The proceedings contain 205 papers. The topics discussed include: performance analysis of solar power fed induction motor drive along with resonant converter;analysis of population based modern optimization techniques...
ISBN:
(纸本)9781538640319
The proceedings contain 205 papers. The topics discussed include: performance analysis of solar power fed induction motor drive along with resonant converter;analysis of population based modern optimization techniques;performance evaluation of ITS project on Mysore city bus transport operations;wireless transceiver design for visible light communication;a novel system of real time hand tracking and gesture recognition;audio encryption and decryption algorithm in image format for secured communication;low-power less-area bypassing-based multiplier design;and finger vein and finger texture based biometric approach for personal identification.
The proceedings contain 118ss papers. The topics discussed include: a comprehensive study on misconfiguration - SAAS security threat;smart tender contract management system;an analysis on conversational ai: the multim...
ISBN:
(纸本)9798350373295
The proceedings contain 118ss papers. The topics discussed include: a comprehensive study on misconfiguration - SAAS security threat;smart tender contract management system;an analysis on conversational ai: the multimodal frontier in chatbot system advancements;energy-efficient ECG signal processing based on approximate pruned Haar discrete wavelet transform implemented on FPGA;CDSS based mobile application for stroke assistance;unveiling malware secrets through cutting-edge analysis;pose detection with corrective feedback to aid physiotherapy for Parkinson’s disease;YOLO based object detection techniques for autonomous driving;aircraft engine fault detection algorithm based on multivariate time series sensor data;and medico bot: AI based telemedicine system with disease diagnosis and expert recommendation system with blockchain implementation.
Jazz reharmonization is a complex musical technique that improves harmonic frameworks by inventive chord progressions, augmenting the depth and emotional resonance of pieces. This paper examines the use of artificial ...
详细信息
Jazz reharmonization is a complex musical technique that improves harmonic frameworks by inventive chord progressions, augmenting the depth and emotional resonance of pieces. This paper examines the use of artificial ...
详细信息
ISBN:
(数字)9798331530983
ISBN:
(纸本)9798331530990
Jazz reharmonization is a complex musical technique that improves harmonic frameworks by inventive chord progressions, augmenting the depth and emotional resonance of pieces. This paper examines the use of artificial intelligence, namely transformer networks, in the automation of jazz reharmonization, ensuring melodic coherence and artistic fidelity. This review compiles current research to highlight essential approaches, including early rule-based systems, neural networks, and advanced transformer models while emphasizing their benefits and limits. Particular emphasis is placed on the difficulties associated with dataset preparation, assessment measures, and the adaptation of AI systems to the intricacies of jazz harmony. The evaluation, via a critical examination of previous studies, identifies areas for enhancement, including real-time applications, multi-modal data integration, and cross-genre adaptation. The insights provided seek to direct future research and position transformers as a revolutionary instrument in computational musicology. This document is an extensive reference for scholars and professionals investigating the convergence of artificial intelligence and jazz music.
This paper describes an algorithm of encrypting wave files in image format with a randomly generated orthogonal key decrypting them after being passed through a channel with white Gaussian noise. Gaussian noise is the...
详细信息
ISBN:
(纸本)9781538640319
This paper describes an algorithm of encrypting wave files in image format with a randomly generated orthogonal key decrypting them after being passed through a channel with white Gaussian noise. Gaussian noise is then removed and then matrix manipulations are done, to get the original audio back. In this age of information, audio encryption can be a secure way to communicate between individuals with assurance of privacy of the data.
The aim of the article is to propose a complex methodology for implementing a safety analysis of dynamical systems. The safety analysis is performed in the process of control system development, especially aiming at s...
详细信息
ISBN:
(纸本)9781538640319
The aim of the article is to propose a complex methodology for implementing a safety analysis of dynamical systems. The safety analysis is performed in the process of control system development, especially aiming at safety-critical processes of system operation. The methodology was divided into seven basic steps. The individual steps of the methodology are carried out in a hierarchical sequence. The step "Preliminary Hazard Analysis" consists of the PHI and PHA methods. Further, roles of individual methodology steps are detailed. In the second part of the article, the principle of safety-critical process monitoring based on models is described.
Here, we described primary challenges for generating context-free grammar for a given text. Creating rules using repeated or common substrings or patterns, yields compression. Such common patterns overlap with others ...
详细信息
ISBN:
(纸本)9781538640319
Here, we described primary challenges for generating context-free grammar for a given text. Creating rules using repeated or common substrings or patterns, yields compression. Such common patterns overlap with others in a various way. We, first, discussed all such different overlapping patterns and finally generated context-free grammar in polynomial time using all such non-overlapping common substrings.
In this paper, a new broadband CPW fed antenna with Split Ring Resonator (SRR) and modified ground plane is presented. To achieve a broadband, modified ground plane is employed. The antenna radiating element consists ...
详细信息
ISBN:
(纸本)9781538640319
In this paper, a new broadband CPW fed antenna with Split Ring Resonator (SRR) and modified ground plane is presented. To achieve a broadband, modified ground plane is employed. The antenna radiating element consists of split ring resonator and closed ring. The optimal dimensions are determined by parametric analysis. The proposed antenna operates over broad bandwidth of 6.06GHz with frequency range from 3.42GHz to 9.48GHz.
Technology is serving the mankind with the ripen fruits of its advancement;similar is the objective of our paper to aid to mankind with ease of initiating a task with advancement in technology as the main weapon to re...
详细信息
ISBN:
(纸本)9781538640319
Technology is serving the mankind with the ripen fruits of its advancement;similar is the objective of our paper to aid to mankind with ease of initiating a task with advancement in technology as the main weapon to reduce the complexity of the tasks in hand. In this paper we have developed an algorithm for playing the desired track by just calling out the name of the latter. Cross correlation * has aided us in making this algorithm;all of our work is done by using MATLAB. Basic transducers are used to provide the physicality to our work * Measure of similarity of two signals **(Microphone & speakers)
Around the world, billions of people access the internet today. Intrusion detection technology is a new generation of security technology that monitor system to avoid malicious activities. The paper consists of the li...
详细信息
ISBN:
(纸本)9781538640319
Around the world, billions of people access the internet today. Intrusion detection technology is a new generation of security technology that monitor system to avoid malicious activities. The paper consists of the literature survey of Internal Intrusion Detection System (IIDS) and Intrusion Detection System (IDS) that uses various data mining and forensic techniques algorithms for the system to work in real time. Data mining methods are proposed for cyber analytics in support of intrusion detection.
暂无评论