12 research outputs found
Face Recognition by Artificial Neural Network using MATLAB Toolbox
Technology has always aimed at making human life easier and Artificial Neural Network has played an integral part in achieving this. Neural networks include simple elements operating in parallel which are inspired by biological nervous systems. These networks can be trained to perform specific task which is remedy for the problems faced by conventional computers or human beings. This electronic document mainly focuses on implementation of face recognition software which uses Neural Network tool box of MATLAB with back propagation algorithm. This software recognizes faces from standard set of images and also calculates error probability.
DOI: 10.17762/ijritcc2321-8169.150615
Integrating Web - based Services with Distributed Computing over a Network
Past few decades has been years of revolution especially in Information Technology. Because of its omnipresent nature, evolution has taken place from standalone applications to web based applications to distributed computing. Combining interrelated features of IT gave rise to services using Distributed Computing over a network also known as Cloud Computing. Cloud computing is basically internet computing, where the data is stored, accessed and processed on remote servers via internet. This electronic document focuses on integration of web service with cloud, which gives an essence of SaaS aspect of Cloud computing. This also describes the case study to attempt an implementation of the same.
DOI: 10.17762/ijritcc2321-8169.150518
Machine Learning Methods for detection of bystanders: A Survey
The number of users on social media networks is increasing day by day as their popularity increases. The users are sharing their photos, videos, daily life, experiences, views, and status updates on different social networking sites. Social networking sites give great possibilities for young people to interact with others, but they also make them more subject to unpleasant phenomena such as online harassment and abusive language, which leads to cyberbullying. Cyberbullying is a prevalent social problem that inflicts detrimental consequences to the health and safety of victims such as psychological distress, anti-social behavior, and suicide. To minimize the impact of Cyberbullying, the Bystander role is very important. In this paper, a review of the cyberbullying content on the Internet, the classification of cyberbullying categories, classifying author roles (harasser, victim, bystander-defender, bystander-assistant), data sources containing cyberbullying data for research, and machine learning techniques for cyberbullying detection are overviewed. 
Frost Formation in Evaporator Fins with Embedded Negative Stiffness Structures
Frosting in the evaporator leads to an increase in thermal resistance and reduced airflow, resulting in decreased performance. Traditional thermal defrosting strategies lead to significant energy penalties. Novel shape morphing evaporator fins embedded with multistable structures offer the opportunity for faster defrosting and large energy savings while keeping the capital cost low. This type of morphing fins enables a mechanical defrosting approach that is more effective for higher densities and thicknesses of frost. However, there is a need to better understand frost formation in these structures. In this study, we use a modeling and experimental approach to understand frosting on shape morphing fins. An experimental setup was developed that is capable of frost formation at different conditions and testing various defrosting strategies. Leveraging this, we formed frost at various conditions on both an angled shape morphing fin and a flat fin and performed comparisons between model predictions and measurements
Evaluation of Current Technologies for Training, Web Apps, and New Technologies
This report details the activities conducted to assess the feasibility of using new technology tools for safety training. Utilizing established research studies, risk frameworks, and vendor quotations, we compared the different attributes of training methods such as Traditional Training (classroom/presentations), LMS (Learning Management System) based gamification, Computer Simulation, Virtual Reality (VR), and Augmented Reality (AR). The anticipated benefits include improved training program development, higher interactivity and long-term retention, and the chance to reduce work zone risk. The project was divided in three phases, and the following are our four key takeaways.
(1) Quality of Safety Training: Benchmarking training practices provided strong evidence that participative programs, such as role plays, demonstrations of safety devices, and risk mapping are some of the best practices. Additionally, training engineers on work zone design, auditing, and recording safe work zones can influence project attributes, such as the length and duration of work zone. Including all these aspects during the project planning phase has a greater chance of influencing work zone safety.
(2) Effectiveness of New Technology Tools: Our vendor outreach project phase allowed us to determine the different attributes in training course development and customer experience using new technology tools. Established research studies provided significant support to our hypothesis that new technology tools are more effective and interactive compared to traditional learning.
(3) Risk-Based Approach to Training: Analyzing the risk index for work zone attributes indicate the degree of risk that a worker faces while performing a task characterizing those attributes. We concluded that implementation of new technology tools should be planned based on this risk index and optimization model. This will ensure better worker performance and perception of the course content in alignment with the severity of that work attribute.
(4) Optimizing Selection of Training Tools for Tasks: We provide an optimization model to choose the optimal mix of training tools to attain the desired level of risk reduction. The tool is spreadsheet-based and shows the benefit of using a portfolio of modules across training tools, each targeted at attaining the desired risk reduction by attribute for a task. By using the risk reduction due to training tools from the literature, the cost data from vendors and task characteristics, this tool can enable INDOT managers to manage risk cost efficiently