...finest audio feature to spot advertisement border for the video along background music. Taking this process further it is extremely important to detect the border, novel method is used to serve this purpose, this method is generally used for detection of logo video frames this is important to indicate the beginning and finish of the advertisement at the borders detected by audio. Investigations display that merging audio and visual traces is an effective way to detect advertisements. INTRODUCTION Recognition based algorithms play important role in detecting advertisements in the personal recordings of a program on TV. Many algorithms are used to detect the commercials. For many consumers facilities such as recording of television program have proved highly convenient, this can be achieved through combination of technologies such as set top box and digital media storage, this facility is getting highly popular because of decrease in costs (Sadlier et al, 2002). In this framework, audio visual investigation gears that aid the user to accomplish the huge amount of data play important role for such recording devices (Lienhart, Kuhmnch, & Effelsberg, 1996). There are many other benefits of this system also can be seen such as detection of TV advertisements and some other investigation tools. For example, if the perspective of the end user is taken into the account, it...
Words: 2191 - Pages: 9
...that fasten it to the airframe. The resulting strain, exacerbated by corrosion, drives the growth of initially microscopic cracks. To avoid catastrophe, aircraft are inspected periodically for cracks and corrosion. The inspection technology employed is ~90% naked-eye vision. We have developed and demonstrated robotic deployment of both remote enhanced 3D-stereoscopic video instrumentation for visual inspection and remote eddy current probes for instrumented inspection. This article describes the aircraft skin inspection application, how robotic deployment may alleviate human performance problems and workplace hazards during inspection, practical robotic deployment systems, their instrumentation packages, and our progress toward developing image enhancement and understanding techniques that could help aircraft inspectors to find cracks, corrosion, and other visually detectable damage. KEYWORDS: automated robot visual NDI inspection enhanced remote stereoscopic multiresolution 1. INTRODUCTION Pressurization and de-pressurization of an airplane during each takeoff and landing cycle causes its body to expand and contract like an inflating and deflating balloon. Cycling thus induces stress fatigue at the rivets that hold the aircraft surface skin to its frame, resulting in the growth of radial cracks. On April 28, 1988 Aloha Airlines flight 243, flying at 24,000 feet near Maui, abruptly lost a section of its upper fuselage skin from the floorline on the left side to the windowline...
Words: 10694 - Pages: 43
...award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication Engineering, for providing us with this opportunity to work on our project and also for permitting access to the required facilities. We would also like to thank the lab staff for their technical support and providing us assistance. Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George ii Abstract Autonomous navigation of a mobile robot in outdoor...
Words: 13508 - Pages: 55
...learning. Billions of dollars are assigned to create self-driving car. Google lead the movement with their Google Car created from their lab Google X, followed by Tesla who manage to quickly catch up with their big fleet of cars driving on the roads at each instant. Uber just created a research center for this work, GM partner with Lyft, George Hotz, an americain car made his own home-made simple self-driving car and even Nvidea created a demo. In this sense, this work is not really original or innovative. We however thought this work was not yet popularized to students projects. This works is also interesting because it’s not ’achieved’ even by the current state-of-the-art, there are still lots of works to be done. II. T HEORY will be very hard to distinguish between them and not useful for a long-term solution. Additionally we would encounter a major problem when defining the color and shape of a car. So instead we design an machine-learning algorithm which uses a similar approach like Google and Tesla does. By training our own classifier for each element in traffic signs, which requires most of the computation, it allows our mobile platform to detect traffic signs and differentiate between them. Once the parameters are available, we can computationally cheap detect our classified objects. The result of our very fast image processing allows us to integrate the method...
Words: 3460 - Pages: 14
...1-1 : Introduction :- Increased use of digital images in recent years due to the availability of echnology equipment Has made the process of dealing with images of things possible, onventional cameras are based physicist based controls Lighting by the user entering the lens by controlling the amount and direction of light, while the camera Digital not only require a simple knowledge by the user, and the principle of its work depends on converting light into Electrical discharges, and converts the image into a series of binary digits (zeros and ones) to represent the points of the image [kareem1] . The enormous development of computer technology, the great advances in digital recording of images Helped the emergence of devices that...
