A study of the effect of noise injection on the training of artificial neural networks
We studied the effect of noise injection in overcoming the problem of overtraining in the
training of artificial neural networks (ANNs) in comparison with other common approaches …
training of artificial neural networks (ANNs) in comparison with other common approaches …
[PDF][PDF] Design of remote security system using embedded linux based video streaming
G Nagaraja, PN Sharada - International Journal of Computing Academic …, 2013 - meacse.org
This paper presents a design and realization method for remote video monitoring system
based on embedded Linux and wireless technology network. Monitor terminal hardware …
based on embedded Linux and wireless technology network. Monitor terminal hardware …
Privacy preserving data mining using image slicing and visual cryptography
HR Sah, G Gunasekaran - 2015 6th International Conference …, 2015 - ieeexplore.ieee.org
Slicing geometry (image) into different frames and randomizing them can help in hiding a
secret message (key) within the image and also preserve privacy. Authenticated users can …
secret message (key) within the image and also preserve privacy. Authenticated users can …
Design of multilingual fire panel user interface using embedded Qt
R Atluri, KV Sridhar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Fire alarm panel is a crucial component of the fire alarm system, which is used for monitoring
fire, measuring integrity and also for configuring and controlling the detectors. The main aim …
fire, measuring integrity and also for configuring and controlling the detectors. The main aim …
Privacy preserving data mining using visual steganography and encryption
HR Sah, G Gunasekaran - 2015 10th International Conference …, 2015 - ieeexplore.ieee.org
Steganography is the process of hiding a secret message within an ordinary message &
extracting it at its destination. Visual steganography is one of the most secure forms of …
extracting it at its destination. Visual steganography is one of the most secure forms of …
Development of visual management system for intelligent monitoring information of foundation pit engineering based on BIM
J Xuan, Y Zhuo, H Hesong… - 2018 5th International …, 2018 - ieeexplore.ieee.org
In order to realize benign management data backup and data analysis of foundation pit
monitoring and provide standardized data results, engineering management and targeted …
monitoring and provide standardized data results, engineering management and targeted …
Design of emergency remote security monitoring and control system based on ARM
S Song - 2012 2nd International Conference on Consumer …, 2012 - ieeexplore.ieee.org
Aim at the environment for the lack of power, the paper adopts S3C6410 to design
emergency remote security monitoring and control system based on ARM processor, and …
emergency remote security monitoring and control system based on ARM processor, and …
Design on general development platform for FPD systems
G Wang, M Xu, D Teng - Journal of Shanghai University (English Edition), 2011 - Springer
In this paper, a multi-functional development platform for flat panel display (FPD)
development is proposed. With the proposed development platforms, a variety of FPD …
development is proposed. With the proposed development platforms, a variety of FPD …