Category: News
Microsoft Cloud Revenues Keep on Growing
The Microsoft FY24 Q4 results delivered solid growth in Microsoft Cloud revenues. No new numbers were given for Office 365 or Teams users, possibly because of a slowdown in new user acquisition. We learned that Teams Premium now has more than 3 million users and that Copilot for Microsoft 365 is being used by more customers than ever before, but without real numbers it’s hard to say just how well things are going.
https://office365itpros.com/2024/08/02/microsoft-fy24-q4-results/
The Microsoft FY24 Q4 results delivered solid growth in Microsoft Cloud revenues. No new numbers were given for Office 365 or Teams users, possibly because of a slowdown in new user acquisition. We learned that Teams Premium now has more than 3 million users and that Copilot for Microsoft 365 is being used by more customers than ever before, but without real numbers it’s hard to say just how well things are going.
https://office365itpros.com/2024/08/02/microsoft-fy24-q4-results/ Read More
error about MATLAB Runtime 7.5 download
I want to download the MATLAB Runtime (MCR) 7.5 version.
However, when I run the .exe file, I get the following warning.
"Error 1723. There is a problem with this Windows Installer package. A DLL required for this install to complete could not be run. Contact your support or package vendor"
Is there a solution to this?I want to download the MATLAB Runtime (MCR) 7.5 version.
However, when I run the .exe file, I get the following warning.
"Error 1723. There is a problem with this Windows Installer package. A DLL required for this install to complete could not be run. Contact your support or package vendor"
Is there a solution to this? I want to download the MATLAB Runtime (MCR) 7.5 version.
However, when I run the .exe file, I get the following warning.
"Error 1723. There is a problem with this Windows Installer package. A DLL required for this install to complete could not be run. Contact your support or package vendor"
Is there a solution to this? mcr MATLAB Answers — New Questions
How to use modern features (notably std::unique_ptr) in the C++ code of my S-functions while using the linaro v4.8 toolchain in embedded coder?
Background
I am using simulink with S-functions containing custom C++ code. My simulink model runs on an ARM board running Linux, using embedded coder. My C++ code uses unique pointers (std::unique_ptr). The toolchain I use is Linaro v4.8.
The error
I get the following error when building the Linux executable using the simulink ‘build’ button:
C:/my_path/cpp/src/my_class.h:13:5: error: ‘unique_ptr’ in namespace ‘std’ does not name a type
My idea
I suspect that the C++ version being compiled to is < c++11, and I would like to force the g++ compiler to compile the code using c++11. I can’t change compiler flags in the simulink menu, it is grayed out.
I found the linaro toolchain xml file and changed compiler flags there, but when I look at the compiler command generated in simulink I do not see the -std=c++11 compiler flag anywhere.
The question
How can I use modern features (notably std::unique_ptr) in the C++ code of my S-functions while using the linaro v4.8 toolchain in simulink embedded coder?Background
I am using simulink with S-functions containing custom C++ code. My simulink model runs on an ARM board running Linux, using embedded coder. My C++ code uses unique pointers (std::unique_ptr). The toolchain I use is Linaro v4.8.
The error
I get the following error when building the Linux executable using the simulink ‘build’ button:
C:/my_path/cpp/src/my_class.h:13:5: error: ‘unique_ptr’ in namespace ‘std’ does not name a type
My idea
I suspect that the C++ version being compiled to is < c++11, and I would like to force the g++ compiler to compile the code using c++11. I can’t change compiler flags in the simulink menu, it is grayed out.
I found the linaro toolchain xml file and changed compiler flags there, but when I look at the compiler command generated in simulink I do not see the -std=c++11 compiler flag anywhere.
The question
How can I use modern features (notably std::unique_ptr) in the C++ code of my S-functions while using the linaro v4.8 toolchain in simulink embedded coder? Background
I am using simulink with S-functions containing custom C++ code. My simulink model runs on an ARM board running Linux, using embedded coder. My C++ code uses unique pointers (std::unique_ptr). The toolchain I use is Linaro v4.8.
