首页 > 最新文献

2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)最新文献

英文 中文
Mini Chalk Recycling Machine 小型粉笔回收机
S. Karthik, T. Selvakumar, M. Guruesakkiraj, V. H. Sudan, S. A. Kumar
In the teaching profession commonly the last quantity or the broken pieces of chalk is not utilized and 30 percent of chalk is wasted. On such scenario we could reverse these small pieces to whole new one. In electrical mode a motor of 100 RPM is powered to powder the small pieces of chalk by crasher. The powder is further mixed with water to develop slurry and consequential poured to mould cavity to get desire shape which is fixed with heating coil to obtain chalk by drying it.
在教学行业中,通常最后的数量或破碎的粉笔没有被利用,30%的粉笔被浪费了。在这种情况下,我们可以把这些小碎片变成一个完整的新碎片。在电动模式下,每分钟100转的电机通过粉碎机粉碎小块粉笔。将粉末与水混合形成浆料,并将浆料倒入模具腔内,得到所需形状,模具腔内用加热线圈固定,经干燥得到白垩。
{"title":"Mini Chalk Recycling Machine","authors":"S. Karthik, T. Selvakumar, M. Guruesakkiraj, V. H. Sudan, S. A. Kumar","doi":"10.1109/ICSCAN.2018.8541171","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541171","url":null,"abstract":"In the teaching profession commonly the last quantity or the broken pieces of chalk is not utilized and 30 percent of chalk is wasted. On such scenario we could reverse these small pieces to whole new one. In electrical mode a motor of 100 RPM is powered to powder the small pieces of chalk by crasher. The powder is further mixed with water to develop slurry and consequential poured to mould cavity to get desire shape which is fixed with heating coil to obtain chalk by drying it.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121881149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OVERCOMING SINGULARITIES IN PARALLEL MANIPULATORS BY CHANGE IN BASE LENGTH 利用基长变化克服并联机器人的奇异性
B. Vicknesh, N. Shriram, M. Srivatsan, Prof. Anjan Kumar Dash
The focus of this project is 5-bar parallel manipulator. There are many approaches to eliminate the singularities of this kind of manipulators, like redundant actuation, connecting two inverse kinematic solutions without a singularity, topology of self-motion manifolds of redundant manipulators, self-motion, extending the link length by prismatic joints etc. In this project, a novel approach is proposed to eliminate the singularities from the workspace. This investigation is proposed to be carried out for 2-DOF planar parallel manipulator to establish the concept. One of the base actuators (motors) is fixed to a linear actuator. This linear actuator extends when the end-effector is in the proximity of singularity loci. As the manipulator clears out of the singularity condition, then again, the parallel manipulator is reverted back to the original position by the linear actuator. Mathematically, when the manipulator attains a singularity condition, the Jacobian matrix loses/gains rank. A reconfiguration of the manipulator to a defined degree at this instance ensures a change in the determinant of the Jacobian matrix to a non-zero value, thereby avoiding the singularity condition. Once the singularity loci are avoided, the base length is reverted to its actual state by the linear actuator for the same trajectory of the end–effector within the defined workspace of the manipulator. As a result, the used trajectories remain unaffected by the effect of singularities and thus improve the efficiency of the parallel manipulator significantly.
