Human facial expression recognition is one of the foremost powerful and difficult tasks in social... more Human facial expression recognition is one of the foremost powerful and difficult tasks in social communication yet plays very important role in communicating the emotions and intensions of human beings. Generally, facial expressions are the most unique and natural way of non-verbal communication with emotions. Along with communication we love listening music according to the mood we're in for the moment. For this reason there have been some advancements in technology that integrate emotional intelligence into existing machine learning applications are being studied. This paper is a survey on facial expression recognition (FER) and music classification techniques that embody the 3 major stages like preprocessing, feature extraction and classification. This survey explains the varied kinds of FER and music classification techniques with its major contributions. The performance of varied FER techniques is compared supported to the amount of expressions recognized and complexness of algorithms. Databases like JAFFE, CK, and a few different kind of face expression databases are mentioned during this survey.
International Journal of Scientific Research in Engineering and Management (IJSREM), 2023
If blockchain networks are to become the building blocks of the infrastructure for the future dig... more If blockchain networks are to become the building blocks of the infrastructure for the future digital economy, then several challenges related to the resiliency and survivability of blockchain networks need to be addressed. The survivability of a blockchain network is influenced by the diversity of its nodes. Trustworthy device-level attestations permits nodes in a blockchain network to provide truthful evidence regarding their current configuration, operational state, keying material and other system attributes. In the current work we review the recent developments towards a standard attestation architecture and evidence conveyance protocols. We explore the applicability and benefits of a standard attestation architecture to blockchain networks. Finally, we discuss a number of open challenges related to node attestations that has arisen due to changing model of blockchain network deployments, such as the use virtualization and containerization technologies for nodes in cloud infrastructures.
International Journal For Multidisciplinary Research, May 29, 2023
This project focuses on streamlining the software development process by integrating various tool... more This project focuses on streamlining the software development process by integrating various tools and automating key tasks. Developers contribute code changes to a Git repository hosted on GitHub. These changes trigger Jenkins, a continuous integration and delivery tool, to build the code using Maven, a build automation tool. Maven compiles the code and executes unit tests to ensure its correctness. To access code quality, security vulnerabilities, and bugs, Sonarqube, a static code analysis tool, is employed. As part of the automation process, the built code is packaged into a Docker image. This image is then automatically pushed to Dockerhub, a container registry, with a new version identifier. Additionally, a shell script is utilized to update the manifest deployment file, which specifies the version and configuration details for deployment, with the newly created version. This ensures that the deployment process is seamlessly synchronized with the latest code changes. By integrating these tools and automating the necessary steps, this project enhances the efficiency and reliability of the software development pipeline. It facilitates rapid code testing, quality analysis, and version management, thereby improving the overall development workflow.
Enabling the Use of Pet Flexible Substrates for Led Lighting Applications
This paper presents a structured study covering the assembly of mid power LED packages on thermal... more This paper presents a structured study covering the assembly of mid power LED packages on thermally conductive polyethylene terephthalate (PET/Polyester) and polyimide flexible substrates. The study evaluates the feasibility of using PET as a low cost, low temperature alternative with SnBi Alloy to traditional polyimide with SAC based alloy assemblies. Initially, an assembly method was developed for both polyimide and PET based substrates. In order to validate the use of PET as an alternative to polyimide substrates , electrical testing, voiding, and thermal cycling tests were conducted. The results of processability and long term reliability of using low temperature solders (SnBi based SBX02 alloy) on PET versus traditional SAC 305 on polyimide are presented in this paper.
A Personality Assessment Tool Using AI For Friend's Recommandation On Social Media Platform(Frien... more A Personality Assessment Tool Using AI For Friend's Recommandation On Social Media Platform(Friend Suggestion System) for Social Networks uses the lifestyle of user to suggest friends. Many social networking sites recommend friends, items, books. For e.g. Facebook suggest the friends based on social relationship those who share common friends. Proposed system uses the lifestyle of user to recommend friend instead of social graph. The lifestyle of user can be determined from the user's daily activities that he performs every day. Based on the similarity of lifestyle between the users the friend matching graph is drawn. The friend matching graph is generated in tabular form. System analyze friend matching graph to find out which users are more similar .Based on that users are recommended. System also allows user to give feedback about recommended friends.The emergence of social networking has led people to stay connected with friends, family, customers, colleagues or clients. Social networking can have social purposes, business purposes or both through sites such as Facebook, Instagram, LinkedIn, Twitter and many more. Recently, a large active social involvement have been seen from all eche-lons of society which keeps the friend circle increasing than never before.But, the friend suggestions based on one's friend list or profile may not be appropriate in some situations. Considering this problem, in this paper, a Friend Suggestion System, FA Finder (Friend Affinity Finder) based on 5 major dimensions (attributes): Agreeableness, Conscientiousness, Extraversion, Emotional range and Openness is proposed. This will help in understanding more about the commonalities that one shares with the other on the basis of their behaviour, choices, likes and dislikes etc. The suggested list of friends are extracted from the People Database (containing details of the 5 dimensions of different people) by deploying the concept of Hellinger-Bhattacharyya Distance (H-B Distance) as a measure of dissimilarity between two people.The Ocean Model is used to find friend behavior matching.For Behavior Classification Used Navie Bayes and Decision Tree.This study examines the relationship between use of social media, a popular online social network site, and the formation and maintenance of social capital.
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Today, cloud computing is the preferred option for the majority of businesses. DevOps techniques ... more Today, cloud computing is the preferred option for the majority of businesses. DevOps techniques have been developed as a result, requiring developers to collaborate closely with network engineers to ensure the quick and secure deployment of their applications. Many organizations adopt DevOps and Continuous Integration and Continuous Deployment (CI/CD) techniques to address the slow delivery of services to customers as in Traditional IT approaches, which better meets customer needs. Thanks to the high flexibility and scalability of the infrastructure in the Cloud, DevOps, which unifies developers and operations teams, can bridge the gap between them. Automation is a representation of the CI/CD central approach. This does away with the requirement for human checks, but it does not come without security risk.
Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs). VANET is on... more Vehicular Ad hoc Networks (VANET) is the subclass of Mobile Ad Hoc Networks (MANETs). VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. VANET supports communications among vehicles via Inter-Vehicle Communication (IVC) and between vehicles and fixed Road Side Unit (RSU) equipment through Roadside-to-Vehicle Communication (RVC). Efficient routing in VANETs remains challenging as due to the varying density of vehicles over time, many routing protocols for Vehicular Ad Hoc Network have been recently proposed, topology-based and geography-based. Most commonly used routing protocol for topology-based is AODV and geography-based is GPSR.This paper provides a quick review on various routing protocols including its characteristics and it's current issues.
Vehicular Ad-hoc Network (VANET) is research field of wireless networks providing different appli... more Vehicular Ad-hoc Network (VANET) is research field of wireless networks providing different applications such as traffic information for on road vehicles and related authorities. VANET are a long term solution contributing significantly towards Intelligent Transport Systems (ITS).Significant research efforts from both automotive industry andacademia have been underway to accelerate the deploymentof a wireless network based on short-range communicationsamong moving vehicles. In this paper, we propose a new 3-layer approach for count of traffic volume in a road segment based on actual no of wireless-equipped vehicles. For this propose, we first collect the traffic information for different groups of vehicles using a new clustering algorithm. Then, by using chaining technique between the clusters transmits this information to a nearest cloud. Finally, we employ a generalization method to extension of the total traffic volume from the collected data.We also highlight the unique security and privacy issues and research challenges inVANET clouds.
Uploads
Papers by rahul raut