The error
I get the following error when building the Linux executable using the simulink ‘build’ button:
C:/my_path/cpp/src/my_class.h:13:5: error: ‘unique_ptr’ in namespace ‘std’ does not name a type
My idea
I suspect that the C++ version being compiled to is < c++11, and I would like to force the g++ compiler to compile the code using c++11. I can’t change compiler flags in the simulink menu, it is grayed out.
I found the linaro toolchain xml file and changed compiler flags there, but when I look at the compiler command generated in simulink I do not see the -std=c++11 compiler flag anywhere.
The question
How can I use modern features (notably std::unique_ptr) in the C++ code of my S-functions while using the linaro v4.8 toolchain in simulink embedded coder? embedded coder, s-function, simulink, linux MATLAB Answers — New Questions
copping grayscale image and remove any other borders or details
could you please help me to get only the gray scale images without any borders and without any written words or letters created by the device . i want a general code to do this beause i have other images with other border thickness and other written , and i want the gray image entire only
@Image Analyst
Image Analystcould you please help me to get only the gray scale images without any borders and without any written words or letters created by the device . i want a general code to do this beause i have other images with other border thickness and other written , and i want the gray image entire only
@Image Analyst
Image Analyst could you please help me to get only the gray scale images without any borders and without any written words or letters created by the device . i want a general code to do this beause i have other images with other border thickness and other written , and i want the gray image entire only
@Image Analyst
Image Analyst image analyst MATLAB Answers — New Questions
Turn off posted news notification to teams
Hi everyone,
When someone posts news on the SharePoint site, some users receive notifications in their Teams. How can I turn off these notifications from the SharePoint site admin side?
If this is due to Viva Connections, how can I configure it?
My goal is to prevent notifications from being sent to Teams after news is posted.
Thank you
Hi everyone, When someone posts news on the SharePoint site, some users receive notifications in their Teams. How can I turn off these notifications from the SharePoint site admin side?If this is due to Viva Connections, how can I configure it?My goal is to prevent notifications from being sent to Teams after news is posted.Thank you Read More
Trying to create Subsite
I have just signed up to 365 Basic Plan and trying to create a Sharepoint Subsite but seemingly nothing I’ve tried has worked.
I’m the only user set up so have full permission as owner and I can’t see any option under Site creation to enable subsite permissions. I’ve also tried unselecting the Create a shared library from OneDrive.
I have just signed up to 365 Basic Plan and trying to create a Sharepoint Subsite but seemingly nothing I’ve tried has worked. I’m the only user set up so have full permission as owner and I can’t see any option under Site creation to enable subsite permissions. I’ve also tried unselecting the Create a shared library from OneDrive. Read More
List Hyperlink active based on value
Hi All,
I have a hyperlink column which need to get active only when display text is “Yes”. The two other option “No” and “Not Required” when entered should not create a hyperlink. Below is the code which gives me result accurately with all formatting but don’t want hyperlink for “No” and “Not Required”. Any help appreciated.