本课题的重点是五杆并联机械手。消除该类机械臂奇异性的方法有:冗余驱动、连接无奇异的两个逆解、冗余机械臂自运动流形的拓扑结构、自运动、通过移动关节延长连杆长度等。在这个项目中,提出了一种新的方法来消除工作空间中的奇异性。本文提出以平面二自由度并联机器人为研究对象,建立该概念。其中一个基础执行器(电机)固定在一个线性执行器上。当末端执行器在奇点位置附近时,该线性执行器扩展。当机械手清除出奇异状态后,再由线性执行机构将并联机械手恢复到原来的位置。在数学上,当机械手达到一个奇异条件时,雅可比矩阵的秩增加/减少。在这种情况下,将机械手重新配置到一个定义的程度,保证了雅可比矩阵的行列式变为非零值,从而避免了奇异条件。一旦避免了奇异轨迹,在定义的机械臂工作空间内,对于末端执行器的相同轨迹,线性执行器将基长恢复到其实际状态。因此,所使用的轨迹不受奇异点的影响,从而显着提高了并联机械臂的效率。
{"title":"OVERCOMING SINGULARITIES IN PARALLEL MANIPULATORS BY CHANGE IN BASE LENGTH","authors":"B. Vicknesh, N. Shriram, M. Srivatsan, Prof. Anjan Kumar Dash","doi":"10.1109/ICSCAN.2018.8541191","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541191","url":null,"abstract":"The focus of this project is 5-bar parallel manipulator. There are many approaches to eliminate the singularities of this kind of manipulators, like redundant actuation, connecting two inverse kinematic solutions without a singularity, topology of self-motion manifolds of redundant manipulators, self-motion, extending the link length by prismatic joints etc. In this project, a novel approach is proposed to eliminate the singularities from the workspace. This investigation is proposed to be carried out for 2-DOF planar parallel manipulator to establish the concept. One of the base actuators (motors) is fixed to a linear actuator. This linear actuator extends when the end-effector is in the proximity of singularity loci. As the manipulator clears out of the singularity condition, then again, the parallel manipulator is reverted back to the original position by the linear actuator. Mathematically, when the manipulator attains a singularity condition, the Jacobian matrix loses/gains rank. A reconfiguration of the manipulator to a defined degree at this instance ensures a change in the determinant of the Jacobian matrix to a non-zero value, thereby avoiding the singularity condition. Once the singularity loci are avoided, the base length is reverted to its actual state by the linear actuator for the same trajectory of the end–effector within the defined workspace of the manipulator. As a result, the used trajectories remain unaffected by the effect of singularities and thus improve the efficiency of the parallel manipulator significantly.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improvised Algorithm For Computer Vision Based Cashew Grading System Using Deep CNN 基于深度CNN的腰果分级系统改进算法
A. Sivaranjani, S. Senthilrani, B. Ashokumar, A. Murugan
Computer vision is becoming popular at the present days in agricultural area with an assortment of technological improvements for grading, sorting, classification. Though there are much technical advancement, cashew grading and sorting are still difficult task in daily market. In this research work we discussed about the computer vision based grading system and also an overview of deep Convolution Neural Network (CNN). The CNN with deep layer has tremendous achievement in many image classification applications. The deep CNN which itself extract the features of the image for classification was the added advantage. In this work the various parameters are considered for optimization of CNN. This work portrays the importance grading cashew nut and also proposed a framework for computer vision based grading system for cashew nut using deep CNN.
随着分级、分类、分类等技术的不断进步,计算机视觉在农业领域越来越受欢迎。虽然腰果的技术有了很大的进步,但腰果的分级和分选在日常市场中仍然是一项艰巨的任务。在本研究中,我们讨论了基于计算机视觉的评分系统,并对深度卷积神经网络(CNN)进行了概述。深层CNN在许多图像分类应用中取得了巨大的成就。深度CNN本身提取图像的特征进行分类是其附加的优势。在这项工作中,考虑了各种参数来优化CNN。本文阐述了腰果分级的重要性,并提出了一种基于深度CNN的腰果计算机视觉分级系统框架。
{"title":"An Improvised Algorithm For Computer Vision Based Cashew Grading System Using Deep CNN","authors":"A. Sivaranjani, S. Senthilrani, B. Ashokumar, A. Murugan","doi":"10.1109/ICSCAN.2018.8541176","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541176","url":null,"abstract":"Computer vision is becoming popular at the present days in agricultural area with an assortment of technological improvements for grading, sorting, classification. Though there are much technical advancement, cashew grading and sorting are still difficult task in daily market. In this research work we discussed about the computer vision based grading system and also an overview of deep Convolution Neural Network (CNN). The CNN with deep layer has tremendous achievement in many image classification applications. The deep CNN which itself extract the features of the image for classification was the added advantage. In this work the various parameters are considered for optimization of CNN. This work portrays the importance grading cashew nut and also proposed a framework for computer vision based grading system for cashew nut using deep CNN.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Epistemological View: Data Ethics, Privacy & Trust on Digital Platform 认识论视角:数字平台上的数据伦理、隐私与信任
Rajeshwari Harsh, Gaurav Acharya, Sunita Chaudhary
‘Data’ had always an important asset of scientific study i.e. measurement, analysis, recording, representation, validation etc. Initially, data generation were increasing gradually along with Computer Generations. As per rapid growth of Computer technologies, ‘Data generation’ have been increased exponentially. Enhancement in data carries responsibility of ‘ethics’, whose fetches individual or distributed ‘morality’ towards its applications; ‘privacy’ towards users & services data; ‘transparencies’ towards scheduled activities or transections among consumers & providers; ‘trust’ towards AI agents and feedback systems. Countries have approached applications of modern technologies with limitations, different adoptions and regulations to prevent, privacy, confidentialities, social culture, transparency, human rights and security. Sometimes, careless attitude and blind faith may lead to data theft, hack and unpleased uses. Advance technologies may invade the individuality with different attributes using your attitude and open data. The objective of this paper is to identify evolution of ‘data ethics’ mind set and its different set of thought-wings, influence and penitration of digital data world(open data) in human life and their believes wrt trust, faith towards individual and group privacy,transperencies.Latest technologies and their ethical issues, training and principals related to ethical assessment have been looked over.
