...2.3 Land use/Land covers Change Detection An increasingly common application of remotely sensed data is for change detection. Change detection is the process of identifying differences in the state of an object or phenomenon by observing it at different times(Bottolomy, 1998). Change detection is an important process in monitoring and managing natural resources and urban development because it provides quantitative analysis of the spatial distribution of the population of interest. Change detection is useful in such diverse applications as land use change analysis, monitoring shifting cultivation, assessment of deforestation, and study of changes in vegetation phenology, seasonal changes in pasture production, damage assessment, crop...
Words: 899 - Pages: 4
...to the abundance of police dramas on television, people have begun to believe that a polygraph test is infallible. Many studies, as well as a Supreme Court case, have since revealed that the veracity of polygraphs is far from impeccable. Also, there are few if any credible sources that support the veracity of polygraph machines. As Dr. Saxe and Israeli psychologist Gershon Ben-Shahar (1999) notes, "it may, in fact, be impossible to conduct a proper validity study." In real-world situations, it's very difficult to know what the truth is.” (American Psychological Association [APA], 2004) Polygraphs do not function as a lie detector. A polygraph only directly measures the autonomic responses of the subject. It measures reactions such as changes in skin conductance, pulse rate, blood pressure, and breathing while the subject is asked a series of questions. From that data, it makes an indirect assumption that positive physiological responsive indicate dishonesty and vice versa. When taking a polygraph test, proctors use several different tactics to elicit responses from their subjects. One is called the "relevant-irrelevant" technique, which mixes questions like "Did you steal the money?" in with questions like "Is today Tuesday?" Questions that are relevant to the topic are suppose to cause a jump within the subject’s autonomic system and in turn would produce results on the polygraph. Another tactic that is commonly used is "comparison questions" this process is similar to relevant-irrelevant...
Words: 769 - Pages: 4
...SELF NAVIGATING AUTONOMOUS BOT Major-Project Report by Arjun Surendran B080001EC Deepak Venga B080027EC Nandu Raj B080585EC Priyanka G Das B080312EC Sanjay George B080270EC Under the guidance of Dr. S. M. SAMEER Submitted in Partial Fulfillment of the Requirements for the degree of Bachelor of Technology In ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY CALICUT Kerala, India April 2012 NATIONAL INSTITUTE OF TECHNOLOGY CALICUT DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING CERTIFICATE This is to certify that this report titled SELF NAVIGATING AUTONOMOUS BOT is a bona fide record of the major-project done by Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George B080001EC B080027EC B080585EC B080312EC B080270EC In partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication...
Words: 13508 - Pages: 55
...Robotics 104-1 Final project: A self-driving mobile platform Lou, Seddik, Benjamin Derville and Chun-Kan Gary Chow Abstract— In this paper, we present our work on building an autonomous car. We first describe our choosen approach and the reason behind this choice, we then describe what we manage to implement and then we finish by reviewing our work done. I. INTRODUCTION Autonomous driving is maybe the most popular current project in machine learning, and especially deep learning. Billions of dollars are assigned to create self-driving car. Google lead the movement with their Google Car created from their lab Google X, followed by Tesla who manage to quickly catch up with their big fleet of cars driving on the roads at each instant. Uber just created a research center for this work, GM partner with Lyft, George Hotz, an americain car made his own home-made simple self-driving car and even Nvidea created a demo. In this sense, this work is not really original or innovative. We however thought this work was not yet popularized to students projects. This works is also interesting because it’s not ’achieved’ even by the current state-of-the-art, there are still lots of works to be done. II. T HEORY will be very hard to distinguish between them and not useful for a long-term solution. Additionally we would encounter a major problem when defining the color and shape of a car. So instead we design an machine-learning algorithm which uses a similar approach...