{
“$schema”: “https://developer.microsoft.com/json-schemas/sp/v2/column-formatting.schema.json”,
“elmType”: “div”,
“children”: [
{
“elmType”: “a”,
“style”: {
“box-sizing”: “border-box”,
“padding”: “4px 8px 5px 8px”,
“overflow”: “hidden”,
“text-overflow”: “ellipsis”,
“display”: “flex”,
“border-radius”: “16px”,
“height”: “24px”,
“align-items”: “center”,
“white-space”: “nowrap”,
“margin”: “4px 4px 4px 4px”
},
“txtContent”: “@currentField.desc”,
“attributes”: {
“href”: “@currentField”,
“class”: {
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“Yes”
]
},
“sp-css-backgroundColor-BgGreen sp-css-borderColor-WhiteFont sp-field-fontSizeSmall sp-css-color-WhiteFont”,
{
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“No”
]
},
“sp-css-backgroundColor-BgRed sp-css-borderColor-WhiteFont sp-field-fontSizeSmall sp-css-color-WhiteFont”,
{
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“Not Required”
]
},
“sp-css-backgroundColor-BgGold sp-field-fontSizeSmall sp-css-color-GoldFont”,
{
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“”
]
},
“”,
“sp-field-borderAllRegular sp-field-borderAllSolid sp-css-borderColor-neutralSecondary”
]
}
]
}
]
}
]
}
}
}
]
}
Hi All, I have a hyperlink column which need to get active only when display text is “Yes”. The two other option “No” and “Not Required” when entered should not create a hyperlink. Below is the code which gives me result accurately with all formatting but don’t want hyperlink for “No” and “Not Required”. Any help appreciated. {
“$schema”: “https://developer.microsoft.com/json-schemas/sp/v2/column-formatting.schema.json”,
“elmType”: “div”,
“children”: [
{
“elmType”: “a”,
“style”: {
“box-sizing”: “border-box”,
“padding”: “4px 8px 5px 8px”,
“overflow”: “hidden”,
“text-overflow”: “ellipsis”,
“display”: “flex”,
“border-radius”: “16px”,
“height”: “24px”,
“align-items”: “center”,
“white-space”: “nowrap”,
“margin”: “4px 4px 4px 4px”
},
“txtContent”: “@currentField.desc”,
“attributes”: {
“href”: “@currentField”,
“class”: {
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“Yes”
]
},
“sp-css-backgroundColor-BgGreen sp-css-borderColor-WhiteFont sp-field-fontSizeSmall sp-css-color-WhiteFont”,
{
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“No”
]
},
“sp-css-backgroundColor-BgRed sp-css-borderColor-WhiteFont sp-field-fontSizeSmall sp-css-color-WhiteFont”,
{
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“Not Required”
]
},
“sp-css-backgroundColor-BgGold sp-field-fontSizeSmall sp-css-color-GoldFont”,
{
“operator”: “:”,
“operands”: [
{
“operator”: “==”,
“operands”: [
“@currentField.desc”,
“”
]
},
“”,
“sp-field-borderAllRegular sp-field-borderAllSolid sp-css-borderColor-neutralSecondary”
]
}
]
}
]
}
]
}
}
}
]
} Read More
M365 Copilot causing msedgewebview2.exe to crash in AVD
M365 Copilot causing msedgewebview2.exe to crash in AVD.
Fault: Unkown Hard Error in WebView 2.
I am after specifics on how to analyse this issue, as if this does happen then AVD needs to be rebooted.
– What Troubleshooting Steps are posible
M365 Copilot causing msedgewebview2.exe to crash in AVD. Fault: Unkown Hard Error in WebView 2. I am after specifics on how to analyse this issue, as if this does happen then AVD needs to be rebooted. – What Troubleshooting Steps are posible Read More
discount if I already have a Microsoft Defender for Endpoint license
Hi, I am looking to explore the Microsoft Defender for Endpoint server license vs Defender for servers plan 2 licensing.
We do have existing licenses available for Microsoft Defender for Endpoint server licenses and we would like to make use of this license in azure to avoid double payment of licenses.
Can someone help me understand how does this credit process work? i know starting point is raising a ticket with MS. Can we get the credit if we have only spare licenses? what if i have licenses being used on onboarded servers still can i request credit?
Also what is the easiest way to way to see how many Microsoft Defender for Endpoint servers license are in use right now?
Hi, I am looking to explore the Microsoft Defender for Endpoint server license vs Defender for servers plan 2 licensing.We do have existing licenses available for Microsoft Defender for Endpoint server licenses and we would like to make use of this license in azure to avoid double payment of licenses. Can someone help me understand how does this credit process work? i know starting point is raising a ticket with MS. Can we get the credit if we have only spare licenses? what if i have licenses being used on onboarded servers still can i request credit? Also what is the easiest way to way to see how many Microsoft Defender for Endpoint servers license are in use right now? Read More
Monthly news – August 2024
Microsoft Defender XDR
Monthly news
August 2024 Edition
This is our monthly “What’s new” blog post, summarizing product updates and various new assets we released over the past month across our Defender products. In this edition, we are looking at all the goodness from July 2024. Defender for Cloud has it’s own Monthly News post, have a look at their blog space.
