Facial expression recognition (anger, sad, happy, disgust, surprise, fear expressions) is application of advanced object detection, pattern recognition and classification task. Facial expression is one of the most powerful and natural means for human beings to show their emotions. It has found its applications in human-computer interaction (HCI), robotics, border security systems, forensics, machine vision, video conferencing, user profiling for customer satisfaction, physiological research etc. Although humans can detect facial expressions with less effort and delay but it is still a challenge for the machine to fast and effectively detect facial expressions. Therefore algorithms should be developed to thought machines to understand facial gestures. This paper focuses on a review of different techniques for facial expression recognition.
Keywords: - Gabor filter, Log-Gabor filter, Local Binary Pattern, PCA, LDA, SVM, K-NN
This paper presents a two stage approach that determines the optimal location and size of capacitors
on radial distribution systems to improve voltage profile and to reduce the active power loss. In first stage, the
capacitor locations can be found by using loss sensitivity method. Cuckoo search algorithm is used for finding
the optimal capacitor sizes in radial distribution systems. The sizes of the capacitors corresponding to maximum
annual savings are determined by considering the cost of the capacitors. The proposed method is tested on 15-
bus, 34-bus and 69-bus test systems and the results are presented.
Keywords: - capacitor placement, loss sensitivity method, cuckoo search algorithm, radial distribution system
In this work the near distance measurement system was presented .The system are consist from transmitter and receiver .The transmitter is used as semiconductor laser at wavelength 526 nm and the power 5 mw and the receiver are consist of optics part and web camera .The concept of operation is transmit a pulse of laser and then is received the reflected pulse from the object .The software program was written in C# language to calculate the object distance .The accuracy of the measurement distance is high. The error in the distance measurement reach to ±3cm.
Keywords: - distance measurement, laser distance measurement
[1] Isaac Cohen and Gerard Medioni. Detecting and tracking objects in video surveillance.In Proceeding of the IEEE Computer Vision and Pattern Recognition 99,Fort Collins, June 1999.
[2] Brian Gerkey, Kasper Stoy, and Richard T. Vaughan.Player robot server. Institutefor Robotics and Intelligent Systems Technical Report IRIS-00-391, Universityof Southern California, 2000.
[3] Stephen S. Intille, James W. Davis, and Aaron F. Bobick. Real-time closed worldtracking. In Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, pages 928{934, June 1997.
[4] Andrew Ng. Em algorithm. CS229 Class Notes, 2008.
[5] Hai Nguyen. Ros wiki: Camera calibration, 2008.
Now days every organization is migrating towards cloud computing as cloud computing is considered being more flexible and scalable as compared to other technologies. The technology simply means to provide the computing resources and services through a network. Amazon EC2, yahoo emails, Gmail, Google connect are few of the examples of cloud computing. Since cloud technology is widely adapted issues with this technology must be focused very carefully. This paper overviews the major areas which must be explored in cloud computing.
Keywords: - Cloud Computing, Cloud Gaming, Data Centers, Data Migration, Green Cloud.
Intensity modulated radiation therapy (IMRT) is a modern technique in cancer treatment that radiation dose is more closely shaped to fit the tumour and spared nearby critical normal tissues. This technique has been recognized and widely used in clinical applications by linear accelerators (LINAC) with multi-leaf collimator (MLC) systems in developed countries. However, almost LINAC without MLC have still been used most countries, but it could be applied this technique for LINACs with jaws that are not to need use of MLC. The aim of this study is to apply IMRT technique by Prowess Panther code for cancer patients in Dongnai General Hospital. This is particularly significant in both society and economy in difficult conditions of our country due to high cost of LINACs with MLCs. Besides, the climate has been hot and wet in Vietnam, so operation and maintenance for the LINAC with MLCs has been very difficult.
Keywords: - Intensity modulated radiation therapy (IMRT), Cancer, Linear electron accelerator (LINAC), Multi-leaf collimator (MLC).
