Design an autonomous water surface cleaning robot, to automate the task of cleaning water surfaces. These robots are particularly useful in environmental protection efforts, as they can perform high-efficiency cleaning without human intervention. It can be autonomous or remote-controlled. The robot needs to be lightweight and flexible for easy tran...
|
Background: The use of Earth Observation Satellite (EOS) technology for estimation of seasonal Actual Evapotranspiration (AET) of crops at various growth stages is well establishd. Due to low levels of water metering in irrigation, it is challenging to control theft from canals and unauthorized ground water extractions.
Therefore, ET based techno...
|
Background 1. The hon’ble prime minister launched the svamitva scheme on the national panchayati raj day, 24th april 2020 with a resolve to enable the economic progress of rural india by providing “record of rights” to every rural household owner.
The scheme aims to demarcate inhabited (abadi) land in rural areas through the latest surveying dron...
|
Background: The increasing adoption of renewable energy sources like solar and wind presents significant challenges due to their intermittent nature. This variability can strain the power grid, leading to inefficiencies and reliability issues.
Traditional grid infrastructure is not designed to handle these fluctuations effectively, resulting in e...
|
Description: Building Integrated Photovoltaic (BIPV) systems are the solar power generating products or systems that are seamlessly integrated into the building envelop. The satellite data from Indian Satellites such as Cartosat-2/3 and Cartosat-1 are capable of generating 3D city models up to LoD-1. These LoD1 models, which are derived by extrudin...
|
Background: India faces a complex challenge in balancing its reliance on coal for energy with its climate change commitments. Coal mining is a major source of carbon emissions, a greenhouse gas contributing to global warming. To achieve carbon neutrality, the Indian coal sector needs to offset its emissions.
This can be done through a combination...
|
Enhancing Patient Care with Advanced Ventilation System intends to revolutionize mechanical ventilation by creating an automated ventilator that uses an Ambu bag and has complete monitoring features.
The system precisely sets and controls respiratory parameters such as tidal volume, respiratory rate, minute ventilation, peak and plateau pressures...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: Disaster response agencies often stuggle to gather timely and specific information about emergencies from various sources. Social media platforms serve as a valuable repository of such data, but manually monitoring and sorting through the vast amount of information is inefficient and resource-intensive.
Description: There is a pressin...
|
Background: Milk is perishable product, it requires immediate processing after few hours (2-4Hrs) of production, otherwise, bacterial load increases and milk gets deteriorate. At present Methytene Blue Dye Reduction Test, commonly known as MBRT test is used as a quick method to assess the microbiological quality of raw and pasteurized milk.
This ...
|
Technological solution as per queuing models in OPDs/availability of beds/admission of patients would be one area. Study of dispensation of various types of medicines/consumables and Inventory management modules at hospital level are key areas requiring support.
NIC has already developed some modules but their implementation in Delhi is yet to be...
|
Suitable technological module for testing and monitoring of quality of medicines and consumables being received in hospitals would be required so that the system ensures necessary compilance and rejection of low quality supplies without manual intervention
...
|
Hospitals/Departments shall be able to enter and Update Data in the Mobile Application which can be viewed by the Super Admin dynamically for efficient Implementation of Health and Family Welfare Schemes, other Health programmes and provide key inputs for policy formulation and appropriate programme interventions.
This Mobile Application will fac...
|
Background: During CSSR (Collapsed Structure Search and Rescue) operations, NDRF teams encounter challenges in identifying buried deceased bodies amidst rubble and debris. Traditional search methods are often time-consuming and labor-intensive, hampering the timely recovery of victims and increasing the risk of further casualties. Description: THe ...
|
With the aim to provide "Right Quantity of "Right Product" on "Right Place" on "Right Time" in "Right Condition" at "Right Cost" for "Right People" and also to streamline the distribution of drugs to institutions and ensure availability of drugs at all times, a new, innovative system named Drug Inventory and supply chain Tracking system is required...
|
Background: Glaucoma is a leading cause of blindness worldwide, and managing intraocular pressure (IOP) is crucial for preventing disease progression. Description: Traditional methods of measuring IOP, such as Goldmann applanation tonometry, require direct contact with the eye, topical anaesthesia, and skilled personnel, making them less accessible...
|
Background: The transportation of temperature-sensitive goods is a critical aspect of supply chain management. Medicines, vaccines, and certain FMCG products require strict temperature control to maintain their efficacy and safety.
