity needs to be addressed using more intelligent and efficient approaches. In this paper, we present a hybrid approach that combines Bayesian networks and case-based reasoning in order to overcome the usual limits of fault diagnosis techniques and to reduce human intervention in this process.

The proposed mechanism allows the identification of the root cause with a finer precision and a higher reliability. At the same time, it helps to reduce computation time while taking into account the network dynamicity. Furthermore, a study case is presented to show the feasibility and performance of the proposed approach based on a real-world use case: a Virtual Private Network topology.

Read More

Machine Learning and Robotics for Advanced Medical Applications: Developing Robotic-Based Systems for Targeted Drug Delivery

Machine Learning and Robotics for Advanced Medical Applications: Developing Robotic-Based Systems for Targeted Drug Delivery

 

 

 

Need original Research Paper?

Generate Free Research Paper

 

Over the last few years, minimally invasive operations have improved drastically due to medical robotics, which has transformed how complex operations are conducted. The InTarget project, which wants to take medical robotics to the next level, seeks EPSRC financing to build a robotic-based system capable of intelligent magnetic field control for targeted drug delivery (Al-Mamun et al., 2018; Sadeghi et al., 2020). But this proposal seeks to construct a robotic system that addresses current drug delivery methods' drawbacks, increasing patient safety and treatment efficacy.

 

Current invasive therapies can cause difficulties despite minimally invasive ones. Robotic-based systems for drug delivery can enable precise, non-invasive delivery of medication to precise physical targets. This mitigates complications from off-target impacts and open surgery. Magnetic fields can control drug delivery systems, thanks to technological advances in robotics. Liu et al. Welcome this technology so clinicians may give medication more accurately, improving patient safety and decreasing adverse effects. Machine learning can improve robotic drug delivery devices by facilitating real-time monitoring. The Artificial Intelligence-powered technology can adapt to patient-specific conditions and variables during the operation to improve its accuracy, efficacy, and safety. These systems may change magnetic force and other production factors to ensure constant synchronization (Wang et al., 2021). Thus, minimally invasive operations have become standard and offer several advantages, including fewer complications compared to traditional invasive methods. Robotics and machine learning give new advantages and opportunities to advanced medical treatments should developments in medicine continue. It is an effort greatly required by our world today.

 

References

 

Al-Mamun, A., Khanam, S., Rahman, M. F., Ullah, M. S., Nazuous, A. H. I. E., Khan, B. S., & Istiaq, A. (2018). Minimally invasive surgery: A review. Journal of Surgical Research, 229, 90–100. https://doi.org/10.1016/j.jss.2018.03.015

 

Liu, K. J., Zheng, P., Ma, L., Qiu, F., Xu, Y., Ding, L., Wu, W., & Jiang, W. (2021). Application of magnetic targeting therapy with multifunctional magnetic nanoparticles in periarticular osteolysis in a rabbit model. International Journal of Nanomedicine, 16, 5751–5769. https://doi.org/10.2147/ijn.s314048

 

Sadeghi, K. T., Gharahdaghi, T., & Karamalkov, A. (2020). Magnetic artificial periodic bionic system for smart drug delivery. Journal of Biomedical Materials Research Part A, 108(11), 2335–2341. https://doi.org/10.1002/jbm.a.36889

 

Wang, Y., Wei, Z., Wu, B., Zhang, L., Yang, J., Zhang, X., Xu, R., Chen, S., & Nebe, J. B. (2021). Machine learning prediction of titanium surface roughness on the osseointegration of endosseous implants in preclinical rabbits. Frontiers in Bioengineering and Biotechnology, 8, 694871. https://doi.org/10.3389/fbioe.2020.694871

Read More

w do you feel about the idea of non 1:1 mappings of physical and virtual environments described on page 531? Do you agree with the authors premise? If so, in what kinds of applications could you foresee this being useful? If not, in what kinds of problems do you foresee this type of mapping having? : Let us incorporate the physical interfaces (sensors and