Legend:
Product videos
Webcast (recordings)
Docs on Microsoft
Blogs on Microsoft
GitHub
External
Improvements
Previews / Announcements
Unified Security Operations Platform: Microsoft Defender XDR & Microsoft Sentinel
(GA) The Microsoft unified security operations platform in the Microsoft Defender portal is generally available. This release brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Copilot in Microsoft Defender. For more information, see the following resources:
Blog post: General availability of the Microsoft unified security operations platform
Ninja Show episode: Unified Security Operations Platform GA launch
Documentation: Microsoft Sentinel in the Microsoft Defender portal
Documentation: Connect Microsoft Sentinel to Microsoft Defender XDR
Documentation: Microsoft Copilot in Microsoft Defender
(Preview) You can now customize columns in the Incidents and Alerts queues in the Microsoft Defender portal. You can add, remove, reorder columns to display the information you need. For more information, see how to customize columns in the incident queue and alert queue.
(GA) Filtering Defender for Cloud alerts by the associated alert subscription ID in the Incidents and Alerts queues is now generally available. For more information, see Defender for Cloud in Defender XDR.
Incidents with alerts where a compromised device communicated with an operational technology (OT) device are now visible in the Microsoft Defender portal through the Defender for IoT license and Defender for Endpoint’s device discovery capabilities. Using Defender for Endpoint data, Defender XDR automatically correlates these new OT alerts to incidents to provide a comprehensive attack story. To filter related incidents, see Prioritize incidents in the Microsoft Defender portal.
Blog: Make OT security a core part of your SOC strategy with Microsoft Defender XDR
(Preview) Critical assets are now part of the tags in the incident and alert queues. When a critical asset is involved in an incident or alert, the critical asset tag is displayed in the queues. For more information, see incident tags and the alert queue.
(Preview) Incidents are now arranged according to the latest automatic or manual updates made to an incident. Read about the last update time column in the incident queue.
Learning hub resources have moved from the Microsoft Defender portal to learn.microsoft.com. Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the list of learning paths, and filter by product, role, level, and subject.
(GA) The UrlClickEvents table in advanced hunting is now generally available. Use this table to get information about Safe Links clicks from email messages, Microsoft Teams, and Office 365 apps in supported desktop, mobile, and web apps.
(GA) You can now release or move email messages from quarantine back to the user’s inbox directly from Take actions in advanced hunting and in custom detections. This allows security operators to manage false positives more efficiently and without losing context.
Microsoft Security Exposure Management
Microsoft Security Exposure Management is a security solution that provides a unified view of security posture across company assets and workloads. Security Exposure Management enriches asset information with security context that helps you to proactively manage attack surfaces, protect critical assets, and explore and mitigate exposure risk. Security Exposure Management is currently in public preview. Check out our documentation to learn more.
Microsoft Defender for IoT
Incidents with alerts where a compromised device communicated with an operational technology (OT) device are now visible in the Microsoft Defender portal through the Defender for IoT license and Defender for Endpoint’s device discovery capabilities. Using Defender for Endpoint data, Defender XDR automatically correlates these new OT alerts to incidents to provide a comprehensive attack story. To filter related incidents, see Prioritize incidents in the Microsoft Defender portal.
Blog: Make OT security a core part of your SOC strategy with Microsoft Defender XDR
Microsoft Defender for Endpoint
Reduce friction and protect faster with simplified Android onboarding. We’re excited to announce that a simplified onboarding experience in Defender for Endpoint on Android devices is now available in public preview. Read more here.
Microsoft Defender for Cloud Apps
(Preview) In-browser protection for macOS users and newly supported policies.
Edge browser users from macOS, scoped to session policies, are now protected with in-browser protection.
Learn more in our documentation.
(Preview) Configure and embed a custom support URL in Block pages.
Customize the Defender for Cloud Apps block experience for apps that are blocked using Cloud Discovery. Learn more in our documentation.
(GA) Filtering Defender for Cloud alerts by the associated alert subscription ID in the Incidents and Alerts queues is now generally available. For more information, see Defender for Cloud in Defender XDR.