Description: Exposure to high temperatures can compromise these products, leading to potential health risks and fina...
|
Background: Yoga has gained global recognition for its numerous health benefits, including physical fitness, mental well-being, and stress reduction. As part of India's ancient heritage, yoga is a key component of the AYUSH (Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy) systems of medicine, promoting holistic health practices.
In ...
|
Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes.
An efficient registration portal is crucial for fostering growth, facilitatin...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes.
An efficient registration portal is crucial for fostering growth, facilitatin...
|
Background: Farmers often face challenges in accessing markets, leading to lower income due to middlemen. This gap restricts their ability to sell produce at fair prices. Description: Create a mobile application that connects farmers directly with consumers and retailers.
The app should include features for listing produce, negotiating prices, an...
|
The Department of Consumer Affairs monitors the daily prices of 22 essential food commodities through 550 price reporting centres across the country. The Department also maintains buffer stock of pulses, viz., gram, tur, urad, moon and masur, and onion for strategic market interventions to stabilize the volatility in prices.
Decisions for market ...
|
since 2000, various authorities like parliaments and government offices have introduced electronic petitions systems (e-petitions).
Compared to most other means of petitions made available by public institutions, e-petitions have moved past the test organization and are portrayed by a significant level of institutionalization and procedural devel...
|
Nigeria's energy sector is plagued by poor, inadequate and disorganized electricity billing and consumer relations management.
Despite the introduction of prepaid billing meters, electricity billing and collection remains a major challenge in some communities in Nigeria.
Because the electricity consumer must first go to the bank to make the pay...
|
Nowadays, home loan is a frequently accessed component of people’s financing activities. Homeowners wants to increase the probability of loan acceptance, however banks seek to borrow money to low risk customers.
This paper compared and examined the machine learning models to select when loan applicants evaluating their probability of success. Thi...
|
Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time.
There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
|
Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
|
Background: Use of cryptocurrencies like bitcoin, USDT, Monero etc. for drug trafficking activities are increasingly becoming common. The relative anonymity and speed provided by cryptocurrencies are misused by drug traffickers as a mode of transaction for drug sales and also as an asset to amass the proceeds of crime.
Description: Drug trafficke...
|
Background : Digital evidence has become increasingly crucial in forensic investigations. The recovery of deleted data from storage devices is essential for reconstructing timelines, identifying suspects, and uncovering critical information. Traditional file systems like FAT and NTFS have been extensively studied, and tools for recovering deleted d...
|
Background: There are large number of cryptographic algorithms available for ensuring data confidentiality and integrity in secure communication. Identification of the algorithm is a research activity that leads to better understanding of the weakness in its implementation, in order to make the algorithm more robust and secure.
Description: The a...
|
Background: Many organization are using Cloud for hosting their web applications. The attackers can try to attack these webservers for achieving Denial of Service attack. Specifically, Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by ...
|
Background: In today’s digital age, a wide variety of services and processes take place online. Users of these digital facilities are required to upload government-issued containing documents or provide data for successfully availing the services. However, the uploaded documents or data which are required to facilitate these digital services and pr...
|
To design and develop an innovative digital forensics and incident response tool with an intuitive and accessible interface for investigators, that streamlines the process of importing evidence, conducting automated analysis, and generating detailed reports. The tool should feature an interface with clear navigation & real-time data visualization a...
|
Description: Develop an application firewall for end-points that can identity and restrict access of application to external network/hosts. The application firewall should provide further granular control of restricting domains, IP addresses and protocols for each application.
The firewall should be manageable through a centralized web console wh...
|
The covid-19 pandemic intensified the deployment of technology in Nigeria, particularly in the realm of public service delivery in Nigeria. While this has brought series of benefits, there are equally some factors undermining the utilisation of the full potential of new technologies.
This study focused on the effects of the deployment of technolo...
|
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Over the years students use manual ways to raise funds to support their election ambitions, help pay less privileged students school dues, sick friends and many other challenges which they face in the school.
To overcome the problems of manual fund raising, the researcher has developed “an Online Campus Fund Raiser System”.
The system which wil...
|
Computerized lecture reminder is a tool that permites academic students and lectures to know like due dates and locations.