Non 1:1 Mappings of Physical and Virtual Environments: A New Perspective

 

I agree with the authors' assertion regarding non 1:1 mappings of virtual and physical realities. The non-standard mapping of the magnetic sensor to the viewpoint is particularly useful when vertical viewpoint motion is restricted or blocked (de Chardin et al., 2019). This could happen, for instance, while engaging with a virtual environment (VE) of a building with tall ceilings when riding an escalator or immersed in a VE of a forest with a tall canopy while riding a bike on the forest floor. Therefore, in this instance, the non 1:1 mapping will allow a user to enjoy a completely different experience of riding a bike in the forest while using virtual reality technology. Despite the possibility of the user detecting incongruence between the actual and virtual activity (de Chardin et al., 2019), the purpose of entertaining is valued more than realism. In this vein, while the mapping could cause incongruence, it is possible to implement have fun and enjoy.

In addition, this mapping allows the possibility of experimenting with the VE from various angles, which would normally demand a physical body with different physical attributes and abilities as well as movements to accommodate. For instance, a child is learned to comprehend the world as an owl with such physical experience for moving its body and head at an angle of 180 degrees. While the mapping allows for kinesthetic incongruence, the opportunity to engage with various forms of VE almost is incomparable. Therefore, while this mode of mapping creates incongruence, the ability to play, learn, adapt, and understand different environments is perhaps the most useful, especially from the perspectives of entertainment and child development.

Need original Essay?

Generate Free Essay

 

References

De Chardin, G., Geumpels, M., Lefebvre, R., & Tordeux, A. (2019). You suffer from an extreme form of VR sickness! Measurement Olfactory exogenous cues influence multisensory interactions. Proceedings of the ACM on Human-Computer Interaction, 3, 1–23. https://doi.org/10.1145/3226065

Read More

Cyber Security Research Approach: Enhancing WP A2-PSK Four-Way Handshaking after Re-authentication to Deal with De-authentication Followed by Brute-Force Attack

 

Methods

The authors propose a novel re-authentication protocol while investigating the issue of whether a re-authentication procedure and an accompanying improvement algorithm would help attain better security and performance over brute-force attacks and improve handshaking performance. In doing this, the researchers achieve a better outcome in terms of the highest electromagnetic vector similarity (HEVS) as well as average throughput and packet loss rate. Clearly laid out research questions help the authors in coming up with a research design and methods that are pertinent to the research question. This is mainly achieved by examining the De ?authentication end result followed by Grunting Feasibility (DoSGF) in 4WHEPSK-centered to authenticate the interplay to land the less complicated choice. Therefore, the following steps were taken:

Selection of variables that are associated with better methods and victory of intruders. In this way, the authors localize a comparable indicator that can deal with re-authentication features (Afzal et al., 2022). This also entails realigning the cryptographic algorithm into a new re-authentication process for further robustness in particle rate and throughput.

Formulation of Hypotheses: includes defining the Delta and NS1NSS1 among cycles of the related indicator and formulating the hypothesis. If the values of Delta < NS1NSS1 echoing in cycles of the related index, the null hypothesis is upheld.

 

Establishing a function upgrade Performance (FUP) to comparison process stability between 4WHEPSK-focused re-authentication algorithms - 802.1x re-authentic- (HAFRITURA) and 802.11i re-authenticated.

Calculations and model passages to evaluate the theoretical capacity, packet loss rate, and electromagnetic vector similarity. Forward and reverse 4WHS model requires extracting and modifying entity ninety-three. The mathematical formulas are presented, and the researchers catalog the required variables metrics and configurations.

