The traffic congestion leads to high impact for emergency vehicles to pass by the particular road. The congestion can be deleted by many ways where in the video analytics-based detection and give ...more accuracy and able to count the type of vehicle in the particular traffic signals. The early detection of emergency vehicle in the particular signal can be avoid delay in transition. To overcome this problem, the proposed model that detects the emergency vehicle in the signal and pass the information to the signal regulating authorities to green corridor can be generated have on the information extracted from the video signals. The model constructed with the 5 layers with the base of resnet50 architecture. The hyperparameter are tuned to obtain the maximum accuracy and minimum loss. The parameter such as precision and recall where evaluated to compare the existing Resnet50 and modified Resnet50.
Hundred surface soil samples representing eighteen villages of the recently tsunami affected areas of Sirkali taluk of Tamilnadu in India were analyzed for the distribution of basic soil parameters ...viz., pH, EC, OC and OM and macronutrients viz., N, P, K by using standard methods. The available micronutrients (DTPA extractable) viz., Fe, Mn, Cu and Zn were investigated by using Atomic Absorption Spectrophotometer (ECIL, AAS-4129). The macro and micronutrient status and their relationship with soil properties were also studied. The result showed that the available macronutrients N, P, K was 85% low and 15% medium for N, 100% low for P and 85% medium and 15% high K respectively. Regarding the micronutrients, Fe was found to be deficient by 26% and sufficient by 74%, Mn was found to be sufficient by 100%, Cu was found to be deficient by 9% and sufficient by 91%, Zn was found to be deficient by 3% and 82% in marginal and 15% sufficient respectively. Further, Fe showed positive correlation with pH, EC, OC and OM. Mn also followed the same trend as that of Fe with OC, EC and OM but negative with pH. Cu showed positive correlation with OC and OM but negative correlation with pH and EC and Zn as well.
Adhoc mobile networks are very dynamic, self organizing, self healing distributed networks which supportdata networking without an infrastructure. The user can use the network services efficiently ...and securely while moving, by using our proposed protocol. This protocol is used to store secured backup routes from multiple routes available between source and destination, in order to provide the next possible route immediately when the link fails during the data transmission. Furthermore, it incorporates security attributes as parameters into Adhoc route discovery.
The Industrial Internet of Things (IIoT) has brought a new era of improved equipment monitoring and operational data management in manufacturing and other industrial settings. This research presents ...the use cases and benefits of IIoT sensor networks for gathering actionable insights and operational data from industrial machinery. Reliable IIoT sensor networks are built, including the design, deployment, data collecting, and cloud computing techniques. The achieved using constant, up-to-the-minute monitoring; reduced data collecting; and enhanced productivity. Data security, network stability, and scalability of the problems that develop during the deployment of IIoT sensor networks are covered in this paper. These networks might benefit from cloud computing to better manage and analyze the massive amounts of data the produce. The broader impacts of setting up IIoT sensor networks include savings in money and time and the ability to make more informed decisions based on data. It highlights the evolution of conventional industrial landscapes into linked ecosystems that may provide insightful decision-making data. The data for users to use sensor networks to monitor equipment and improve productivity. Reducing equipment downtime by 30% and increasing operational efficiency by 20% are both made potential by combining Industrial IoT sensor networks with cloud analytics. With an 80% success rate, maintenance techniques save a ton of money and make things more efficient.
Wafer bonding or wafer fusion is a method of combining two same or dissimilar materials, either atomically or by means of adhesive. In this paper we report a new process to bond thin film Indium ...Phosphide (InP) to oxidized Silicon (100) substrates at low temperatures (>250°C). The treatment of InP epitaxial structures to oxygen plasma and the Si substrate to chemical treatment aids the substrates in contact bonding at room temperature. A thermal treatment at 220°C, completes the wafer fusion, with uniform bonding occurring along the length and breadth of the sample. The InP substrate is removed, resulting in a thin film of two micron InP bonded to oxidized Si. The InP thin film was studied for its structural and optical quality by high-resolution scanning electron microscopy, micro-PL and micro-Raman. The thin-film exhibited excellent quality and was patterned and released to form cantilever structures, showing the process capability of integrating free-standing III-V thin-films on Si platform.
Phishing is deceptive attempt that targets an individual or an organization, seeking unauthorized access to confidential data or personal credentials such as credit card information, passwords etc. ...by an individual that poses as a reputable entity or person. It has become a stern threat to companies that deal with E-transactions. If these threats cannot be ceased, people cannot trust online transactions that include authentication over credentials. In the project, we have used an image-based authentication using Visual Cryptography (VC).The integrity of the secret image is maintained by dividing the secret image into two splits using VC, one is stored in server side database and other is given to the user such that the Secret Image can be recognized only when both the splits are concurrently available. The technique of both image processing and a cryptography is used in my project. Image processing is a technique to transform the secret image into digital form and carry out some operation on it, in a visual cryptography the Secret Image is splitting into splits and is kept in the server database, after login by the user, the Secret Image should get a match with its content behind the image. After both user and server side shares get matched, the user can login into the website very securely.