Lecture reminder has turned to be a very important tool in the time management and it is a common saying in the time management that it is better to keep track of things using a system rather than your memory.
A computerized...
|
This application note addresses the design and implementation of a web-based RDBMS menu driven information system to provide the exhaustive information on existing farming systems prevailing in different Agro Climatic Zones in India (14) (29 centres across the country, India) .
information system also recommends the required technological interve...
|
this project is to design a Web-based distance learning system, where instructors and students can participate fully in distance learning activities while geographically separated from each other.
This project is aimed to design and implement a distance learning system and use internet as the delivery mode. This report discusses in detail backgr...
|
Our society suffers a lot from the things that are thrown uselessly; these things may be beneficial to our society. On the other hand, communities suffer a lot of waste especially plastic waste; this has led to environmental pollution and depletion of natural resources.
Therefore, this research aims to achieve sustainable development and achieve ...
|
Voltage regulation is a main key factor for stable power system. Recent years the electronics equipment growth is rapidly increase. These electronics devices are voltage sensitive devices.
To maintain the grid system voltage equal or near to nominal level, the DVR plays major roll.
The 31 level inverter is proposed in this study to reduce number ...
|
The project work aims at designing a student attendance system which could effectively manage attendance of students of the department of Computer Science and Engineering at Jatiya Kabi Kazi Nazrul Islam University. In this project work, attendance is marked after student’s biometric identification.
For student identification, a fingerprint recog...
|
Online auction is a business model where the items are sold through price bidding. Bidding have the start price and ending time. Potential buyers in the auction and the winner is the one who bids the item for highest price within the stipulated time.
For buying product online user must provide his personal details like email address, contact numb...
|
This project was developed in a way that the robot is controlled by voice commands. An android application with a microcontroller is used for required tasks. The connection between the android app and the vehicle is facilitated with Bluetooth technology.
The robot is controlled by buttons on the application or by spoken commands of the user. The ...
|
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Cloud computing technology will bring to banks such advantages as cost savings, enhanced data processing capacity and improved quality of financial services. To further promote the application of cloud computing in the banking industry, the first and foremost task is to solve the security problem.
Judging from the commercial banks, cloud computin...
|
Frequently we tend to tend to pay our time interrelate with numerous chatterboxes on the net, mostly targeted at such functions or just amusement. The chatbots have embedded information that helps them acknowledge the user's question and provide an answer to it.
The college enquiry chatbot project is meant exploitation algorithms that interpret ...
|
Weather forecasting has been an important application for predicting the weather changes and accordingly organizing human activities to prevent any loss. The Weathercast application notifies the user about the weather conditions like min-max temperature, humidity, windspeed, AQI (Air Quality Index), UVI (Ultraviolet Index) of any particular locatio...
|
Mobile wallets have emerged as the most significant contributor in pushing cashless and electronic payments. The surge of smartphones and internet connectivity of 4G and 5G is reflected in the robust growth of Mobile-wallets in India.
Numerous digital wallet providers have risen. Technological advancement has made everything possible under one to...
|
With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries.
In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
|
A software web application based on facial recognition is used to create a gate pass system. During college hours, it coordinates the student's gate pass request and leave. This system is ready for use and is simple to operate and manage.
A gate pass security system is what this system is called. Its main goal is to keep the campus safe from ou...
|
Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases.
We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication.
The primary step o...
|
Building a quantum analog of classical deep neural networks represents a fundamental challenge in quantum computing.
A key issue is how to address the inherent non-linearity of classical deep learning, a problem in the quantum domain due to the fact that the composition of an arbitrary number of quantum gates, consisting of a series of sequenti...
|
The deployment of automated deep-learning classifiers in clinical practice has the potential to streamline the diagnosis process and improve the diagnosis accuracy, but the acceptance of those classifiers relies on both their accuracy and interpretability.
In general, accurate deep-learning classifiers provide little model interpretability, whi...
|
predicting stock market is one of the challenging tasks in the field of computation. Physical vs. physiological elements, rational vs. illogical conduct, investor emotions, market rumors, and other factors all play a role in the prediction.
All of these factors combine to make stock values very fluctuating and difficult to forecast accurately. ...
|
Managing the result sheets using traditional approach is a cumbersome process. The person must maintain the result records in registers and files using pen and paper.