Read More

ompare and contrast the three operating systems (Windows, Linux, and MacOS)s

Compare and Contrast the Three Operating Systems

It is worth noting that there are many types of software programs available in the current
market currently. Most of the operating systems available are open-source platforms accessible
for customization by manufacturers to fulfill the specific demands of their various devices.
Windows, macOS, and Linux are the three most popular operating systems available today. All
the three have their own set of pros and downsides, although they all contribute to a more
adaptable user experience, albeit they each shine differently.
Windows is a commonly used operating system (OS) with a big user base with most
applications written for it. Windows OS has a greater degree of hardware support than any other
operating system. Because Windows is so extensively applied across the globe, most new games
are released for it first (Malallah et al. 25). However, because they are used so extensively
compared to other operating systems, Windows are highly sensitive to infections. Ninety-five
percent of viruses are programmed for Windows. The Windows OS is proprietary. Windows is
more costly than other competing operating systems like Android since it has a Microsoft-
exclusive license. In addition to that, windows also possess extra features and are compatible
with practically any brand of hardware and software program out there (Jana 3). To crown it all,
windows has made significant strides forward in terms of security compared to previous
versions. It also needs a large number of resources.

Surname 2
The other operating system in the list is Linux which is known to be completely free to
download, install, and distribute since it is an open-source operating system, there are many
different varieties available because you may customize it to your liking. According to Malallah
et al. (18), Linux is built on a monolithic kernel. Compared to Windows, it is more efficient in
terms of operations since it uses the forward slash as a path separator between directories. It is
also quite stable, but it is also extremely susceptible to infection (Tsvetkov 170). However, many
Windows applications will not operate on Linux, and there are far fewer drivers available for
Linux than for Windows.
The macOS operating system offers a simplified user interface that is consistent with its
hardware integration. The OS includes many free productivity apps that come with it (Malallah
et al. 20). Apps were added and deleted from the operating system as it progressed from the
original MacOS. It enjoys the advantage of not being very susceptible to viruses and malware
like other competitors. The iPod music player and music applications for the Mac, such as
iTunes and GarageBand, were created by Apple because they considered music a major market.
Multitasking and ease of usage with a number of other Apple devices are two of its main
advantages. However, macOS has been deemed prohibitively costly and only available for
Apple-approved hardware, making them incompatible with computer upgrades (Malallah et al.
29). Another issue with these operating systems is that very few game titles are available for
them in the market.
In conclusion, depending on an individual’s requirements, some operating systems will
perform better than others. However, the above comparison shows that Windows and Linux give
the greatest hardware and program support than Mac OS. When it comes to Windows, they can
run practically any application currently available. It is also possible to interact with a computer

Surname 3
using an operating system even if one does not understand the machine’s language. As a result, a
computer is rendered inoperable if it does not have an operating system.

Surname 4

Works Cited

Hasnain, Sk Golam Muhammad, and Farhan Ar Rafi. “Windows, Linux, Mac Operating System
and Decision Making.” International Journal of Computer Applications 975: 8887.
Jana, Indranil. “Effect of ARP poisoning attacks on modern operating systems.” Information
Security Journal: A Global Perspective 26.1 (2017): 1-6.
Malallah, HayfaaSubhi, et al. “A comprehensive study of kernel (issues and concepts) in
different operating systems.” Asian Journal of Research in Computer Science (2021): 16-
31.
Tsvetkov, Konstantin. “OPERATING SYSTEMS: PAST, PRESENT AND FUTURE.” New
knowledge Journal of science 9.2 (2020): 167-175.

Read More

NET 594 - Network Capstone Major Case Study Daemons Frequent and Urgent Net-traders “DaFUN”

