The present study entitled “LIBRARY READING HABITS: AN EXPLORATORY STUDY ON SCHOOL CHILDREN OF DELHI ” was carried out to check the time spent by the school children in the library. The study was carried out in six schools of Delhi out of which two are Government, two are Government aided and two are Private schools, viz., School A, School B, School C, School D, School E and School F respectively. One hundred eighty people formed part of the sample to understand their perspective. Salient features of the study were: 1. Most students from government, government aided and private schools use libraries for reading purposes. Reason for this trend could also be the peer pressure to excel and be better in class and among their peer groups and the highly competitive environment particularly in private schools motivates students to read books beyond their prescribed texts. 2. Students from private schools claimed that even though their library was comfortable and provided a good atmosphere for reading, but the seating space is not always enough as per the class strength and at times a suitable well-spaced area may not be available. In contrast, students from government schools felt that even though seating is provided, most seats are not well built and nearly broken which reduces the number of seatings as compared to the number of students. 3. Most of the students feel that the time spent by them in the library is useful and helps them in the process of learning, the reason probably being that the library opens to them a plethora of resources that helps them connect with the happenings of the world outside their classroom. The percentage is low in case of government schools, because they visit the library on a monthly basis.
{"title":"Library Reading Habits: An Exploratory Study on School Children of Delhi","authors":"Richa Mehta","doi":"10.46632/daai/3/1/23","DOIUrl":"https://doi.org/10.46632/daai/3/1/23","url":null,"abstract":"The present study entitled “LIBRARY READING HABITS: AN EXPLORATORY STUDY ON SCHOOL CHILDREN OF DELHI ” was carried out to check the time spent by the school children in the library. The study was carried out in six schools of Delhi out of which two are Government, two are Government aided and two are Private schools, viz., School A, School B, School C, School D, School E and School F respectively. One hundred eighty people formed part of the sample to understand their perspective.\u0000Salient features of the study were:\u00001. Most students from government, government aided and private schools use libraries for reading purposes. Reason for this trend could also be the peer pressure to excel and be better in class and among their peer groups and the highly competitive environment particularly in private schools motivates students to read books beyond their prescribed texts.\u00002. Students from private schools claimed that even though their library was comfortable and provided a good atmosphere for reading, but the seating space is not always enough as per the class strength and at times a suitable well-spaced area may not be available. In contrast, students from government schools felt that even though seating is provided, most seats are not well built and nearly broken which reduces the number of seatings as compared to the number of students.\u00003. Most of the students feel that the time spent by them in the library is useful and helps them in the process of learning, the reason probably being that the library opens to them a plethora of resources that helps them connect with the happenings of the world outside their classroom. The percentage is low in case of government schools, because they visit the library on a monthly basis.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The distinguishing qualities or traits of anything are its characteristics. They can be viewed as traits that set one person or thing apart from another. For instance, the chameleon's ability to blend in is one of its traits. Soft, straight, and golden in color, sisal fibers are. Sisal can have long or short fibers because it is extremely coarse and rigid. Because of its strength, toughness, stretch ability, compatibility with some colors, and resilience to degradation in saline water, sisal is prized for use as cordage. Sisal can be fashioned into carpets, mats, and a variety of handicrafts in addition to its traditional applications as rope, ropes, string, and yarn. Sisal fiber is a tough, robust material with low flexibility that is obtained from freshly cut leaves of the plant. It is crucial in the production of materials like carpeting, coarse purses, maritime rope (where strong resistance to saltwater is required), and cordage. Research significance: In recent years, materials engineers and material scientists have paid close attention to sisal-fiber reinforced composites as a type of environmental composites. Effects of fiber surface treatment on fiber compressive properties and fiber-matrix are discussed in this article. Tensile as well as single-strand strand pull tests were used, respectively, to assess the interfacial characteristics. For assessing the implies that the average shear resistance of composite laminates, a short beam shearing test was also carried out. High density polyethylene (HDPE), vinyl ester, and epoxy were selected as the matrix materials. Two different fiber surface-treatment techniques, chemical bonding and oxidation, were used to boost interfacial strength. According to the results, different fiber surface-treatment techniques had varying effects on the tensile strength of sisal fiber, as well as the strength and bonding characteristics of the fiber-matrix interface. As a result, this work can provide important knowledge on jute fiber-polymer matrix compound