282 research outputs found

    Learning to Hash-tag Videos with Tag2Vec

    Full text link
    User-given tags or labels are valuable resources for semantic understanding of visual media such as images and videos. Recently, a new type of labeling mechanism known as hash-tags have become increasingly popular on social media sites. In this paper, we study the problem of generating relevant and useful hash-tags for short video clips. Traditional data-driven approaches for tag enrichment and recommendation use direct visual similarity for label transfer and propagation. We attempt to learn a direct low-cost mapping from video to hash-tags using a two step training process. We first employ a natural language processing (NLP) technique, skip-gram models with neural network training to learn a low-dimensional vector representation of hash-tags (Tag2Vec) using a corpus of 10 million hash-tags. We then train an embedding function to map video features to the low-dimensional Tag2vec space. We learn this embedding for 29 categories of short video clips with hash-tags. A query video without any tag-information can then be directly mapped to the vector space of tags using the learned embedding and relevant tags can be found by performing a simple nearest-neighbor retrieval in the Tag2Vec space. We validate the relevance of the tags suggested by our system qualitatively and quantitatively with a user study

    Clinical profile of dengue fever infection in patients admitted in NCMC medical college, Panipat, Haryana, India

    Get PDF
    Background: Dengue infections can result in a wide spectrum of disease severity ranging from an influenza-like illness (dengue fever; DF) to the life-threatening dengue hemorrhagic fever (DHF)/dengue shock syndrome (DSS). The study was aimed to compare the clinical profile of all patients diagnosed with dengue viral infection at NCMC.Methods: This retrospective study included 136 patients infected with dengue virus, age 2 years to 68 years. Laboratory and haematological data were included.Results: Peak of infection occurred in Nov. 2017 and least number of cases were recorded in September 2017. Common clinical symptoms were fever, headache and myalgia. Common haematological abnormalities were thrombocytopenia and leucopoenia. All patients survived. There was no case of dengue hemorrhagic fever or dengue shock syndrome.Conclusions: Significant differences in the clinical profile is possibly because of infection with different serotypes of dengue virus (DENV), concurrent/sequential infection of more than one serotype, and differences in host immune responses associated with host genetic variations

    Literature Survey on Keystroke Dynamics for User Authentication

    Get PDF
    Behavioural biometrics is the field of study related to the measure of uniquely identifying and measuring the patterns in human activities. Computer security plays a vital role as most of the sensitive data is stored on computers. Keystrokes Dynamics is a technique based on human behaviour for typing the password. Whenever any user logins into the system, username and password combinations are used for authenticating the users. The username is not secret, and the imposter acts as user to guess the password also because of simplicity of password, the system is prone to more attacks. In this case biometrics provide secure and convenient authentication. Our system uses a Support Vector Machine (SVM) which is one of the best known classifications and regression algorithm. Support Vectors (SV) that fall under different regions is separated using hyper planes linear as well as non-linear. Researchers have proved that SVM will converge to the best possible solution in very less time

    Decentralized collaborative TTP free approach for privacy preservation in location based services

    Get PDF
    In recent trends, growth of location based services have been increased due to the large usage of cell phones, personal digital assistant and other devices like location based navigation, emergency services, location based social networking, location based advertisement, etc. Users are provided with important information based on location to the service provider that results the compromise with their personal information like user’s identity, location privacy etc. To achieve location privacy of the user, cryptographic technique is one of the best technique which gives assurance. Location based services are classified as Trusted Third Party (TTP) & without Trusted Third Party that uses cryptographic approaches. TTP free is one of the prominent approach in which it uses peer-to-peer model. In this approach, important users mutually connect with each other to form a network to work without the use of any person/server. There are many existing approaches in literature for privacy preserving location based services, but their solutions are at high cost or not supporting scalability.  In this paper, our aim is to propose an approach along with algorithms that will help the location based services (LBS) users to provide location privacy with minimum cost and improve scalability