Words: 3460 - Pages: 14
...Edge Detection in Images A. Background Information Edge detection is a common, but very important method for analyzing images. It can be used to help identify objects in a scene or features of an object. It is widely used in biometrics security applications to identify facial features or fingerprints. The example below shows the process of edge detection applied to a picture of a bike next to a brick wall. As can be seen, edge detection easily shows the outline of the bike, the bricks in the wall, and even the writing on the bike. | | Edge Detection Example: Original Image (left) and Edge Detected Image (right) | So how does edge detection work? The first step in understanding the process is to understand what an edge is in an image. If you were to look at the values of in an image along a single row or column, you would see something that looks like this: Bricks Bricks Grout Lines Grout Lines This is actually the graph of the pixel values from the first row of the original picture shown above. What you are seeing here are the individual dark colored bricks that make up the top border of the image. The bricks themselves are the lower and relatively flat sections, while the lighter colored grout between the bricks is represented by the sharp peaks. With this understanding, we can see that an edge (a sharp change in color) is represented by a large change in the pixel value. In order to locate the areas that have these drastic changes in color...
Words: 2189 - Pages: 9
...Edge detection using Fuzzy Logic and Automata Theory Title Page By Takkar Mohit Supervisor A Thesis Submitted to In Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Electronics & Communication December 2014 . Table of Contents Title Page i CERTIFICATE ii COMPLIANCE CERTIFICATE iii THESIS APPROVAL CERTIFICATE iv DECLARATION OF ORIGINALITY v Acknowledgment vi Table of Contents vii List of Figures x Abstract xiii Chapter 1 Introduction 1 1.1 Edge Detection: Analysis 3 1.1.1 Fuzzy Logic in Image Processing 4 1.1.2 Fuzzy Logic for Edge Detection 5 1.1.3 Cellular Learning Automata 6 Chapter 2 Literature Review 7 2.1 Edge Detection: Methodology 7 2.1.1 First Order Derivative Edge Detection 7 2.1.1.1 Prewitts Operator 7 2.1.1.2 [pic] Sobel Operator 8 2.1.1.3 Roberts Cross Operator 11 2.1.1.4 Threshold Selection 11 2.1.2 Second Order Derivative Edge Detection 11 2.1.2.1 Marr-Hildreth Edge Detector 11 2.1.2.2 Canny Edge Detector 12 2.1.3 Soft Computing Approaches to Edge Detection 13 2.1.3.1 Fuzzy Based Approach 14 2.1.3.2 Genetic Algorithm Approach 14 2.1.4 Cellular Learning Automata 15 Chapter 3 Fuzzy Image Processing 18 3.1 Need for Fuzzy Image Processing 19 3.2 Introduction to Fuzzy sets and Crisp sets 20 3.2.1 Classical sets (Crisp sets) 20 3.2.2 Fuzzy sets 21 3.3 Fuzzification 22 3.4 Membership Value Assignment 22 3.5...
Words: 9151 - Pages: 37
...INTRODUCTION: The idea of using a polygraph for lie detection emerged at the end of the nineteenth century. Despite major technological advances in the twentieth century, the polygraph has evolved little since its invention. The polygraph works under the assumption that lies can be detected by certain measurable physiological changes, a theory proposed more than 100 years ago. The three physiological vectors measured in polygraphs in the 1920s cardiovascular, respiratory and perspiratory activities are still measured by modern polygraphs. Although the polygraph is still widely used, critics question its accuracy because of the subjectivity involved in the test. Recent technological breakthroughs have created new machines for lie detection. However, since many of these new technologies still operate under questionable assumptions, they are still prone to error and misinterpretation. Perhaps one of the most fascinating and misunderstood tools of the criminal justice and criminology industry is the polygraph exam, more commonly known as the lie detector test. While the tests are based on relatively simple scientific principles, not just anyone can strap you up to an instrument and start firing away with questions. Lie detector tests are instead conducted by highly trained and disciplined technicians, known as polygraph examiners. LIE DETECTION AND FORENSIC PSYCHOPHYSIOLOGY * Lie Detection * It is also referred to as deception detection which uses questioning techniques along with...