interface design. Method: Ratio studies are statistical analyses of data from appraisals and property valuations. Nearly all states utilize them to produce quantitative measure of the proportion of current market price about which individually estimated taxable property is appraised as well as to offer assessment performance indicators. Evaluation parameters: Fiber diameter (mm), Water content (%), Tensile strength(MPa), Tensile modulus(GPa) and Elongation at break (%) Result: The Cronbach's Alpha Reliability result. The overall Cronbach's Alpha value for the model is .658 which indicates 66% reliability. From the literature review, the above 50% Cronbach's Alpha value model can be considered for analysis. Conclusion: Characteristics of sisal fiber the Cronbach's Alpha Reliability result. The overall Cronbach's Alpha value for the model is .658 which indicates 66% reliability. From the literature review, the above 50% Cronbach's Alpha value model can be consi
{"title":"Effects of Characteristics of Sisal Fiber using the SPSS Method","authors":"","doi":"10.46632/daai/2/6/13","DOIUrl":"https://doi.org/10.46632/daai/2/6/13","url":null,"abstract":"The distinguishing qualities or traits of anything are its characteristics. They can be viewed as traits that set one person or thing apart from another. For instance, the chameleon's ability to blend in is one of its traits. Soft, straight, and golden in color, sisal fibers are. Sisal can have long or short fibers because it is extremely coarse and rigid. Because of its strength, toughness, stretch ability, compatibility with some colors, and resilience to degradation in saline water, sisal is prized for use as cordage. Sisal can be fashioned into carpets, mats, and a variety of handicrafts in addition to its traditional applications as rope, ropes, string, and yarn. Sisal fiber is a tough, robust material with low flexibility that is obtained from freshly cut leaves of the plant. It is crucial in the production of materials like carpeting, coarse purses, maritime rope (where strong resistance to saltwater is required), and cordage. Research significance: In recent years, materials engineers and material scientists have paid close attention to sisal-fiber reinforced composites as a type of environmental composites. Effects of fiber surface treatment on fiber compressive properties and fiber-matrix are discussed in this article. Tensile as well as single-strand strand pull tests were used, respectively, to assess the interfacial characteristics. For assessing the implies that the average shear resistance of composite laminates, a short beam shearing test was also carried out. High density polyethylene (HDPE), vinyl ester, and epoxy were selected as the matrix materials. Two different fiber surface-treatment techniques, chemical bonding and oxidation, were used to boost interfacial strength. According to the results, different fiber surface-treatment techniques had varying effects on the tensile strength of sisal fiber, as well as the strength and bonding characteristics of the fiber-matrix interface. As a result, this work can provide important knowledge on jute fiber-polymer matrix compound interface design. Method: Ratio studies are statistical analyses of data from appraisals and property valuations. Nearly all states utilize them to produce quantitative measure of the proportion of current market price about which individually estimated taxable property is appraised as well as to offer assessment performance indicators. Evaluation parameters: Fiber diameter (mm), Water content (%), Tensile strength(MPa), Tensile modulus(GPa) and Elongation at break (%) Result: The Cronbach's Alpha Reliability result. The overall Cronbach's Alpha value for the model is .658 which indicates 66% reliability. From the literature review, the above 50% Cronbach's Alpha value model can be considered for analysis. Conclusion: Characteristics of sisal fiber the Cronbach's Alpha Reliability result. The overall Cronbach's Alpha value for the model is .658 which indicates 66% reliability. From the literature review, the above 50% Cronbach's Alpha value model can be consi","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115482689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As wireless internet expands quickly, so does people's anticipation for the effectiveness and efficiency of mobile communication. After 2020, the fifth generation (5G) of cell communication technologies will take over as the primary direction for wireless technology growth. Problems like bad customer experience and inadequate coverage area commonly arise when the size of 5G ground stations progressively grows. Therefore, it is essential to assess the overall performance of 5G access points to identify any issues that may have arisen during base station installation. The "COPRAS (Complex Proportional Assessment)" technique is employed in this research to assess the overall performance of 5G network sites. In this study, specific 5G base stations in an area are chosen for a thorough performance assessment. Factors such as "Signal coverage area (104 m2), Annual average business loadings (kW), Per capita input cost (rupee/person), Electric field intensity (V/m), and User experience degree" are taken into consideration to assess the overall performance of a 5G ground station. The rank of alternatives using the COPRAS method for Base Station 1 is second, Base Station 2 is fifth, Base Station 3 is fourth, Base Station 4 is third, and Base Station 5 is first. The result from the COPRAS analysis shows that the base station with a signal coverage area of 26.7104 m2, annual average business loadings of 22 kW, and electric field intensity of 1.32 V/m is optimized as the best among the 5G base stations considered.
