Series-1 (July - Aug. 2023)July - Aug. 2023 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Paper Type | : | Research Paper |
Title | : | "Image Completion Network Using Deep Learning" |
Country | : | India |
Authors | : | Mr. Karansing B Rajaput || Dr. Mrs. M. M. Pawar |
: | 10.9790/2834-1804010105 |
Abstract: Background: In This Paper, We Propose A Solution To Image Completion Using Deep Neural Networks Has Become A Hot Research Area. As Structure And Texture Are Two Indispensable Parts Of Images, Completion Algorithms Must Deal With Them Appropriately To Produce Realistic Results. However, Many Current Methods Use The End-To-End Framework To Repair An Image, Which Do Not Pay Special Attention To Texture And Structure. Therefore, They Often Generate Distorted Structures And Inconsistent Textures. To This End, We Propose A Novel Image Completion Method Comprising A Sketch Completion Network Followed By A Texture Completion........
Keywords: GAN, CNN
[1]. Koki Yoshida, Chenduo Huang, "Evaluations of Image Completion Algorithms: Exemplar- Based Inpainting vs. Evaluations of Image Completion Algorithms: Exemplar-Based Inpainting vs.," IEEE, 2017.
[2]. Rui-Long Li, Fang-Lue Zhang, Jian-Cheng Liu, Jue Wang, Ariel Shamir, Shi-Min Hu, Xian Wu, "Deep Portrait Image Completion and Extrapolation," GR, 5 dec 2019.
[3]. [3] Yi Liu Jingtao Guo, "Image completion using structure and texture GAN network," Elsevier, pp. 75- 84, 2019.
[4]. Priyansh Saxena, Manisha Pattanaik, Gaurav Kaushal, Vaishnav Chandak, "Semantic Image Completion and Enhancement using Deep Learning," vol. eeess-4, 5 jan 2020.
[5]. Jianjian Ji and Gang Yang, "Image Completion with Large or Edge-Missing Areas," mdpi, dec 2020.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pure Azimuth Estimation Of Target Heading Using Single-Base Midpoint Direction Finding Formula |
Country | : | China |
Authors | : | Tao Yu |
: | 10.9790/2834-1804010611 |
Abstract: In a two-dimensional plane, for a target in uniform linear motion, a stationary single station is assumed to be able to acquire the orientation information of the target in three consecutive equally spaced steps along the target's travelling path. Firstly, the trigonometric relationship is used to arrange the defining equation, from which the path difference between radial distances is obtained. Then the angle of arrival of the target relative to the detection station is determined with the help of the single-base midpoint direction finding formula, and then the heading angle of the target can be obtained from the relationship between the internal and external angles. The error analysis shows that the measurement accuracy obtained with the further help of single base mid-point direction finding method based on trigonometric fixed solution equations is better than that based on trigonometric method only.
Key words: Course angle; single fixed station; bearings-only location; DF; single base mid-point direction finding; passive location
[1]. XIONG Lu,LU Yishi,XIA Xin,GAO Letian,YU Zhuoping. Heading Angle Estimation Of Low-Speed Automated Electric Vehicle Based On Loosely Coupled Global Navigation Satellite System/Inertial Measurement Unit Integration[J]. Journal Of Tongji University(Natural Science),2020, 48(4):545-551
[2]. CHENG Jian-Hua,WANG Nuo,SHANG Xiu-Neng. Research On Course Angle Estimation Method Of Integrated Navigation System Based On Improved UKF[J].Navigation Positioning And Timing,2020,7(3):112-119
[3]. LIU Yong,CHEN Ben-Jun,CHENG Yue-Bing,LI Shao-Long. Base On IMU Module Heading Angle Error Correction Algorithm[J].Electronic Design Engineering,2019, 27(2):80-84
[4]. ZHANG Zhigang, ZHU Qiming,HE Jie, WANG Hui, YUE Binbin, DING Fan. Vehicle Heading Angle Measure Technology Based On RTK-GNSS And MEMS Gyroscope[J].Journal Of South China Agricultural University,2019, 40(5):34-37
[5]. PAN Chang. "Method On Heading Angle Based On Based On Bessel's Formula For Inverse Solution Of Geodetic Problem," Ship
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A new realization of the ground segment sub systems of an existing telecommand system for balloon borne payloads, using modern technology is described in this paper. Existing telecommand system (Ghosh & Tandon, 1982), has been working from last many years during TIFR 100 cm (T100) far infrared balloon flights (Mookerjea B. et al., 2003; Kaneda et al., 2013; Suzuki et al., 2021). This system was designed and realized for on line payload control during balloon flight campaigns. Upgradation for the ground system is required considering the fact that, the older system uses many of the discrete components and some of the components are obsolete. Sometimes it becomes difficult to debug and repair the system in certain situations considering the lack of support of outdated and obsolete compilers.....