Words: 3604 - Pages: 15
...measure: rate ▶ Respiratory ▶ Blood ▶ Arm rate pressure and leg motion ▶ Electrodermal activity LIE DETECTION ▶ Lie detection, also referred to as deception detection, uses questioning techniques along with technology that record physiological functions to ascertain truth and falsehood in response. It is commonly used by law enforcement and has historically been an inexact science. Manufacturers of lie Detectors ▶ Lie detector manufacturer Nemesysco ▶ Lafayette Instrument Company ▶ Axciton Systems ▶ Limestone Technologies Inc. ▶ Stoelting Company Evolution ▶ From the onset of civilization:there has been a compelling need to determine the truthfulness of individuals when transgressions have occurred. ▶ Over the centuries: there have been many efforts to refine the rule of ‘two or more witnesses’ with additional methods of truth verification. An example of this would be circa 500 B.C. in India Evolution conti.. ▶ The first recorded effort: In 1885 Lombroso was recording changes in blood pressure in police cases in Italy with some success. ▶ The next innovation :in lie detection came in 1914 when Vittorio Benussi measured breathing to determine truthfulness. ▶ In 1920 John Larson:was the 1st to record at one time for the purpose of lie detection both breathing & pressure Evolution cont… ▶ In the 1930's:Leonard Keeler incorporated the GSR into his polygraph and...
Words: 1002 - Pages: 5
...Design Project Submitted in partial fulfillment of the requirements for the degree of Bachelor of Science Department of Electrical and Computer Engineering Union College Steinmetz Hall Schenectady, New York 12308 U.S.A. Submitted May 30, 2003 Final Project Report Senior Capstone Design Project, Department of Electrical and Computer Engineering Union College, 2003. © 2003 Douglas Lockett, Christopher Roblee Lockett, Roblee Page 2 of 48 6/3/2003 Table of Contents: Abstract……………………………………………………………………………….3 1. Introduction…………………………………………………………………………..4 2. Theory of Multiplierless Arithmetic………………………………………………...5 3. Image Filters 3.1. Motivations for IIR vs. FIR……………………………………………………....7 3.2. Edge Detection …………………………………………………………………..8 3.3. Canny Edge Detection……………………………………………………………9 4. Genetic Algorithms 4.1. Motivations……………………………………………………………………...10 4.2. Basic Theory…………………………………………………………………….10 4.3. Description of the Designed Genetic Algorithm………………………………..13 4.3.1. Fitness Function Definition and Crossover Selection…………………...17 4.3.2. Magnitude Response and Relative Error………………………………...19 4.3.3. GA Parameters…………………………………………………………...19 5. Results 5.1. Magnitude Frequency Analysis ……………………………………………...…21 5.2. Spatial Analysis…………………………………………………………………24 5.3. Sample Filter Output…………………………………………………………….25 6. Comparative Analysis of Computational Complexity Between Multiplierless and Conventional Design Methodologies 6.1. FPGA Case ……………………………………………………………………..28...
Words: 9389 - Pages: 38
...refurbishment of a building and the way it is to be used will change. What is the key thing to consider from a life safety perspective? When a fire detection system is first commissioned it is configured around a specific building layout and occupancy patterns. If these change for any reason it is crucial to ensure that it continues to do the job it was originally designed to do, so that occupants are protected and can egress the building safely in an emergency. Changes to the way a building or a room is configured and used can go unnoticed. Take a look around the room you’re in now – what's changed from this time last year? The chances are more than you initially think, with new equipment, additional employees, storage areas and workstations. Building owners and managers should also consider what I term ‘the importance scale’. They should decide just how important things are within a building when planning changes – does the importance lie with fixtures and fittings, technology, comfort, security or life safety? Put simply, I have never come across a £500 leather executive chair and £1,000 Iroko wooden desk that can protect life and property as well as a £30 smoke detector! Is it necessary to completely replace an existing fire detection system if a building changes its use? In the vast majority of cases, no. However, change of use could require modifications to the fire detection system, such as additional detection and alarm devices. This will become apparent after a...
Words: 877 - Pages: 4
...Collisions are occurring on a regular basis and the band is insufficient. 2. No central management for the 50 networked printers and there queues. 3. Current bandwidth is 10 Mbps 4. HVAC technician would like wireless access points 5. The 23 new classrooms are not on the network 6. New wing has slow connections to the mail server 7. The IT Director would like to to integrate VoIP into the current data network 8. Backbone miss-cabled Solution The correction of the limited bandwidth is the first priority. Re-cabling the current network with Category 6 UTP 1000Base F Ethernet cabling because it increases maximum data rate, from 10 Mbps to 1 Gbps. Ethernet will also allow for the use of Carrier Sense Multiple Access with Collision Detection (CSMA/CD) which can be assigned on the workstation NIC. This bandwidth increase will resolve the HVAC Technicians access issue, congestion issues for the classrooms, allows for VoIP integration and provides for future expansion. Replacing the twisted-pair on the backbone with Fiber 1000Based-F will give continued Gigabit throughput and eliminate the remote mail server issue. The use of Fiber will eliminate the 120 distance issue also between the new and old wings and allow for further expansions. A server farm needs to be stood up to include a domain controller, print server and file server will need to be completed. This server farm will allow for overall, central management of users, printers and fill access. This also allows central...