The problem with this approach is, it requires lot of paperwork which is the part of our non-renewable natural resources. We are in the age, where we must think about sustain...
|
In India, there are continuously more criminal cases filed, which results in an increase in the number of cases still outstanding. These ongoing increases in criminal cases make them challenging to categorise and resolve.
Therefore, it's crucial to identify a location's patterns of criminal activity in order to stop it from happening in order to ...
|
Machine learning (ML) can make use of agricultural data related to crop yield under varying Crop based nutrient levels, and climatic fluctuations to suggest appropriate crops or supplementary nutrients to achieve the highest possible production.
The aim of this study was to evaluate the efficacy of five distinct ML models for a dataset sourced ...
|
The Railway Reservation System (RRS) is a comprehensive software solution designed to facilitate the booking of train tickets for passengers.
With the ever-growing demand for rail travel, an efficient and user-friendly reservation system becomes indispensable for both passengers and railway authorities.
The RRS aims to streamline the ticket boo...
|
The present study aims to elucidate the main variables that increase the level of depression at the beginning of military conscription service using an artificial neural network (ANN)-based prediction model.
Random sample data were obtained from one battalion of the Lithuanian Armed Forces, and a survey was conducted to generate data for the tr...
|
In the ever-changing landscape of digital services and government initiatives, our project embarks on a mission to empower citizens with a revolutionary chatbot known as SchemeSetu.
This intelligent chatbot serves as a central information hub, consolidating crucial details on governmentsponsored loans and insurance schemes from various sources....
|
The Flight Reservation System (FRS) is a comprehensive software solution designed to facilitate the booking of Flight tickets for passengers.
With the ever-growing demand for Flight travel, an efficient and user-friendly reservation system becomes indispensable for both passengers and Flight authorities.
The FRS aims to streamline the tic...
|
In the ever-changing landscape of digital services and government initiatives, our project embarks on a mission to empower citizens with a revolutionary chatbot known as SchemeSetu.
This intelligent chatbot serves as a central information hub, consolidating crucial details on governmentsponsored loans and insurance schemes from various sources....
|
Bus Pass Management System it is the web application that will manage all the records of pass which is issue by bus administrative.
Bus Pass Management System which is a automatic system which delivering data processing in a very high speed in the systematic manner. This system helps bus administrative to keep records of bus passes. Before this...
|
Breast cancer is a deadly disease; an accurate and early diagnosis of breast cancer is the most efficient method to decrease the death rate.
But, in the early detection and diagnosis of breast cancer, differentiating abnormal tissues is a challenging task. In this paper, a weight-based AdaBoost algorithm is proposed for an effective detection a...
|
In this paper, modifications in neoteric architectures such as VGG16, VGG19, ResNet50, and InceptionV3 are proposed for the classification of COVID-19 using chest X-rays.
The proposed architectures termed “COV-DLS” consist of two phases: heading model construction and classification.
The heading model construction phase utilizes four modified d...
|
Permanent Magnet Synchronous Motor (PMSM) is widely used due to its advantages of high power density, high efficiency and so on. In order to ensure the reliability of a PMSM system, it is extremely vital to accurately diagnose the incipient faults. In this paper, a variety of optimization algorithms are utilized to realize the diagnosis of the faul...
|
Most State-Of-The-Art (SOTA) Neural Machine Translation (NMT) systems today achieve outstanding results based only on large parallel corpora. The large-scale parallel corpora for high-resource languages is easily obtainable. However, the translation quality of NMT for morphologically rich languages is still unsatisfactory, mainly because of the dat...
|
Acute myelogenous leukemia (AML) is a subtype of acute leukemia, which is prevalent among adults.The average age of a person with AML is 65 years. The need for automation of leukemia detection arises since current methods involve manual examination of the blood smear as the first step toward diagnosis. This is time-consuming, and its accuracy depen...
|
The availability of digital technology in the hands of every citizenry worldwide makes an availableunprecedented massive amount of data. The capability to process these gigantic amounts of data in real-time with Big Data Analytics (BDA) tools and Machine Learning (ML) algorithms carries many paybacks. However, the highnumber of free BDA tools, plat...