Key Word: Microcontroller; Encoder; ISA; T100; Balloon borne
[1]. S. K. Ghosh And S. N. Tandon, "A Telecommand System For Balloon Payloads", 15 755, J. Phys. E: Sci. Instrum., 1982
[2]. H. Kaneda, T. Nakagawa, S. K. Ghosh, Et Al., "Large-Scale Mapping Of The Massive Star-Forming Region RCW38 In The [CII] And PAH Emission", 556, A92, A&A, 2013
[3]. B. Mookerjea, S. K. Ghosh, H. Kaneda, Et Al., "Mapping Of Large Scale 158 Microns [CII] Line Emission: Orion A", 404, 569, A&A, 2003
[4]. T. Suzuki, S. Oyabu, S. K. Ghosh, Et Al., "[CII] Emission Properties Of The Massive Star-Forming Region RCW 36 In A Filamentary Molecular Cloud", A&A, 2021
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cryptography Security Against Instrusion In Automation Protocol |
Country | : | India |
Authors | : | Dr Sameer S Nagtilak || Dr Sangeeta R Chougule |
: | 10.9790/2834-1804012631 |
Abstract: In big networks, security involves the authorization and authentication of data, which is controlled by the server. Firewall technology can be used so that the access to device can be only through one path which avoid unauthorized access but it may have limitation to block worms or Trojans. In such cases we can use antivirus to avoid unauthorized access. Chance may be also to attack the data or codes which are been transmitted from master to sensor nodes. Communication between sensor and master node can be secured using different encryption methods.Currently intrusion detection and intrusion prevention systems are often found in number of software application compulsory, but this is not the case in industrial control systems. It is very much difficult to detect and prevent software attacks such as denial of service, response injection, command injection, and reconnaissance attacks which are known attacks for serial port based industrial control systems. Mostly such attack damage the communication between remote devices and master terminal or human machine interface.
Key Word: Attacks, Modbus, intrusion,attack
[1] Pal Varga, Sandor Plosz, Gabor Soos, Csabahegedus, (2017), "Security Threats And Issues In Automation Iot" IEEE 13th International Workshop On Factory Communication Systems (WFCS).
[2] Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova,(2013) "Advances In The Protection Of Critical Infrastructure By Improvement In Industrial Control System Security" Proceedings Of The Eleventh Australasian Information Security Conference (AISC 2013), Adelaide, Australia
[3] Mohan V. Pawar ,Anuradha J,(2015) "Network Security And Types Of Attacks In Network" International Conference On Intelligent Computing, Communication & Convergence, Procedia Computer Science 48 ( 2015 ) 503 – 506.
[4] Thomas H. Morris, Bryan A. Jones, Rayford B. Vaughn, Yoginder S. Dandass, "Deterministic Intrusion Detection Rules For MODBUS Protocols", 2013 46th Hawaii International Conference On System Sciences.