{"title":"Assessment of the Comprehensive Performance of 5G Base Station using the COPRAS","authors":"","doi":"10.46632/daai/3/5/1","DOIUrl":"https://doi.org/10.46632/daai/3/5/1","url":null,"abstract":"As wireless internet expands quickly, so does people's anticipation for the effectiveness and efficiency of mobile communication. After 2020, the fifth generation (5G) of cell communication technologies will take over as the primary direction for wireless technology growth. Problems like bad customer experience and inadequate coverage area commonly arise when the size of 5G ground stations progressively grows. Therefore, it is essential to assess the overall performance of 5G access points to identify any issues that may have arisen during base station installation. The \"COPRAS (Complex Proportional Assessment)\" technique is employed in this research to assess the overall performance of 5G network sites. In this study, specific 5G base stations in an area are chosen for a thorough performance assessment. Factors such as \"Signal coverage area (104 m2), Annual average business loadings (kW), Per capita input cost (rupee/person), Electric field intensity (V/m), and User experience degree\" are taken into consideration to assess the overall performance of a 5G ground station. The rank of alternatives using the COPRAS method for Base Station 1 is second, Base Station 2 is fifth, Base Station 3 is fourth, Base Station 4 is third, and Base Station 5 is first. The result from the COPRAS analysis shows that the base station with a signal coverage area of 26.7104 m2, annual average business loadings of 22 kW, and electric field intensity of 1.32 V/m is optimized as the best among the 5G base stations considered.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126217165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of the project is to Detect and Recognize Human Facial Features via a Camera. The basic concept of this project is:- To convert the input image to HSV format to extract the binary image and additionally remove the noise from binary image using morphological operations and finally then contours are used to segment out the region of interest and further the region is analyzed to get the final result. While biometric data is generally considered one of the most reliable authentication methods, it also carries significant risk. That’s because if someone’s credit card details are hacked, that person has the option to freeze their credit and take steps to change the personal information that was breached. What do you do if you lose your digital ‘face’? Around the world, biometric information is being captured, stored, and analyzed in increasing quantities, often by organizations and governments, with a mixed record on cybersecurity. A question increasingly being asked is, how safe is the infrastructure that holds and processes all this data? As facial recognition software is still in its relative infancy, the laws governing this area are evolving (and sometimes non-existent).
{"title":"Local Binary Pattern Histogram Based Web Facial Authentication System","authors":"","doi":"10.46632/daai/3/1/21","DOIUrl":"https://doi.org/10.46632/daai/3/1/21","url":null,"abstract":"The objective of the project is to Detect and Recognize Human Facial Features via a Camera. The basic concept of this project is:- To convert the input image to HSV format to extract the binary image and additionally remove the noise from binary image using morphological operations and finally then contours are used to segment out the region of interest and further the region is analyzed to get the final result. While biometric data is generally considered one of the most reliable authentication methods, it also carries significant risk. That’s because if someone’s credit card details are hacked, that person has the option to freeze their credit and take steps to change the personal information that was breached. What do you do if you lose your digital ‘face’? Around the world, biometric information is being captured, stored, and analyzed in increasing quantities, often by organizations and governments, with a mixed record on cybersecurity. A question increasingly being asked is, how safe is the infrastructure that holds and processes all this data? As facial recognition software is still in its relative infancy, the laws governing this area are evolving (and sometimes non-existent).","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sports Event Management System is an application based framework used to deal with the games exercises occurred at an establishment. The Framework will deal with all the overhauling action in a fast and effective way. Information putting away in this framework will be simpler. This framework assists with really looking at reports of the games establishment whenever. The clients will consume less measure of time when contrasted with manual desk work through the robotized framework. The administrator has the control to oversee Sports, groups, players and dealing with part's profile. Administrator might actually plan occasion and news about the competitions. Understudy can see their profile, competition subtleties and impending matches. It gives and oversees different Games exercises, for example, part enlistment, Correlation of players, Determination preliminaries results, Declarations and about the Competition designs. Keeping players insights and their wellbeing records will assist supervisors with picking the players who will be productive. At the end of the day it's a finished application for a club or foundation or might be a school who needs to update in sports. Complete insights of their separate club will be accommodated them so they can undoubtedly recognize what's their club's concern is and the way that they need to get to the next level. Choosing the best players is one thing where the club's destiny will be chosen. Utilizing the examination module clubs can choose their best players for the matchups and focus on their players for triumph.