Words: 406 - Pages: 2
...traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer cause harm. 9. Network footprinting is the organized research of the internet addresses owned or controlled by a target organization. 10. Network fingerprinting is a survey of all the target organization’s internet addresses that are collected during footprinting. 11. Fingerprinting relies on footprinting for data 12. Because it...
Words: 541 - Pages: 3
...and detects changes in a person’s behavior. One of these countermeasures is inflicting pain upon themselves to boost their responses to the control questions. This will throw off the measurements because the polygraph looks for changes in behavior on certain questions compared to the control questions. If the control question measurements are boosted, then the standard of comparison is higher so the change is less. This makes it seem like the person’s behavior doesn’t change if they do actually lie. (White 2009). In 1988, there was a polygraph protection act that was issued that kept the polygraph from being used in court unless under certain conditions. This is because the polygraph is not trusted by many people due to its lack of consistency. While it might not be the easiest thing, or always work, people can find a way around the system of the polygraph. If the polygraph results can be changed, even 30 percent of the time, that is still too much inconsistency to be used in court cases as valid evidence. That is why the polygraph has been such a controversial topic for as long as it has been. Until it is more reliable, it will stay a very controversial tool (Bromley 1988). In addition, behavioral changes are noted as one of the key factors that allow people to detect lies. There are many changes in behavior that help people determine whether or not the test subject is lying. One of the signs that someone is lying using behavioral changes is that their voice changes and the words...
Words: 1727 - Pages: 7
...according to you, are some of the signs of a troubled employee that you have noticed? Changes in employee behavior can signify that an individual may have a personal problem that is interfering with their work performance. There are “red flags” in an employee’s behavior that can be used as indicators. There is usually no single event, but rather a noticeable pattern of change in the employee’s behavior, attitude or work activity. Individually, these signs may seem harmless enough but taken together they may represent a serious problem. It is important to avoid ignoring the initial indicators. These are some of the signs that might help you identify an employee who has a problem. Work Related Unable to concentrate on work and complete the given task/activities on time. Errors in the task completed Making excuses for substandard work Procrastination, inability to concentrate Self Major changes in personal appearance, attitude or behavior Problems with family, friends, co-workers, legal issues, financial issues Heightened anxiety, overly defensive 2. Have you come across any such individual/s at your organisations? YES 3. How have you handled the situation? A ONCE-to-be valuable and productive employee unexpectedly starts turning in less than an acceptable worker. More often than not, the root cause of such dramatic behavioural change is troubles - either personal or professional. Most employees develop some problems at some...
Words: 827 - Pages: 4
...measured blood pressure and pulse to assess the honesty of persons suspected of criminal conduct. His device was called a hydrosphygmograph. The theory behind polygraph tests is that when a subject is lying in response to a question, he/she will produce physiological responses that are different from those that arise in the normal course. During the polygraph examination, several instruments are attached to the subject for measuring and recording the physiological responses. The examiner then reads these results, analyzes them and proceeds to gauge the credibility of the subject's answers. Instruments such as cardiographs, pneumographs, cardio-cuffs and sensitive electrodes are used in the course of polygraph examinations. They measure changes in various aspects such as respiration, blood pressure, blood flow, pulse and galvanic skin resistance. There are three prominent polygraph examination techniques: i. The relevant-irrelevant (R-I) technique ii. The control question (CQ) technique iii. Directed Lie-Control (DLC) technique Each of these techniques includes a pre-test interview during which the subject is acquainted with the test procedure and the examiner gathers the information which is needed to finalize the questions that are to be asked....
Words: 1790 - Pages: 8