MAJOR CASE STUDY OVERVIEW 1.1. Case Study Overview Daemons Frequent and Urgent Net-traders (DaFUN) is a hedge fund company that uses the same amount of money for both domestic and international dealings, they have a minimum of $1 million funds that get multiplied after the business is successfully done. A hedge company is the one that sets the goals and once the goals are set half of the success is ensured as they invest large amounts at an international and domestic level such that the probability of profit is increased (Brav et al., 2010). DaFUN is a company that uses proprietary trading algorithms to buy and sell stocks. The business requirements for this company are the funds and business goals that they need to plan effectively to ensure that their stock business goes in profit. The technical requirements of the company are proprietary trading algorithms that are made by programmers to keep the confidentiality and the security set up of their application. They will create a secure network for domestic and international businesspeople who can access the network and bid according to their choice for the stock business. Thus, business requirements include managing the funds and profit goals, and as for the technical requirements they need to work a network plan effectively to have a sustainable future. The research manufacturer will use a strong network for comprehensive and complex communication infrastructure, they will use effective material for the construction where the different parts of the office are arranged in a way that they are connected and allow easy communication. The components that will be used for secure and effective communication in an office, a sturdy infrastructure will be designed. The manufacturers will use walls, connectors, IBM, door, network, spaces, beams, building envelope, column, electric fixture, equipment, fixtures, flow terminals, furniture, grid line, HVAC, movable and non-movable furnishings, service bay, notation, vertical services, vertical circulation, windows, cabinet, computer, electric appliances, NET_594, Spring 2022 JP Labruyère / GB Brewster/A Chung DaFUN - 6 - Major Case Study opening element, plumbing fixture, power column, printer, and stairs. Thus, this equipment and materials will be used for the design that will be analyzed and explained in the report. The design will be a detailed one where using walls, windows, furniture, beams, and cabinets placement will be assured that the communication within the area is safe and for ensuring that the communication is coherent between the office’s different networks, connectors, and electrical equipment will be used to transmit the messages within a closed setup. Thus, the two main aspects of the design will be to make sure that the messages and information do not get out of the building and to ensure that the communication within the building is smooth and audible to every employee in good quality for a proper business. To implement the plan, the design will be followed according to the Visio drawing such that each component will be placed as shown in the figures of the drawings. The following case study will be a detailed infrastructure design of the three official locations of

Read More

NURS FPX 6111 Assessment 2 Criteria and Rubric Development

 

Affective

This area assessed the nurse’s ability to implement evidence-based learning in their professional practice where they support their actions with theoretical knowledge that is supported by research articles (Nascimento et al., 2021).

Knowledge Gaps

Read More

Universal Basic Income, Guaranteed Federal Job, and Reduced Work Week DB FPX 8410 Assessment 5 The Future of Work

 

A universal basic income is where the government pays each citizen a set amount of money per month. The idea behind this concept is to put most citizens on an equal playing field in terms of income. A pro of this concept is a reduction of the stigma that surrounds government benefits such as food assistance and welfare (Gaille, 2019). If there are parameters around who qualifies for the payments, it would encourage people to still work while getting the payment (Gaille, 2019).

Read More

In this assignment you have to develop a program based on incremental processes of collecting software requirements, designing, coding, testing and debugging to manage a car rental system. The program should work for a ‘Taxi’ service at different levels, prices, and cars. The customer can either hire a car or rent their car.

The platform should offer an administration interface where the taxi company can manage the content, and access all bookings and customer information. More and more Taxi companies are looking for integrated taxi booking systems as it makes life much easier for (1) The traveler - this is highly important and in today's internet age people should be able to book taxis online without having to pick up the phone and (2) the taxi company as all their bookings are now managed via an automated system which means they have an electronic record of future and historic bookings A Cab Booking/Hiring is a system that can be used temporarily for a period of time with a fee. Hiring a car assists people to get around even when they do not have access to their own personal vehicle or don't own a vehicle at all. The individual who want to hire/rent a car must first contact the cab hiring company for the desire vehicle. This can be done online. At this point, this person has to supply some information such as: dates of rental, and type of car. After these details are worked out, the individual renting the car must present a valid Identification Card. Most companies throughout the industry make a profit based of the type of cars. The hiring cabs are categorized into economy, compact, compact

Read More

Graphical representation of Modulating signal with matlab

Question 3

 

clc;

close all;

clear all;