Dongnai General Hospital1 Dalat Vocational Training College2 .
Intensity modulated radiation therapy (IMRT) is becoming the standard care for many tumor sites/types. IMRT is delivered with mostly multi-leaf collimator (MLC), and occasionally with compensators. Recently, investigators are also exploring the use of independent Jaws, an alternative to MLC and compensators, to deliver IMRT. It has been shown that the Jaw-only IMRT (JO-IMRT) is capable of generating conformal dose distributions comparable to those generated by MLC. Very recently, JO-IMRT is implemented in a commercial system (Panther, Prowess Inc.) using direct aperture optimization (DAO) algorithm, the optimizer in our approach directly produces apertures using conventional jaws with optimized weighting factors.
In this research work I introduce a new system named meiosis based ciphering and hash function generation (MCHF) algorithm for encryption, cryptographic hash function generation, pseudo random number generation, 3D login system and optimisation for various security levels of cloud computing using the concepts of meiosis rendered from molecular biology and willing to give light to a sector in computer science called Digital Cell Emulation Technique which can further be used for other purposes for better results than one which I included in this research work; here I render the concept of meiotic cell division process undergone during fertilization which is the real reason (chromosomal cross over) for dissimilarity of an individual (Genetically) to another. I consider the latest finding of chaotic movement of DNA during meiosis and the motion that takes place in the fluid is theoretically implemented using 3D Navier Stokes equation which is meant for calculating the movement of Newtonian fluids like DNA in 3D space, which I render to emulate the cross over during metaphase of meiosis. Initial encryption is carried out which imitates the cross over and then the hash code generation that imitates the nucleotide formation or DNA shrinking to form chromosomes. This algorithm ensures all the requirement standards for a good hash code algorithm with secure encryption using 1024 bit key and can be used for pseudo code generator as it maintain a good proportion between the no. of 0's and 1's in the binary output. Further the hash code will be implemented for 3D login system to 100% override brute force attack as the process of login will be 100% human interaction based. Then I will be demonstrating the optimisation pseudo code generation and will be comparing it with the existing algorithm to show the betterment in time, throughput and power with statistical result created dynamically during each execution.
Keywords: - Cloud security, Genetic algorithm, Meiosis based cryptography, Navier-stokes equation.
The utilization of industrial and agricultural waste produced by industrial processes has been the focus of waste reduction research for economical, environmental, and technical reasons. Sugar-cane bagasse is a fibrous waste-product of the sugar refining industry, along with ethanol vapor. This waste product (Sugare-cane Baggase Ash) is already causing serious environmental pollution, which calls for urgent ways of handling the waste. Bagasse ash mainly contains aluminum ion and silica. The objective of this study is to benefit from the fibrous waste- product of the Sugar refining industry i.e. Sugar Cane Bagasse Ash (SCBA). It is very valuable Pozzolanic material if carbon free and amorphous ash could be obtained by further combustion (1). This SCBA waste can be mixed with either lime or OPC to produce material that has Pozzolanic properties. SCBA for this study was brought from Sudanese Sugar Company (Three samples were brought from Asalaia, Sinnar and Guneid Sugar Companies). The samples were grounded firstly and tested for the chemical contents and physical properties and after that mixed with partial replaced in the ratio of 0%, 10%, 20%, and 30% by weight of OPC to form concrete to detect the fresh and hardened properties of the mix. The results recorded were showed that the SCBA produced a reactive material relatively free from carbon and other organic matter. The better strength tests were reached with ideal mixes of 10% of SCBA with OPC, which gave 0.96% comparing to pure OPC mix. The recommendation is that SCBA can be mixed with OPC in the above proportions to be used in the manufacturing of blocks and mortars or plasters.
Keywords: - Bagasse Ash, Pozzolanic reactivity, cementitious material, blended cement, workability, compressive strength.
© 2019 All Rights Reserved | Design by iosrjen