Words: 2221 - Pages: 9
...for Efficient Human Skin Detection Wei Ren Tan, Chee Seng Chan, Member, IEEE, Pratheepan Yogarajah, and Joan Condell Abstract—A reliable human skin detection method that is adaptable to different human skin colors and illumination conditions is essential for better human skin segmentation. Even though different human skin-color detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colors across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin detection approach that combines a smoothed 2-D histogram and Gaussian model, for automatic human skin detection in color image(s). In our approach, an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required, and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach. Index Terms—Color space, dynamic threshold, fusion strategy, skin detection. I. INTRODUCTION W ITH the progress of information society today, images have become more and more...
Words: 5432 - Pages: 22
...Digital Image Processing: PIKS Inside, Third Edition. William K. Pratt Copyright © 2001 John Wiley & Sons, Inc. ISBNs: 0-471-37407-5 (Hardback); 0-471-22132-5 (Electronic) DIGITAL IMAGE PROCESSING DIGITAL IMAGE PROCESSING PIKS Inside Third Edition WILLIAM K. PRATT PixelSoft, Inc. Los Altos, California A Wiley-Interscience Publication JOHN WILEY & SONS, INC. New York • Chichester • Weinheim • Brisbane • Singapore • Toronto Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright 2001 by John Wiley and Sons, Inc., New York. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic or mechanical, including uploading, downloading, printing, decompiling, recording or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed...
Words: 173795 - Pages: 696
...UNIVERSITY OF KERALA B. TECH. DEGREE COURSE 2008 ADMISSION REGULATIONS and I VIII SEMESTERS SCHEME AND SYLLABUS of COMPUTER SCIENCE AND ENGINEERING B.Tech Comp. Sc. & Engg., University of Kerala 2 UNIVERSITY OF KERALA B.Tech Degree Course – 2008 Scheme REGULATIONS 1. Conditions for Admission Candidates for admission to the B.Tech degree course shall be required to have passed the Higher Secondary Examination, Kerala or 12th Standard V.H.S.E., C.B.S.E., I.S.C. or any examination accepted by the university as equivalent thereto obtaining not less than 50% in Mathematics and 50% in Mathematics, Physics and Chemistry/ Bio- technology/ Computer Science/ Biology put together, or a diploma in Engineering awarded by the Board of Technical Education, Kerala or an examination recognized as equivalent thereto after undergoing an institutional course of at least three years securing a minimum of 50 % marks in the final diploma examination subject to the usual concessions allowed for backward classes and other communities as specified from time to time. 2. Duration of the course i) The course for the B.Tech Degree shall extend over a period of four academic years comprising of eight semesters. The first and second semester shall be combined and each semester from third semester onwards shall cover the groups of subjects as given in the curriculum and scheme of examination ii) Each semester shall ordinarily comprise of not less than 400 working periods each of 60 minutes duration...
Words: 34195 - Pages: 137
...Brain-Controlled Wheelchairs A Robotic Architecture By Tom Carlson and José del R. Millán © photodisc & techpool studios I ndependent mobility is central to being able to perform activities of daily living by oneself. However, power wheelchairs are not an option for many people who, due to severe motor disabilities, are unable to use conventional controls. For some of these people, noninvasive brain– computer interfaces (BCIs) offer a promising solution to this interaction problem. Brain-Actuated Wheelchairs Millions of people around the world suffer from mobility impairments, with hundreds of thousands of them relying on power wheelchairs for activities of daily living [1]. However, many patients are not prescribed power wheelchairs either because they are physically unable to control the chair using a conventional interface or because they are deemed incapable of safely operating them [2]. Consequently, it has been estimated that between 1.4 and 2.1 million wheelchair users might benefit from a smart-powered wheelchair if it were able to provide a degree of additional assistance to the driver [3]. Digital Object Identifier 10.1109/MRA.2012.2229936 Date of publication: 8 March 2013 In our research with brain-actuated wheelchairs, we target a population that is or will become unable to use conventional interfaces due to severe motor disabilities. Noninvasive BCIs offer a promising new interaction modality that does not rely on a fully functional peripheral nervous...
