986 research outputs found

    Kannada Character Recognition System A Review

    Full text link
    Intensive research has been done on optical character recognition ocr and a large number of articles have been published on this topic during the last few decades. Many commercial OCR systems are now available in the market, but most of these systems work for Roman, Chinese, Japanese and Arabic characters. There are no sufficient number of works on Indian language character recognition especially Kannada script among 12 major scripts in India. This paper presents a review of existing work on printed Kannada script and their results. The characteristics of Kannada script and Kannada Character Recognition System kcr are discussed in detail. Finally fusion at the classifier level is proposed to increase the recognition accuracy.Comment: 12 pages, 8 figure

    UNREQUITED LOVE IN THOMAS HARDY’S FAR FROM THE MADDING CROWD.

    Get PDF
    Mulk Raj Anand, a socially dedicated author, has delivered a decent arrangement of writing. He has composed in excess of twelve books and around seventy short stories and a large group of expositions and articles on various subjects. His books fall into two classes in particular social and personal books. He concentrated on the sufferings, hopelessness and awfulness of the poor because of the abuse of the discouraged class of the Indian culture. Strict false reverence, medieval framework, East-West experience, the spot of lady in the general public, notions, destitution, yearning and abuse are his regular subjects. Watchwords: Mulk Raj Anand, Mulk Raj, books, humankind

    EAST WEST ENCOUNTER IN MULKRAJ AANAND’S COOLIE.

    Get PDF
    Mulk Raj Anand, a socially dedicated author, has delivered a decent arrangement of writing. He has composed in excess of twelve books and around seventy short stories and a large group of expositions and articles on various subjects. His books fall into two classes in particular social and personal books. He concentrated on the sufferings, hopelessness and awfulness of the poor because of the abuse of the discouraged class of the Indian culture. Strict false reverence, medieval framework, East-West experience, the spot of lady in the general public, notions, destitution, yearning and abuse are his regular subjects. Watchwords: Mulk Raj Anand, Mulk Raj, books, humankind

    MARGARET ATWOOD’S THE HANDMAID TALE: A FEMINISTIC PERSPECTIVE.

    Get PDF
    The Handmaid's Tale is where ladies' privileges have been repudiated, and in this way ladies are back in sexual orientation jobs taken to the outrageous, without any rights, no suppositions, and no beautifiers or magnificence results of any sort. A once free lady is transformed into an article, a 'vessel' whose sole design is to bear kids to save the populace. It is a tragic bad dream which oppresses and quells ladies to the point of sexual subjugation, language impacts and inculcates them in a psychologicallydamaging way, and denies them the fundamental opportunities which most ladies in Western development underestimate (Porfert 1). The point of this paper is to contending the portrayal of women's activist oppressed world and the issues identified with female dilemma, their accommodation to men in the books. It will draw a last image of ladies' battle for opportunity. It has been declared that lady's character is pushed aside and even eradicated in the male centric social structure of religious states

    Constrained Optimal Hybrid Control of a Flow Shop System

    Get PDF
    Cataloged from PDF version of article.We consider an optimal control problem for the hybrid model of a deterministic flow shop system, in which the jobs are processed in the order they arrive at the system. The problem is decomposed into a higher-level discrete-event system control problem of determining the optimal service times, and a set of lower-level classical control problems of determining the optimal control inputs for given service times. We focus on the higher-level problem which is nonconvex and nondifferentiable. The arrival times are known and the decision variables are the service times that are controllable within constraints. We present an equivalent convex optimization problem with linear constraints. Under some cost assumptions, we show that no waiting is observed on the optimal sample path. This property allows us to simplify the convex optimization problem by eliminating variables and constraints. We also prove, under an additional strict convexity assumption, the uniqueness of the optimal solution and propose two algorithms to decompose the simplified convex optimization problem into a set of smaller convex optimization problems. The effects of the simplification and the decomposition on the solution times are shown on an example problem

    A search method for optimal control of a flow shop system of traditional machines

    Get PDF
    Cataloged from PDF version of article.We consider a convex and nondifferentiable optimization problem for deterministic flow shop systems in which the arrival times of the jobs are known and jobs are processed in the order they arrive. The decision variables are the service times that are to be set only once before processing the first job, and cannot be altered between processes. The cost objective is the sum of regular costs on job completion times and service costs inversely proportional to the controllable service times. A finite set of subproblems, which can be solved by trust-region methods, are defined and their solutions are related to the optimal solution of the optimization problem under consideration. Exploiting these relationships, we introduce a twophase search method which converges in a finite number of iterations. A numerical study is held to demonstrate the solution performance of the search method compared to a subgradient method proposed in earlier work. 2010 Elsevier B.V. All rights reserved

    Predicting Fraud Apps Using Hybrid Learning Approach: A Survey

    Get PDF
    Each individual in the planet are mobile phone users in fact smart-phone users with android applications. So, due to this attractiveness and well-known concept there will be a hasty growth in mobile technology. And in addition in information mining, mining the required information from a fastidious application is exceptionally troublesome. Consolidating these two ideas of ranking frauds in android market and taking out required information is gone exceptionally tough.The mobile phone Apps has developed at massive speed in some years; as for march 2017, there are nearby 2.8 million Apps at google play and 2.2 Apps at Google Apps store. In addition, there are over 400,000 self-governing app developers all fighting for the attention of the same potential clients. The Google App Store saw 128,000 new business apps alone in 2014 and the mobile gaming category alone has contest to the tune of almost 300,000 apps. Here the major need to make fraud search in Apps is by searching the high ranked applications up to 30-40 which may be ranked high in some time or the applications which are in those high ranked lists should be confirmed but this is not applied for thousands of applications added per day. So, go for wide examination by applying some procedure to every application to judge its ranking. Discovery of ranking fraud for mobile phone applications, require a flawless, fraud less and result that show correct application accordingly provide ranking; where really make it occur by searching fraud of applications. They create fraud of App by ranked high the App by methods using such human water armies and bot farms; where they create fraud by downloading application through different devices and provide fake ratings and reviews. So, extract critical data connecting particular application such as review which was called comments and lots of other information, to mine and place algorithm to identify fakeness in application rank

    Crowd Recognition System Based on Optical Flow Along with SVM classifier

    Get PDF
    The manuscript discusses about abnormalities in a crowded scenario. To prevent the mishap at a public place, there is no much mechanism which could prevent or alert the concerned authority about suspects in a crowd. Usually in a crowded scene, there are chances of some mishap like a terrorist attack or a crime. Our target is finding techniques to identify such activities and to possibly prevent them. If the crowd members exhibit abnormal behavior, we could identify and say that this particular person is a suspect and then the concerned authority would look into the matter. There are various methods to identify the abnormal behavior. The proposed approach is based on optical flow model. It has an ability to detect the sudden changes in motion of an individual among the crowd. First, the main region of motion is extracted by the help of motion heat map. Harris corner detector is used for extracting point of interest of extracted motion area. Based on the point of interest an optical flow is estimated here. After analyzing this optical flow model, a threshold value is fixed. Basically optical flow is an energy level of individual frame. The threshold value is forwarded to SVM classifier, which produces a better result with 99.71% accuracy. This approach is very useful in real time video surveillance system where a machine can monitor unwanted crowd activity.
    • …
    corecore