|
Even though machine learning (ML) applications are not novel, they have gained popularity partly due to the advance in computing processing.This study explores the adoption of ML methods in marketing applications through a bibliographic review of the period 2008–2022. In this period, the adoption of ML in marketing has grown significantly. This gro...
|
Machine learning has been increasingly applied in identification of fraudulent transactions. However, most application systems detect duplicitous activities after they have already occurred, not at or near real time. Since spurious transactions are far fewer than the normal ones, the highly imbalanced data makes fraud detection very challenging and...
|
This study aimed to develop accurate and explainable machine learning models for three psychomotor behaviors of delirium for hospitalized adult patients.A prospective pilot study was conducted with 33 participants admitted to a long-term care facility between August 10 and 25, 2020. During the pilot study, we collected 560 cases that included 33 cl...
|
Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search.Recently, there has been a proliferating growth of the size of multi-dimensional datasets, the input-output space dimensionality, and data structures. Hence, the conventional machin...
|
In the medical field, it is essential to predict diseases early to prevent them. Diabetes is one of the most dangerous diseases all over the world. In modern lifestyles, sugar and fat are typically present in our dietary habits, which have increased the risk of diabetes To predict the disease, it is extremely important to understand its symptoms. C...
|
Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and testing phases are more precise. An important concept to analyze when defining ML algorithms co...
|
Due to the advancement in the field of Artificial Intelligence (AI), the ability to tackle entire problems of machine intelligence. Nowadays, Machine learning (ML) is becoming a hot topic due to the direct training of machines with less interaction with a human.The scenario of manual feeding of the machine is changed in the modern era, it will lear...
|
The availability of digital technology in the hands of every citizenry worldwide makes an availableunprecedented massive amount of data. The capability to process these gigantic amounts of data in real-time with Big Data Analytics (BDA) tools and Machine Learning (ML) algorithms carries many paybacks. However, the highnumber of free BDA tools, plat...
|
? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
|
The most vital information about the electrical activities of the brain can be obtained with the help of Electroencephalography (EEG) signals. It is quite a powerful tool to analyze the neural activities of the brain and various neurological disorders like epilepsy, schizophrenia, sleep related disorders, parkinson disease etc. can be investigated ...
|
The most vital information about the electrical activities of the brain can be obtained with the help of Electroencephalography (EEG) signals. It is quite a powerful tool to analyze the neural activities of the brain and various neurological disorders like epilepsy, schizophrenia, sleep related disorders, parkinson disease etc. can be investigated ...
|
Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
|
By redefining the conventional notions of layers, we present an alternative view on finitely wide, fully trainable deep neural networks as stacked linear models in feature spaces, leading to a kernel machine interpretation. Based on this construction, we then propose a provably optimal modular learning framework for classification that does not req...
|
Monitoringthe depth of unconsciousnessduring anesthesia is beneficial in both clinical settings and neuroscience investigations to understand brain mechanisms. Electroencephalogram(EEG) has been used as an objective means of characterizing brain altered arousal and/or cognition states induced by anesthetics in real-time. Different general anestheti...
|
Cerebellar ataxia (CA) is concerned with the incoordination of movement caused by cerebellar dysfunction. Movements of the eyes, speech, trunk, and limbs are affected. Conventional machine learning approaches utilizing centralised databases have been used to objectively diagnose and quantify the severity of CA . Although these approaches achieved ...
|
As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
|
Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
|
? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
|
A novel reconfigurable intelligent surfaces (RISs)- based transmission framework is proposed for downlink nonorthogonal multiple access (NOMA) networks. We propose a quality-of-service (QoS)-based clustering scheme to improve the resource efficiency and formulate a sum rate maximization problem by jointly optimizing the phase shift of the RIS and t...
|
Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
|
As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
|
Monitoringthe depth of unconsciousnessduring anesthesia is beneficial in both clinical settings and neuroscience investigations to understand brain mechanisms. Electroencephalogram(EEG) has been used as an objective means of characterizing brain altered arousal and/or cognition states induced by anesthetics in real-time. Different general anestheti...
|
By redefining the conventional notions of layers, we present an alternative view on finitely wide, fully trainable deep neural networks as stacked linear models in feature spaces, leading to a kernel machine interpretation. Based on this construction, we then propose a provably optimal modular learning framework for classification that does not req...
|
Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
|