“数据”一直是科学研究的重要资产,即测量、分析、记录、表示、验证等。最初,随着计算机时代的发展,数据的产生逐渐增加。随着计算机技术的快速发展,“数据生成”呈指数级增长。数据的增强带有“道德”的责任,它将个人或分布式的“道德”与数据的应用联系起来;用户和服务数据的“隐私”;对预定活动或消费者和供应商之间的交叉的“透明度”;“信任”人工智能代理和反馈系统。各国对现代技术的应用都有限制,采用不同的方法和规定,以防止隐私,保密,社会文化,透明度,人权和安全。有时,粗心的态度和盲目的信念可能导致数据被盗,黑客和不愉快的使用。先进的技术可能会利用你的态度和开放的数据来侵犯你不同属性的个性。本文的目的是确定“数据伦理”思维模式的演变及其不同的思维模式,数字数据世界(开放数据)在人类生活中的影响和忏悔,以及他们对信任的信仰,对个人和群体隐私的信仰,透明度。最新的技术和他们的道德问题,培训和原则有关的道德评估。
{"title":"Epistemological View: Data Ethics, Privacy & Trust on Digital Platform","authors":"Rajeshwari Harsh, Gaurav Acharya, Sunita Chaudhary","doi":"10.1109/ICSCAN.2018.8541166","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541166","url":null,"abstract":"‘Data’ had always an important asset of scientific study i.e. measurement, analysis, recording, representation, validation etc. Initially, data generation were increasing gradually along with Computer Generations. As per rapid growth of Computer technologies, ‘Data generation’ have been increased exponentially. Enhancement in data carries responsibility of ‘ethics’, whose fetches individual or distributed ‘morality’ towards its applications; ‘privacy’ towards users & services data; ‘transparencies’ towards scheduled activities or transections among consumers & providers; ‘trust’ towards AI agents and feedback systems. Countries have approached applications of modern technologies with limitations, different adoptions and regulations to prevent, privacy, confidentialities, social culture, transparency, human rights and security. Sometimes, careless attitude and blind faith may lead to data theft, hack and unpleased uses. Advance technologies may invade the individuality with different attributes using your attitude and open data. The objective of this paper is to identify evolution of ‘data ethics’ mind set and its different set of thought-wings, influence and penitration of digital data world(open data) in human life and their believes wrt trust, faith towards individual and group privacy,transperencies.Latest technologies and their ethical issues, training and principals related to ethical assessment have been looked over.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of PSO Tuned PI Controller for Single-Ended Primary-Inductor Converter 单端主电感变换器PSO调谐PI控制器的评估
M. Rekha, M. Kowsalya
In this paper, determination of optimal Proportional-Integral (PI) controller values for a Single-Ended Primary-Inductor converter SEPIC is taken place using Particle Swarm Optimization. The optimization has good computational efficiency and convergence characteristics. The SEPIC converter comprises of buck and boost operation depending on the duty cycle. Maximum power is tracked from the photovoltaic PV using Maximum Power Point Tracking system. The controller’s PI value is tuned to resulting better efficiency of the converter with MPPT as input. The simulation is executed in MATLAB/Simulink.
