Gallery Items tagged Two-column
Recent
![Security Systems : Facial Recognition using MATLAB](https://writelatex.s3.amazonaws.com/published_ver/6817.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=538dfa3cb1b99fe455a6dca96269271c8a653311b30b34bb18d3ea1d2d4fd614)
Security Systems : Facial Recognition using MATLAB
Biometric refers to the automatic identification of a person based on his or her physiological and individual characteristics that can be easily verified. Among the featured measures of this system are face, fingerprint, speech recognition, retinal and signature etc. To fortify the actual presence of a real trait against a fake self-generated sample biometric system is used. In this research paper, the focus is laid on basic techniques for security system. Face recognition. In face recognition, facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject’s face. [1]We can apply it to the servo motors using train database and test database. If the data matches the train database, it sends the command to the servo motors which in turn will open the door. [2]The UI displays ACCESS ACCEPTED or ACCESS DENIED based on the recognition using test and trained databases.This system is implemented using MATLAB.
Abhishek Anand
![2017年度人工知能学会全国大会(JSAI2017)の原稿テンプレート](https://writelatex.s3.amazonaws.com/published_ver/5424.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=012bb709b377174b4f595bb763457635d932f92b9cf4511a7115079e4aaa3e02)
2017年度人工知能学会全国大会(JSAI2017)の原稿テンプレート
2017年度人工知能学会全国大会(JSAI2017)の原稿テンプレートです。
公式のスタイルファイルをダウンロードし、文字コードをUTF-8に変換して、overleafで執筆できるようにしたものです。
下記URLの原稿執筆案内を参照し、各自の責任でお使いください。
https://www.ai-gakkai.or.jp/jsai2017/author-guideline
Yuya Yoshikawa
![Assignment Template](https://writelatex.s3.amazonaws.com/published_ver/5862.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7a6b11773750c7914941493bee060f2a748cdce8ed3d4f0c2b977844536bfd3e)
Assignment Template
You can use this as a template for assignment
Md Atikuzzaman
![Design of an Optoelectronic State Machine with integrated BDD based Optical logic](https://writelatex.s3.amazonaws.com/published_ver/4530.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=cb030a1708177a45576e68a514c3c8a3b967de770ca1dfcd45d025385cf3a9f4)
Design of an Optoelectronic State Machine with integrated BDD based Optical logic
In this paper I demonstrate a novel design for an optoelectronic State Machine which replaces input/output forming logic found in conventional state machines with BDD based optical logic while still using solid state memory in the form of flip-flops in order to store states. This type of logic makes use of waveguides and ring resonators to create binary switches. These switches in turn can be used to create combinational logic which can be used as input/output forming logic for a state machine. Replacing conventional combinational logic with BDD based optical logic allows for a faster range of state machines that can certainly outperform conventional state machines as propagation delays within the logic described are in the order of picoseconds as opposed to nanoseconds in digital logic.
Macauley Coggins
![Proyecto: Jaula de Faraday](https://writelatex.s3.amazonaws.com/published_ver/4330.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=81fb63053136aa10ae4426ae5bfd926d4199d0e4e3dd36ae919712b811c68da5)
Proyecto: Jaula de Faraday
In this project the behavior of the Faraday cage as an insulator against an induced load, either by an effect of nature as lightning or lightning or power surges be considered. As we know the Faraday cage is a conductor of electric current and therefore theoretically there will be inside a magnetic field or electromagnetic wave in the same way there will be no magnetic field.
Eduardo
![Oscilaciones del Neutrino](https://writelatex.s3.amazonaws.com/published_ver/4222.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=3546de2d9387d5035cb0b92b93d05d4e263fa969f93bc5f521e63a18b90d2a13)
Oscilaciones del Neutrino
Las observaciones han mostrado que el numero de neutrinos electrónicos νe que llegan a la tierra desde el sol es aproximadamente la mitad del número esperado de nuestro conocimiento de las reacciones nucleares que ocurren al interior del sol. Estas observaciones se explican como el resultado de que algunos neutrinos electrónicos νe se convierten en neutrinos muónicos νμ y neutrinos tauónicos ντ durante su recorrido entre su creación al interior del sol y su observación en la tierra. Este cambio de un sabor a otro se conoce como oscilaciónes del neutrino. Se introduce un término de masa para el neutrino que es invariante de Lorentz en la densidad lagrangiana del modelo estándar (SM), y se describe el estado del neutrino |να⟩(α = e, μ, τ) como una combinación lineal de autoestados de masa |νi⟩ (i=1,2,3), lo cual conduce a las oscilaciones del neutrino.
Daniel Ocampo Henao
![LaTeX Template for Annual Conference of the Virtual Reality Society of Japan (2016)](https://writelatex.s3.amazonaws.com/published_ver/4207.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=4ba91d905c428d241ef694445aa30a73d246323d78553a9d977b2fd3fe345681)
LaTeX Template for Annual Conference of the Virtual Reality Society of Japan (2016)
日本バーチャルリアリティ学会大会2016投稿用のLaTeXフォーマットです
Takefumi Hiraki
![Review of Fault Tolerance Techniques in Distributed System](https://writelatex.s3.amazonaws.com/published_ver/3889.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=00d9c1f51a2eec4d93e9d45e33818ea75b867c80079fb756b70ff6edd51c5f1c)
Review of Fault Tolerance Techniques in Distributed System
Distributed system is a collection of independent systems which can communicate with each other by transferring massages. There are some major issues in distributed systems but we focus in this paper on fault tolerance. It is the system’s ability to work in the condition when there occur any type of some fault in the system, like failure in communication, hardware or resources. It is a very important issue in distributed system, in this paper we present a survey of different types of fault tolerance techniques and their comparison.
Ayyaz
![An analysis of DDos attacks that threaten the Cloud Environment](https://writelatex.s3.amazonaws.com/published_ver/3662.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240726T234859Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240726/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=962e28d1087ec464da28db2297d7facb091f4ed2fa3419b3a08ca9957fbf1109)
An analysis of DDos attacks that threaten the Cloud Environment
Web security issues remain a major challenge with numerous security concerns, Distributed Denial of Service Attack (DDos) leads among these. It was evolved from DOS and its main purpose is to consume large amount of server resources so that the server cannot provide service to normal users. Attackers usually gain access to large number of computers by exploiting the vulnerabilities to set up attack armies (i.e., Botnets). This paper will review and analyse different existing DDoS detecting techniques against different parameters, and propose a new hybrid architecture for the defence mechanism of DDoS attack.
Mitesh Bhopale