Variations in the manufacturing assembly process together with any changes in materials sourcing can give rise to variation in the functional performance of an LED. These variations can lead to differences in thermal ...
详细信息
ISBN:
(数字)9781735532509
ISBN:
(纸本)9781728191294
Variations in the manufacturing assembly process together with any changes in materials sourcing can give rise to variation in the functional performance of an LED. These variations can lead to differences in thermal characteristics such as Zth (transient thermal impedance) and RthJC (thermal resistance between chip junction and case. This study aims to analyze the measured variations of a number of LED samples and explore a methodology that will provide insights into the root cause of those variations, In addition the statistical properties of the variations are applied in a Monte Carlo thermal modelling context. Such insights and modelling methods would be employed by a lighting engineer when selecting LEDs and when simulating their thermal dependent optical behavior.
Background: Due to the large accumulation of patients requiring hospitalization, the COVID-19 pandemic disease caused a high overload of health systems, even in developed countries. Deep learning techniques based on m...
详细信息
Background: Due to the large accumulation of patients requiring hospitalization, the COVID-19 pandemic disease caused a high overload of health systems, even in developed countries. Deep learning techniques based on medical imaging data can help in the faster detection of COVID-19 cases and monitoring of disease progression. However, regardless of the numerous proposed solutions using lung X-rays, none of them is a product that can be used in the clinic. Methods: Five different datasets (clinical POLCOVID and AIforCOVID databases, a public collection of images called COVIDx set, pneumonia patients from NIH, and artificially generated data) were used to construct a representative dataset of 23 799 CXRs for model training, 1 050 images as a hold-out test set and 44 247 CXRs as independent test set (BIMCV database). A U-Net-based model was developed to identify a clinically relevant region of the CXR that contains the lungs and each class (normal, pneumonia, and COVID-19) was divided into 3 subtypes using a 2D Gaussian mixture model. A decision tree was used to aggregate predictions from the InceptionV3 convolutional network based on processed CXRs and a dense 7-layer neural network on radiomic features determined independently for the upper, middle, and lower lung fragments. Results: The lung segmentation model gave the Sorensen-Dice coefficient of 94.86% in the validation dataset, and 93.36% in the testing dataset. In 5-fold cross-validation, the accuracy for all classes ranged from 91% to 93%, keeping slightly higher specificity than sensitivity. Also, NPV was higher than PPV for each class to guarantee a low rate of false negative cases. In the hold-out test set, the balanced accuracy ranged between 68% and 100%. The highest performance was obtained for the subtypes N1, P1, and C1, while images assigned to subtypes N3, P3, or C3 have been wrongly predicted among themselves. A similar performance was obtained on the independent dataset for normal and COVID-19 class
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable iss...
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable issues. For clients, be that as it may, it's progressively imperative to meet their necessities of QoS. This paper identifies with an improvement decency intention depends on new Berger's model under the earth of vibrant cloud computing. As indicated by the distinctive kind of task scheduling, we portray the need of decency, proficiency and the Balance among advantage and reasonableness separately. We recompile the CloudSim and recreate the three undertaking task scheduling above based on expanded CloudSim individually. The exploratory outcomes show that this calculation portion not just meet the guideline of offering need to profit with because of thought to decency, yet additionally address clients' issues of orchestrated QoS.
Semantic similarity standards are an inevitable factor in Natural Language Processing tasks. Semantic similarity uses actual meaning of words to decide similarity. Semantic similarity only contains “is a” relation. ...
详细信息
Semantic similarity standards are an inevitable factor in Natural Language Processing tasks. Semantic similarity uses actual meaning of words to decide similarity. Semantic similarity only contains “is a” relation. However Semantic similarity standards developed for regular use do not perform well within specific domains. Sentiment analysis, Natural language understanding, Machine translation, artificial intelligence, psychology and cognitive science are a few of the important areas where it is employed. The paper contains a study of the state of art measures containing path based measures, information based measures, feature based measures and hybrid measures. The features, performance, advantages, disadvantages and related issues of different standards are discussed. This paper gives a review of semantic similarity standards with different approaches.
The Cloud computing concepts provide everything as a service to global users without any limitation on regions and technology. The individual user requirement, medium or large scale industry needs will be fulfill virt...
The Cloud computing concepts provide everything as a service to global users without any limitation on regions and technology. The individual user requirement, medium or large scale industry needs will be fulfill virtual infrastructure bycloud service provider with less cost. The existing most of data center has major issue on energy management, pollution and carbon emission. The power conception would be monitor in all the levels in data center helps to implementing optimizationtechnique will be to reduce energy usage. The server consolidation, schedule, optimization, automation technique will reduce power and carbon emission. The effective hardware and software usage and selection of right power source also reducepollution. This paper has been used virtualization technology for the green cloud data center to provide resources such asapplication, desktop VDI, hosted servers and server virtualization. Those resources have been hosted on hypervisors. It was monitoring and based on resource usage category, load, priority, threshold and implemented possible optimization, to reduceenergy. The experimental setup based on monitoring data and implemented referred optimization techniques helps to achievereduce energy and carbon emission.
In the micro-blog scenario, personal user profiling relying on content is limited for recommending desired diverse subjects due to its shortcomings of short text, often leading to a poor recall. Currently, many method...
详细信息
作者:
R DineshA Ezra VivinN SrinivasanJ Albert MayanU.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud comp...
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud computing in order to preserve the information using multi-security levels, and provide sufficient multilevel access and validate authorized identity. The recommended scheme is dynamic in multilevel data security, adaptable to certified resource share in, and protected against different malignant strike. Experimentation result checks the feasibleness. The processed data have multiple security level and access permission.
作者:
A. Amarnadha ReddyB. GangadharB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surround...
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surroundings resulting in spreading some savage ailments and human diseases. To overcome such issues, Advanced Waste Collection is proposed for Smart Cities which depend on Internet of Things (IoT). It will take fewer efforts to clean all the bins over the city by checking whether the dustbins are full or *** proposed work includes a smart dustbin that separates dry and wet waste so that the waste recycling can be done more *** find the efficient way to find garbage collecting routes, we use shortest path algorithms like Dijkstra's Algorithm.
作者:
B MuthukumarJ Albert MayanGokul NambiarDenil NairProfessor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India U.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, w...
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, with fingerprint based biometric security being a rather easy and efficient way. In this paper, we discuss a way to efficiently check-in to a seat, during train travel by using a QR Code and fingerprint-based authentication system. A Quick Response Code (QR Code) can be used to mark one's attendance at their seat. Fingerprint authentication is the means to authenticate a person's identity without having to carry any form of physical identity proof along with them, during travel. Given the present system to check tickets is rather redundant and time consuming, having to manually check the ticket and identity of each passenger. By using this system, we can create a more efficient and less time-consuming system, that has much lesser probabilities of human error to occur.
作者:
C. Prasanth VarmaL. Infant CintyB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it wi...
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it will provide necessary service. User will be sends request to MCS for data upload and the request will be sent to CSP and that allocates job to Virtual Machines. We need to use two machines such as HOT MACHINES and WARM MACHINES. Hot machines can handle current job. Warm machines can be idle state until the job is assigned. Every machines will be having three virtual machines. The user can raise the service request CSP to access the resources found in cloud. So, the CSP provides approve or rejection is accept by CSP, then user can immediately access or download the resource from cloud server.
暂无评论