本文采用粒子群算法确定了单端主电感变换器SEPIC的最优比例积分(PI)控制器值。该优化算法具有良好的计算效率和收敛性。SEPIC转换器包括降压和升压操作,这取决于占空比。利用最大功率点跟踪系统跟踪光伏发电的最大功率。通过调整控制器的PI值,使MPPT作为输入的变换器具有更好的效率。在MATLAB/Simulink中进行仿真。
{"title":"Evaluation of PSO Tuned PI Controller for Single-Ended Primary-Inductor Converter","authors":"M. Rekha, M. Kowsalya","doi":"10.1109/ICSCAN.2018.8541183","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541183","url":null,"abstract":"In this paper, determination of optimal Proportional-Integral (PI) controller values for a Single-Ended Primary-Inductor converter SEPIC is taken place using Particle Swarm Optimization. The optimization has good computational efficiency and convergence characteristics. The SEPIC converter comprises of buck and boost operation depending on the duty cycle. Maximum power is tracked from the photovoltaic PV using Maximum Power Point Tracking system. The controller’s PI value is tuned to resulting better efficiency of the converter with MPPT as input. The simulation is executed in MATLAB/Simulink.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"825 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access DataPrivacy Management Control inMongoDB mongodb中的访问数据隐私管理控制
Neha Titre, Antara S. Bhattacharya
With the rapid development of network and information technology, data are woven into every corner of our lives, such as websites, social networks, public platforms, etc. Along with the convenience and immediacy of data acquisition, big data technologies, and many other new data analysis tools have been succeeded and applied in various fields of people’s lives, which have generated huge social impact and economic benefits. Generally, data should be stored in databases for easy access and utilization. It consists of the enhancement of the MongoDB level based access control model with privacy keys for security and monitor. The proposed monitor is easily used into any MongoDB deployment control with high protection for data security.
随着网络和信息技术的飞速发展,数据已经渗透到我们生活的各个角落,如网站、社交网络、公共平台等。随着数据获取的方便性和即时性,大数据技术和许多新的数据分析工具已经成功地应用于人们生活的各个领域,产生了巨大的社会影响和经济效益。通常,数据应该存储在数据库中,以便于访问和利用。它包括对MongoDB基于级别的访问控制模型的增强,使用用于安全性和监控的私钥。建议的监视器很容易用于任何MongoDB部署控制,具有高度的数据安全保护。
{"title":"Access DataPrivacy Management Control inMongoDB","authors":"Neha Titre, Antara S. Bhattacharya","doi":"10.1109/ICSCAN.2018.8541248","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541248","url":null,"abstract":"With the rapid development of network and information technology, data are woven into every corner of our lives, such as websites, social networks, public platforms, etc. Along with the convenience and immediacy of data acquisition, big data technologies, and many other new data analysis tools have been succeeded and applied in various fields of people’s lives, which have generated huge social impact and economic benefits. Generally, data should be stored in databases for easy access and utilization. It consists of the enhancement of the MongoDB level based access control model with privacy keys for security and monitor. The proposed monitor is easily used into any MongoDB deployment control with high protection for data security.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Level-1 and Level-2 Feature Level Fusion 一种一级和二级特征级融合的框架
D. Poonguzhali, Dr. M. Ezhilarasan
The paper presents the feature extraction of level-1 and level-2 fingerprint features. The level-1 features are based on ridges and level-2 features are based on minutiae of the fingerprint, which are used for authentication. The level-1 and level-2 feature level fusion is proposed to enhance the accuracy rate of unibiometric fingerprint authentication system. The performance of this system is evaluated on two publicly available databases and our own database. Fusion scheme is decided depending on the type of information available. Choosing the fusion scheme is important for any multibiometric system as it has significant impact over the performance of the multibiometric system. The identification rate is more in concatenated feature set than for individual feature set. The proposed FFV uses the much richer grey-level information of the fingerprint image. It is also capable of dealing with fingerprints of low quality images from which features cannot be extracted reliably. The results shows that the proposed FFV method outperforms other competing approaches with both EER and DI.