{"title":"Sports Event Handling System With Data Analogy Of Players","authors":"","doi":"10.46632/daai/3/1/14","DOIUrl":"https://doi.org/10.46632/daai/3/1/14","url":null,"abstract":"Sports Event Management System is an application based framework used to deal with the games exercises occurred at an establishment. The Framework will deal with all the overhauling action in a fast and effective way. Information putting away in this framework will be simpler. This framework assists with really looking at reports of the games establishment whenever. The clients will consume less measure of time when contrasted with manual desk work through the robotized framework. The administrator has the control to oversee Sports, groups, players and dealing with part's profile. Administrator might actually plan occasion and news about the competitions. Understudy can see their profile, competition subtleties and impending matches. It gives and oversees different Games exercises, for example, part enlistment, Correlation of players, Determination preliminaries results, Declarations and about the Competition designs. Keeping players insights and their wellbeing records will assist supervisors with picking the players who will be productive. At the end of the day it's a finished application for a club or foundation or might be a school who needs to update in sports. Complete insights of their separate club will be accommodated them so they can undoubtedly recognize what's their club's concern is and the way that they need to get to the next level. Choosing the best players is one thing where the club's destiny will be chosen. Utilizing the examination module clubs can choose their best players for the matchups and focus on their players for triumph.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124617037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This system, known as the Currency Recognition System, is utilized all over the globe for the purpose of detecting currency fraud. One can find applications for this framework in financial frameworks, cash-monitoring devices, cash-trade frameworks, and so on. In today's technologically sophisticated world, this framework is crucial, and it ought to be simple to obtain. In this essay, we suggest a method for automatically identifying paper money using a programed we've created. Simple, reliable, and effective describe the method that was used. The methodology is divided into several sections, such as those for preparing the images, extracting the characteristics, and comparing the prepared and test pictures. The output includes the currency's denomination, whether it is a genuine note or a fake, and a conversion of the currency into the currency of another country. User-friendly and well-designed mobile software was produced. A challenging dataset with various constraints was used to determine the performance of the proposed system.
{"title":"A Study On Detection Of Counterfeit Money By Image Processing","authors":"","doi":"10.46632/daai/3/1/16","DOIUrl":"https://doi.org/10.46632/daai/3/1/16","url":null,"abstract":"This system, known as the Currency Recognition System, is utilized all over the globe for the purpose of detecting currency fraud. One can find applications for this framework in financial frameworks, cash-monitoring devices, cash-trade frameworks, and so on. In today's technologically sophisticated world, this framework is crucial, and it ought to be simple to obtain. In this essay, we suggest a method for automatically identifying paper money using a programed we've created. Simple, reliable, and effective describe the method that was used. The methodology is divided into several sections, such as those for preparing the images, extracting the characteristics, and comparing the prepared and test pictures. The output includes the currency's denomination, whether it is a genuine note or a fake, and a conversion of the currency into the currency of another country. User-friendly and well-designed mobile software was produced. A challenging dataset with various constraints was used to determine the performance of the proposed system.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this money world the stock market plays a major role in a person's life. Gain or loss in financial terms will determine the people’s earnings of essential money in their way of life. The ability to predict stock values is incredibly useful and difficult task done among the people. There are many brokerages assigned to this stuff to the particular peoples to buy or sell the shares of a business. In this case, we are utilising a deep learning model to predict the particular Share pricing. Here, we suggested using the deep method of learning to predict the price of a property. This lecture will undoubtedly shed light on the forecasting of the equity market price using deep learning concept to predict the equity market price
{"title":"Deep Learning Algorithm of Contrast for Predicting Equity Prices","authors":"","doi":"10.46632/daai/3/1/17","DOIUrl":"https://doi.org/10.46632/daai/3/1/17","url":null,"abstract":"In this money world the stock market plays a major role in a person's life. Gain or loss in financial terms will determine the people’s earnings of essential money in their way of life. The ability to predict stock values is incredibly useful and difficult task done among the people. There are many brokerages assigned to this stuff to the particular peoples to buy or sell the shares of a business. In this case, we are utilising a deep learning model to predict the particular Share pricing. Here, we suggested using the deep method of learning to predict the price of a property. This lecture will undoubtedly shed light on the forecasting of the equity market price using deep learning concept to predict the equity market price","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"1 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128781338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Twitter sentiment has proven useful in predicting whether the Bit coin price will rise or fall. Increase/decrease. In this article, we seek to rely on technical status not only to predict direction, but also to predict bullish/bearish levels. We use not only present the results of tests that explore the relationship between sentiment and futures prices at different levels of time granularity, with the aim of discovering the optimal time period at which sentiment behaves. Become a reliable indicator of price changes.