Am=1; % Amplitude of modulating signal

fm=400; % Frequency of modulating signal

Fs = 16000; % Sampling frequency

t = 0:1/Fs:0.01; % Time vector of 1 second

ym=Am*sin(2*pi*fm*t); % Eqation of modulating signal

figure(1)

subplot(3,1,1);

plot(t,ym), grid on;% Graphical representation of Modulating signal

title ( '  Modulating Signal   ');

xlabel ( ' time(sec) ');

ylabel (' Amplitud(volt)   ');

% carrier signal generation

fc=6000;% Frequency of carrier signal

Tc=1/fc;% Time period of carrier signal

yc= sin(2*pi*fc*t);% Eqation of carrier signal

subplot(3,1,2);

plot(t,yc), grid on;% Graphical representation of carrier signal

title ( '  Carrier Signal   ');

xlabel ( ' time(sec) ');

ylabel (' Amplitud(volt)   ');

% AM Modulation

y=(1+Am*sin(2*pi*fm*t)).*sin(2*pi*fc*t); % Equation of Amplitude

%modulated signal

subplot(3,1,3);

plot(t,y);% Graphical representation of AM signal

title ( '  Amplitude Modulated signal  ');

xlabel ( ' time(sec) ');

ylabel (' Amplitud(volt)   ');

grid on;

 

Read More

Two sinusoidal waveforms in quadrature with matlab

Question 2

f = 250:250:2000

Fs = 16000; % Sampling frequency

t = 0:1/Fs:0.005; % Time vector of 1 second

amp = 1;

Read More

Sine wave generator with matlab

Question 1

f = 250:250:2000

Fs = 16000; % Sampling frequency

t = 0:1/Fs:0.005; % Time vector of 1 second

amp = 1;

x = amp * sin(2*pi*t'*f);

plot(t,x)

title('Sine wave generator');

xlabel('Time in seconds');

ylabel('Sinusoidal waveform');

grid on

 

Question1code

 

f =

 

         250         500         750        1000        1250        1500        1750        2000

 

Read More

implementing simple graphical effects that use the information extracted from the human face achieved through TensorFlow, sklearn, skimage, and Keras. Face segmentation

 

 

 

 

 

 

 

 

ABSTRACT

Detection, extraction, segmentation, and recognition of face as part of the intelligent living application is very vital in our daily life. Alignment and segmentation are part and play a significant role in face recognition systems. The landmarks derived from the shape of the faces by alignment methods are used in many applications, including real face classification and virtual face animation. In this paper, Sklearn, Keras, Skimage, and TensorFlow methods will be used to train the model with provided datasets, align the image data to identify facial landmarks, and segment data to realize face vector points for the segmented image. 

 

 

 

INTRODUCTION

Image identification is very fundamental in application areas such as Biometric systems and computer vision. The objective of this paper is to implement a Face Segmentation system that can partition a human face into sections, identify and align corresponding landmarks of that image. This paper also focuses on implementing simple graphical effects that use the information extracted from the human face. Face segmentation will be of focus in this paper rather than face detection, which only involves determining whether objects are faced or not.

 

This paper is significant due to many ongoing and emerging applications in the field of computer vision. Such applications include Facial Recognition System, which can identify and recognize human faces uniquely based on pixels properties. Facial recognition system has several applications such as login credentials in android and computer systems, video surveillance using the concept of face tracking, among others.

 

Extensive accelerated research has been done on face segmentation, but still, there is a lot to be fully and convincingly solved. The problem has been fueled by the existence of complex content of images and their applications.

 

This paper is organized into distinct parts, preprocessing, face alignment, face segmentation, and graphical effect implementation. The paper will also have a recommendation and a conclusion.

 

PREPROCESSING

 

Machine learning algorithms will only work with vectors alone. There is, therefore, the need to convert training data into vectors. In this paper, the dataset provided is in matrix form. We will take advantage of the TensorFlow iterator object known as image_data_generator, which creates several variables that can be used to preprocess the data.