本文提出了一级和二级指纹特征的特征提取方法。一级特征基于指纹的脊线,二级特征基于指纹的细节,用于身份验证。为了提高单生物指纹认证系统的准确率,提出了一级和二级特征级融合的方法。本系统的性能在两个公开可用的数据库和我们自己的数据库上进行了评估。融合方案取决于可用信息的类型。融合方案的选择对多生物识别系统的性能有着重要的影响。与单个特征集相比,串联特征集的识别率更高。所提出的FFV利用了指纹图像更丰富的灰度信息。它还能够处理低质量图像的指纹,这些图像不能可靠地提取特征。结果表明,所提出的FFV方法在EER和DI方面都优于其他竞争方法。
{"title":"A Framework for Level-1 and Level-2 Feature Level Fusion","authors":"D. Poonguzhali, Dr. M. Ezhilarasan","doi":"10.1109/ICSCAN.2018.8541222","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541222","url":null,"abstract":"The paper presents the feature extraction of level-1 and level-2 fingerprint features. The level-1 features are based on ridges and level-2 features are based on minutiae of the fingerprint, which are used for authentication. The level-1 and level-2 feature level fusion is proposed to enhance the accuracy rate of unibiometric fingerprint authentication system. The performance of this system is evaluated on two publicly available databases and our own database. Fusion scheme is decided depending on the type of information available. Choosing the fusion scheme is important for any multibiometric system as it has significant impact over the performance of the multibiometric system. The identification rate is more in concatenated feature set than for individual feature set. The proposed FFV uses the much richer grey-level information of the fingerprint image. It is also capable of dealing with fingerprints of low quality images from which features cannot be extracted reliably. The results shows that the proposed FFV method outperforms other competing approaches with both EER and DI.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Sex From Handwritten Examples 从手写样本中检测性别
Sourajit Saha, Md. Asif Bin Khaled, Md. Saiful Islam, Nisha Saha Puja, Mahady Hasan
There are several tasks that human excel at and computers do not and vice-versa. Just until a few years ago computers were as good as a storage for images and videos. However, in the past 6 years with the boon in artificial neural network, labeled data and computation power; machines have started becoming smart at tasks like recognizing images, detecting different objects in images, captioning images, understanding and summarizing videos, detecting semantic actions in videos and so on. Deep learning researchers and practitioners have started demonstrating notable performance of AI(Artificial Intelligence) on many different tasks that pushes the boundaries and as a continuation of that process, we took one specific problem to solve using deep learning that even human can not solve. We have taken Bangla handwritten characters, then trained them applying several deep learning techniques such as Convolutional Neural Network and Recurrent Neural Network to predict the sex of the writer. Consequently, we have got 91.85% accuracy rate and also demonstrated further analysis of the results that we got.
有一些任务是人类擅长而计算机不擅长的,反之亦然。就在几年前,电脑还能像存储图像和视频一样好用。然而,近6年来随着人工神经网络、标记数据和计算能力的飞速发展;机器已经开始在识别图像、检测图像中的不同物体、为图像添加字幕、理解和总结视频、检测视频中的语义动作等任务上变得聪明起来。深度学习研究人员和实践者已经开始在许多不同的任务上展示AI(人工智能)的显着性能,这些任务推动了边界,作为该过程的延续,我们使用深度学习解决了一个甚至人类无法解决的特定问题。我们取了孟加拉语的手写字符,然后用卷积神经网络和循环神经网络等几种深度学习技术对它们进行训练,以预测写信人的性别。结果,我们得到了91.85%的准确率,并对我们得到的结果进行了进一步的分析。
{"title":"Detecting Sex From Handwritten Examples","authors":"Sourajit Saha, Md. Asif Bin Khaled, Md. Saiful Islam, Nisha Saha Puja, Mahady Hasan","doi":"10.1109/ICSCAN.2018.8541214","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541214","url":null,"abstract":"There are several tasks that human excel at and computers do not and vice-versa. Just until a few years ago computers were as good as a storage for images and videos. However, in the past 6 years with the boon in artificial neural network, labeled data and computation power; machines have started becoming smart at tasks like recognizing images, detecting different objects in images, captioning images, understanding and summarizing videos, detecting semantic actions in videos and so on. Deep learning researchers and practitioners have started demonstrating notable performance of AI(Artificial Intelligence) on many different tasks that pushes the boundaries and as a continuation of that process, we took one specific problem to solve using deep learning that even human can not solve. We have taken Bangla handwritten characters, then trained them applying several deep learning techniques such as Convolutional Neural Network and Recurrent Neural Network to predict the sex of the writer. Consequently, we have got 91.85% accuracy rate and also demonstrated further analysis of the results that we got.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THERMAL ANALYSIS AND TORQUE RIPPLE MINIMIZATION IN SWITCHED RELUCTANCE MOTOR WITH NICKEL-FERRITE MATERIAL 镍铁氧体材料开关磁阻电机的热分析及转矩脉动最小化
S. Rajkumar, Dr. K. Sedhuraman, D. Murugadhan
In aircraft electric motor driven fuel delivery system, the motor must be characterized by high power density, reliability, small size, less weight and high speed. The high speed operation, high power density and fault tolerance makes switched reluctance motor an ideal candidate for high speed aerospace applications. This paper investigates the application potential of Nickel and Ferrite materials in high-speed switched reluctance motor. Two configurations of (a) Nickel material with smooth frame and (b) Ferrite material with smooth frame have been studied using finite element analysis to obtain their nodal temperature distributions in different parts of stator and rotor frames. The study reveals that the Ferrite and Nickel metals based stator and rotor frame has a better thermal capability and it provides desirable feature in high speed aerospace applications.