{"title":"Bit coin Sentiment Analysis","authors":"","doi":"10.46632/daai/3/1/19","DOIUrl":"https://doi.org/10.46632/daai/3/1/19","url":null,"abstract":"Twitter sentiment has proven useful in predicting whether the Bit coin price will rise or fall.\u0000Increase/decrease. In this article, we seek to rely on technical status not only to predict direction, but also to predict bullish/bearish levels. We use not only present the results of tests that explore the relationship between sentiment and futures prices at different levels of time granularity, with the aim of discovering the optimal time period at which sentiment behaves. Become a reliable indicator of price changes.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information and communication technologies have a long history but constantly evolving. Because of the rapid progress of technology, everyone now has a personal AI assistant. On our smartphones, most of us have it in the form of Siri, Bixby, or Google Assistant. Voice-based personal assistants are becoming increasingly popular, making our lives easier. This paper-based intelligent voice assistant can manage and update information, such as emails, calendar events, files, and to-do lists. An attempt was made to develop an "intelligent personal voice assistant using Python" to help with voice-activated device control, information extraction, and desktop job execution.
{"title":"Personal Computer Virtual Voice Assistant","authors":"","doi":"10.46632/daai/3/1/20","DOIUrl":"https://doi.org/10.46632/daai/3/1/20","url":null,"abstract":"Information and communication technologies have a long history but constantly evolving. Because of the rapid progress of technology, everyone now has a personal AI assistant. On our smartphones, most of us have it in the form of Siri, Bixby, or Google Assistant. Voice-based personal assistants are becoming increasingly popular, making our lives easier. This paper-based intelligent voice assistant can manage and update information, such as emails, calendar events, files, and to-do lists. An attempt was made to develop an \"intelligent personal voice assistant using Python\" to help with voice-activated device control, information extraction, and desktop job execution.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study demonstrates for the first time how a toll gate can be fully controlled using the "Internet of Things" idea based on image processing technology. We examine and report on the circumstances of total time spent by a specific vehicle for money transaction on toll plaza and further evaluate total fuel wastage as well as human errors involvement, in reference to survey of annual toll collection on toll plazas, conducted by government in the year 2010. Finally, we agree with the idea of automating toll plazas entirely with the help of IoT technology and image processing in order to provide an ideal answer.
{"title":"A Study Onvehicle Movement And Ticket Vending Machine Distribution Intoll Booth","authors":"","doi":"10.46632/daai/3/1/15","DOIUrl":"https://doi.org/10.46632/daai/3/1/15","url":null,"abstract":"This study demonstrates for the first time how a toll gate can be fully controlled using the \"Internet of Things\" idea based on image processing technology. We examine and report on the circumstances of total time spent by a specific vehicle for money transaction on toll plaza and further evaluate total fuel wastage as well as human errors involvement, in reference to survey of annual toll collection on toll plazas, conducted by government in the year 2010. Finally, we agree with the idea of automating toll plazas entirely with the help of IoT technology and image processing in order to provide an ideal answer.","PeriodicalId":226827,"journal":{"name":"Data Analytics and Artificial Intelligence","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}