Read More

AQUIRED INTELLIGENCE AND ADDAPTIVE BEHAVIOURARTIFICIAL NEURAL NETWORK

AQUIRED INTELLIGENCE AND ADDAPTIVE BEHAVIOUR

ARTIFICIAL NEURAL NETWORKAQUIRED INTELLIGENCE AND ADDAPTIVE BEHAVIOUR

ARTIFICIAL NEURAL NETWORK

Read More

 Answer for HCA 620 Consider the following hypothetical situation: You are a human resources manager in a medium-sized hospital Re: Topic 6 DQ 2

Impressive operative administrator may be answerable for statistics get admission to, workforce, debts payable, supply file access, dealing with the associations, human resources helping and generating managerial and software assets in cooperation with this system upfront, and different responsibilities (Scheeres, 2010). It’s accountable for improving the operational frameworks, processes and approaches in backing of affiliation project, in particular, bolster better administration, reporting, data movement and management, business system and authoritative arranging ( Scheeres, 2010). It fills a huge component in a business, governm

Read More

An Automatic Solar tracking system by using Micro-controller

An Automatic Solar tracking system by using Micro-controller

Read More

Water Tank Level Indicator with an Alarm System

On the basis of electrical and electronic equipment, we are building a minor project of water level indicator with the alert system. This project helps to detect the different water tank levels (like overflow condition, top, middle, and bottom) with the help of three different LED notifications. We can also set the buzzer along with LED. Let’s see which equipments are required for this project. Components Used for this Project For a project, we required multiple electronic components to build the circuit. Thus, I am listing the name of the required equipment with the quantity. Three different colors LEDs Three 220Ω Resistor Four BC547 Transistor 9v DC Battery with clip connector Buzzer Electric Switch Zero PCB Board Breadboard and Connecting wire (Jumper wire) You can buy these components from Amazon. Electronic components used in this project does not cost you much. You can try this project at your home. You can make the circuit by two ways i.e. with soldering and without soldering. If you are using zero PCB board, you need a soldering iron for connecting the components and making a circuit. You can also make the circuit without using the PCB board. For that, you need a breadboard and connecting wires. You don’t need a soldering iron. You can choose either way. Here, I’m using the PCB board with soldering iron. Circuit Diagram of Water Level Indicator System You can see the following circuit diagram of the water level indicator for the water tank. With this circuit we have connected various electronics components. Circuit Diagram: circuit diagram of Water-tank-level-detector The above transistor (T) terminal is connected with a buzzer (B). And below three transistors are connected to three different LEDs like Red

Read More

NURS FPX 6218 Assessment 1 Proposing Evidence-Based Change

 

In terms of health implications, making these changes can have profound positive effects on patient outcomes. By implementing the proposed changes, we can address medication errors more effectively, preventing patients from complicated health outcomes and adverse drug events, and improving overall patient safety. Similarly, medication reconciliation processes help ensure that patients receive accurate and appropriate medications throughout their hea

Read More

Reasons That the Chosen Information Helps to Explain a Health Care Issue

Reasons That the Chosen Information Helps to Explain a Health Care Issue

 

The type of scholarly information chosen is quite useful in explaining the issues of medication errors by sharing knowledge-based information on the possible causes of medication errors and the consequences that patients are likely to face. For example, communication failures investigations explain that general problems, including ambiguous directions and low e-health record interoperability, foster settings vulnerable to medical adverse

 

Read More

NURS FPX 4900 Assessment 4 Patient Family or Population Health Problem Solution

 

The interdisciplinary teams, such as physicians, pharmacists, nurses, fitness experts, and nutritionists, will all play their roles in providing patient-centered care. Nurses will undermine patients’ health status and provide care treatments as per patients’ health demands and desires (Hong et al., 2020). A nutritionist will delve into the patient’s dietary preferences and tailor meal plans that include healthy nutrients and are palatable to the patient. Fitness experts will guide patients on weight management and exercises to maintain regular weight. Physicians and pharmacists will collaboratively plan a pharmacological plan for patients to manage diabetes (Hong et al., 2020). 

Read More

Start your project today