Words: 7037 - Pages: 29
...JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. TECH (REAL TIME SYSTEMS) COURSE STRUCTURE AND SYLLABUS I YEAR I SEMESTER Code Group Subject L P Credits Advanced Computer Architecture 3 0 3 Advanced Micro Controllers 3 0 3 Fundamentals of Real Time Systems 3 0 3 Design & Development of Real Time Systems 3 0 3 Elective -I Digital Control Systems Distributed Operating Systems Cloud Computing 3 0 3 Elective -II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel...
Words: 3183 - Pages: 13
...The Future of Cardiovascular Diagnostics THE MARKET, TRENDS & FUTURE DIRECTIONS Extracted on: 20 Apr 2011 Reference Code: BI00021-008 Publication Date: 02 Mar 2010 Publisher: Datamonitor © Datamonitor This content is a licensed product, no part of this publication shall be reproduced, sold, modified or stored in a retrieval system or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of Datamonitor. The information in this document has been extracted from published research by a registered user of the Datamonitor360 platform. Datamonitor shall not be responsible for any loss of original context and for any changes made to information following its extraction. All information was current at the time of extraction although the original content may have been subsequently updated. Please refer back to the website http://360.datamonitor.com/ to view the most recent content and the original source of the information. To the maximum extent permitted by applicable law we exclude all representations, warranties and conditions relating to the facts of all publications. At time of publication no guarantee of accuracy or suitability, whether express or implied, shall attach to this publication (including, without limitation, any warranties implied by law of satisfactory quality, fitness for purpose and/or the use of reasonable care and skill). Please note that the findings, conclusions and recommendations...
Words: 9155 - Pages: 37
...Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake...
Words: 9337 - Pages: 38
...The Design Space of Metamorphic Malware Andrew Walenstein†, Rachit Mathur‡, Mohamed R. Chouchane†, and Arun Lakhotia† University of Louisiana at Lafayette, Lafayette, LA, U.S.A. McAfee Avert Labs, Beaverton, OR, U.S.A. arun@louisiana.edu rachit_mathur@avertlabs.com mohamed@louisiana.edu walenste@ieee.org ‡ † Abstract: A design space is presented for metamorphic malware. Metamorphic malware is the class of malicious self-replicating programs that are able to transform their own code when replicating. The raison d'etre for metamorphism is to evade recognition by malware scanners; the transformations are meant to defeat analysis and decrease the number of constant patterns that may be used for recognition. Unlike prior treatments, the design space is organized according to the malware author's goals, options, and implications of design choice. The advantage of this design space structure is that it highlights forces acting on the malware author, which should help predict future developments in metamorphic engines and thus enable a proactive defence response from the community. In addition, the analysis provides effective nomenclature for classifying and comparing malware and scanners. Keywords: Metamorphic Malware, Virus Scanner. 1. Introduction Metamorphism is the ability of malware to transform its code. This ability was first introduced in viruses and was later used by worms, Trojans, and other malware. There now exist several metamorphic engines—programs that implement...
Words: 5825 - Pages: 24
...Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com. Editor: Mike Loukides Production Editor: Rachel Monaghan Production Services: Newgen Publishing and Data Services Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano Printing History: September 2008: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Learning OpenCV, the image of a giant peacock moth, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This book uses Repkover,™ a durable and flexible lay-flat binding. ISBN: 978-0-596-51613-0 [M] Contents Preface . . . . . . . . . . . . . . . . . . ...
Words: 150684 - Pages: 603
... |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3 |4 | | |English Language Communication Skills Lab. |- |3 |4 | | |Total |25 |15 |56 ...
Words: 26947 - Pages: 108