    Multi-scale imaging of porous media and flow simulation at the pore scale

    No full text
    In the last decade, the fundamental understanding of pore-scale flow in porous media has been undergoing a revolution through the recent development of new pore-scale imaging techniques, reconstruction of three-dimensional pore space images, and advances in the computational methods for solving complex fluid flow equations directly or indirectly on the reconstructed three-dimensional pore space images. Important applications include hydrocarbon recovery from - and CO2 storage in - reservoir rock formations. Of particular importance is the consideration of carbonate reservoirs, as our understanding of carbonates with respect to geometry and fluid flow processes is still very limited in comparison with sandstone reservoirs. This thesis consists of work mainly performed within the Qatar Carbonates and Carbon Storage Research Centre (QCCSRC) project, focusing on development of three dimensional imaging techniques for accurately characterizing and predicting flow/transport properties in both complex benchmark carbonate and sandstone rock samples. Firstly, the thesis presents advances in the application of Confocal Laser Scanning Microscopy (CLSM), including the improvement of existing sample preparation techniques and a step-by step guide for imaging heterogeneous rock samples exhibiting sub-micron resolution pores. A novel method has been developed combining CLSM with sequential grinding and polishing to obtain deep 3D pore-scale images. This overcomes a traditional limitation of CLSM, where the depth information in a single slice is limited by attenuation of the laser light. Other features of this new method include a wide field of view at high resolution to arbitrary depth; fewer grinding steps than conventional serial sectioning using 2D microscopy; the image quality does not degrade with sample size, as e.g. in micro-computed tomography (micro- CT) imaging. Secondly, it presents two fundamental issues – Representative Element of Volume (REV) and scale dependency which are addressed with qualitative and quantitative solutions for rocks increasing in heterogeneity from beadpacks to sandpacks to sandstone to carbonate rocks. The REV is predicted using the mathematical concept of the Convex Hull, CH, and the Lorenz coefficient, LC, to investigate the relation between two macroscopic properties simultaneously, in this case porosity and absolute permeability. The effect of voxel resolution is then studied on the segmented macro-pore phase (macro-porosity) and intermediate phase (micro-porosity) and the fluid flow properties of the connected macro-pore space using lattice-Boltzmann (LB) and pore network (PN) modelling methods. A numerical coarsening (up-scaling) algorithm have also been applied to reduce the computational power and time required to accurately predict the flow properties using the LB and PN methods. Finally, a quantitative methodology has been developed to predict petrophysical properties, including porosity and absolute permeability for X-ray medical computed tomography (CT) carbonate core images of length 120 meters using image based analysis. The porosity is calculated using a simple segmentation based on intensity grey values and the absolute permeability using the Kozeny-Carman equation. The calculated petrophysical properties were validated with the experimental plug data.Open Acces

    Wi-Fi Signal Strength and Analysis

    Get PDF
    This work includes wifi signal strength survey of 'VIT Campus' wifi network. After analysing the AP's throughout the college, the wifi signal strength on each floor of each building was recorded using "wifi analyser" app. The recorded readings were mapped and discrepancies and redundancies in the placements of AP's was studied considering the facts such as student densities, obstacles, laboratories, classrooms. Dead zones were identified and the AP's were optimised and additional AP's are suggested to have a more effective coverage

    Maximizing Power Output of a Partially Shaded Total-Cross-Tied Photovoltaic array

    Get PDF
    Non-uniform conditions on the modules of the PV array, especially, partial shading reduces the output of the PV array to a large extent. The shaded module in a string limits the current of the entire string and hence, the output power of the string.  The output power under such conditions is reported to be higher for total-cross-tied (TCT) configuration. This paper describes two different approaches, one based on current compensation (current equalization) and another based on voltage equalization, to extract higher power from the partially shaded total-cross-tied photovoltaic array. The TCT configuration is considered to minimize the number of converters, sensors, cost and complexity involved. The additional converters in the two distinct approaches evaluated here operate only when the partial shading occurs and are controlled to minimize the current and voltage miss-matches. The analysis and the control algorithm are presented. Simulation results obtained in MATLAB/Simulink are included to demonstrate the effectiveness of both methods and the relative merits and demerits of these approaches are highlighted
    • …
    corecore