[5] Mrityunjai Tiwari, Sasi SR Kumar, Sukumara T, "Adaptibility Of Wireless Sensor Network For Integrating SMART GRID Elements In Distribution System"2013 Colloquium November 13-15, 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Varaha Floor Cleaning System |
Country | : | India |
Authors | : | Tejal Dadas || Payal Shah || Pooja Khismatrao || Manisha Bansode |
: | 10.9790/2834-1804013236 |
Abstract: Cleaning the floors in universities, hospitals, air ports, theatres, retail malls, and factories is the goal of this effort. The goal of this project is to design and build a machine that can clean both wet and dry floors. It can be used to clean both dry and damp floors. Maintaining clean floors is crucial for maintaining our health, and this floor cleaning machine makes the work simpler. As a result, this initiative is quite beneficial in today's world. This machine's straightforward build and design make it simple for anyone to use. The floor cleaning device consists of an AC-to-DC converter, a foam rolling brush, and a DC motor. The goal of this project is to provide a more modern technique....
Key Word: floor cleaning machine, Control system, motor wheel system, Bluetooth, Manual control, Power status indica tions, Power controls, Power efficient
[1]. J. Forlizzi And C. Disalvo, "Service Robots In The Domestic Environment: A Study Of The Roomba Vacuum In The Home," In Proceeding Of The 1st Acm Sigch1/Sigart Conference On Human-Robot Interaction - Hri •06,2006, Pp. 258-265.
[2]. Ajay P John-"Implementation Of An Automated Smart Robotic Floor Cleaner". B. Tech Student, Dept. Of E.C.E., Hkcet, Pampakuda, Ernaku Lam, India.
[3]. T. Jayananda Kumar, Et. Al. (2020). Design And Fabrication Of Wet And Dry Floor Cleaner With Iot Based Control. Journal Of Emerging Technologies And Innovative Research, 7, 1070- 1075.
[4]. Brochure, Sludge Cleanning Services, "Sce Sch", Janyu Technolo Gies Pvt Ldt Company, Mumbai, 2014.
[5]. Avinash Chahare, Et. Al. (2022). Design Modification And Fabrication Of Eco-Friendly Cleaning Machine. International Journal Of Advanced Research In Science, Communication And Technology,2, 750-756.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Owners' Collaboration In Running An IoT: An Evidential Model |
Country | : | USA |
Authors | : | Bel G. Raggad |
: | 10.9790/2834-1804013740 |
Abstract:There are many owners in an IoT. Every owner sees the same IoT through his own smart devices that are part of the IoT. An owner's operational data is generated at the edge layer but is immediately transmitted to the cloud where it resides quasi-permanently. An owner in the IoT computing environment, however, can always process his own data in the cloud and generate the decision support he needs to manage his part of the IoT. Unfortunately, the great loads of operational data add too much confusion and a great deal of uncertainty. The presence of great amounts of ambiguities and inconsistencies make it impossible to apply Bayesian reasoning in modeling an owner's.
Key Word: IoT, Cloud computing, Dempster and Shafer Theory, Belief structure
[1]. Gaona-Garcia, P., Et Al., Analysis Of Security Mechanisms Based On Clusters Iot Environments. Int J Interactive Multimedia Artificial Intelligence. 2017;4(3):55–60.
[2]. Kumar, R., Et Al., Internet Of Things (Iot Devices)-A Literature Review, International Journal Of Current Engineering And Technology, May/June 2022;12(3).
[3]. Kumar, S., Et Al. Internet Of Things Is A Revolutionary Approach For Future Technology Enhancement: A Review. J Big Data, 2019;111(6).
[4]. Madakam, S., Et Al., Internet Of Things (Iot): A Literature Review, Journal Of Computer And Communications, 2015; 3,164-173.
[5]. Raggad, B.G. And A. Pandya, IOSR Journal Of Electronics And Communication Engineering (IOSR-JECE) E-ISSN: 2020;15(6),1-12.