在飞机电动机驱动的燃油输送系统中,电动机必须具有高功率密度、高可靠性、小体积、轻重量和高速度等特点。高速运行、高功率密度和容错性使开关磁阻电机成为高速航空航天应用的理想选择。探讨了镍铁氧体材料在高速开关磁阻电机中的应用潜力。采用有限元分析方法研究了(a)光滑框架镍材料和(b)光滑框架铁氧体材料两种结构,得到了它们在定子和转子框架不同部位的节点温度分布。研究表明,铁氧体和镍金属基定子和转子框架具有更好的热性能,在高速航空航天应用中具有理想的性能。
{"title":"THERMAL ANALYSIS AND TORQUE RIPPLE MINIMIZATION IN SWITCHED RELUCTANCE MOTOR WITH NICKEL-FERRITE MATERIAL","authors":"S. Rajkumar, Dr. K. Sedhuraman, D. Murugadhan","doi":"10.1109/ICSCAN.2018.8541200","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541200","url":null,"abstract":"In aircraft electric motor driven fuel delivery system, the motor must be characterized by high power density, reliability, small size, less weight and high speed. The high speed operation, high power density and fault tolerance makes switched reluctance motor an ideal candidate for high speed aerospace applications. This paper investigates the application potential of Nickel and Ferrite materials in high-speed switched reluctance motor. Two configurations of (a) Nickel material with smooth frame and (b) Ferrite material with smooth frame have been studied using finite element analysis to obtain their nodal temperature distributions in different parts of stator and rotor frames. The study reveals that the Ferrite and Nickel metals based stator and rotor frame has a better thermal capability and it provides desirable feature in high speed aerospace applications.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High Reliability NoC switch using Modified Hamming Code with Transient Faults 基于改进汉明码的瞬态故障高可靠性NoC开关
Siva Kanakala, K. Ashok Kumar, P. Dananjayan
The scaling of technology decreases the communication issues between components in the System on Chip (SoC). Network on Chip (NoC) has the new architecture to deal with the overheads of communication and it is build with routers and processing elements. The router of NoC is temporarily and/or permanently disabled due to the occurrence of faults. A disabled router gives severe impact on the entire system hence the correction of faults is curial not only for single router but also entire NoC system. A Modified Hamming Code (MHC) is presented for detection and correction transient faults. The encoded data input is categorized in groups and each MHC is applied to each group parallelly there by provides high reliability of this method. The simulation results prove that MHC yields reduced latency and increased speed when compared to conventional Hamming Code (HC).
技术的规模化减少了片上系统(SoC)中组件之间的通信问题。片上网络(Network on Chip, NoC)是由路由器和处理单元组成的,具有处理通信开销的新架构。NoC的路由器由于发生故障而暂时或永久禁用。路由器故障会对整个系统造成严重的影响,因此故障的修复不仅是单个路由器的问题,而且是整个NoC系统的问题。提出了一种改进的汉明码(MHC)来检测和校正暂态故障。输入的编码数据按组分类,每个MHC并行应用于每组,提供了高可靠性的方法。仿真结果表明,与传统的汉明码(HC)相比,MHC可以降低延迟并提高速度。
{"title":"High Reliability NoC switch using Modified Hamming Code with Transient Faults","authors":"Siva Kanakala, K. Ashok Kumar, P. Dananjayan","doi":"10.1109/ICSCAN.2018.8541202","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541202","url":null,"abstract":"The scaling of technology decreases the communication issues between components in the System on Chip (SoC). Network on Chip (NoC) has the new architecture to deal with the overheads of communication and it is build with routers and processing elements. The router of NoC is temporarily and/or permanently disabled due to the occurrence of faults. A disabled router gives severe impact on the entire system hence the correction of faults is curial not only for single router but also entire NoC system. A Modified Hamming Code (MHC) is presented for detection and correction transient faults. The encoded data input is categorized in groups and each MHC is applied to each group parallelly there by provides high reliability of this method. The simulation results prove that MHC yields reduced latency and increased speed when compared to conventional Hamming Code (HC).","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122912350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1