Microsoft Defender for Office 365
Bulk Senders Insight: Optimizing Bulk Email Management for Enterprises. We’re excited to introduce Bulk Senders Insight – a sophisticated simulation tool designed to empower admins in fine-tuning bulk email policies. This tool offers real-time simulations that help identify the optimal BCL and identify potential FPs and FNs based on user preferences across your tenant. This feature will be rolling out to your tenants from August. Watch for a Message Center post about this.
Announcing quarantine release integration in Defender for Office 365 hunting experience!! This enhancement allows Security Operators to address false positives more efficiently and with greater flexibility.
Announcing Defender for Office 365 API’s for retrieving threat data and remediating emails. These new Defender for Office 365 API’s enable security teams to leverage threat information and response capabilities of Defender for Office 365 inside automation and security orchestration tools of their choice.
(GA) The UrlClickEvents table in advanced hunting is now generally available. Use this table to get information about Safe Links clicks from email messages, Microsoft Teams, and Office 365 apps in supported desktop, mobile, and web apps.
(GA) You can now release or move email messages from quarantine back to the user’s inbox directly from Take actions in advanced hunting and in custom detections. This allows security operators to manage false positives more efficiently and without losing context.
Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD and and Office 365 operated by 21Vianet environments: The Tenant Allow/Block List is now available in these environments. They are on parity with the WW commercial experiences. Learn more in our documentation.
45 days after last used date: The value Remove allow entry after > 45 days after last used date is now the default on new allow entries from submissions and existing allow entries in the Tenant Allow/Block List. Learn more in our documentation.
Microsoft Defender Vulnerability Management
Guidance for handling “regreSSHion” (CVE-2024-6387) using Microsoft Security capabilities.
Using Export API with Defender Vulnerability Management. Defender Vulnerability Management provides an export API that allows programmatic access to vulnerability data. The API can be used to automate vulnerability management tasks, integrate vulnerability data with other security tools, and generate custom reports and dashboards. In this blog, we share guidance and best practices for using Defender Vulnerability Management Export API.
Microsoft Security Blogs
Mitigating Skeleton Key, a new type of generative AI jailbreak technique
Microsoft recently discovered a new type of generative AI jailbreak method called Skeleton Key that could impact the implementations of some large and small language models. This new method has the potential to subvert either the built-in model safety or platform safety systems and produce any content.
Onyx Sleet uses array of malware to gather intelligence for North Korea
On July 25, 2024, the United States Department of Justice (DOJ) indicted an individual linked to the North Korean threat actor that Microsoft tracks as Onyx Sleet. Microsoft Threat Intelligence collaborated with the Federal Bureau of Investigation (FBI) in tracking activity associated with Onyx Sleet. We will continue to closely monitor Onyx Sleet’s activity to assess changes following the indictment.
Vulnerabilities in PanelView Plus devices could lead to remote code execution
Microsoft discovered and responsibly disclosed two vulnerabilities in Rockwell’s PanelView Plus that could be remotely exploited by unauthenticated attackers, allowing them to perform remote code execution (RCE) and denial-of-service (DoS). PanelView Plus devices are graphic terminals, which are known as human machine interface (HMI) and are used in the industrial space.
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
Microsoft Security researchers have observed a vulnerability used by various ransomware operators to get full administrative access to domain-joined ESXi hypervisors and encrypt the virtual machines running on them. The vulnerability involves creating a group called “ESX Admins” in Active Directory and adding an attacker-controlled user account to this group.
Microsoft Tech Community – Latest Blogs –Read More
Design a feedback controller to control pH value of a non linear system
Hi all!.
I am working on a question where we calculate an optimal dosage using multiple sensor inputs. Then we send the calculated dosage to the plant and we monitor the pH value. Right now we have an open loop system. I want to maintain the output pH value in a range of 5.2 to 5.8 by introducing a feedback and a PID controller.
I have previous data about the dosage we calculated and the resulted pH values.Hi all!.
I am working on a question where we calculate an optimal dosage using multiple sensor inputs. Then we send the calculated dosage to the plant and we monitor the pH value. Right now we have an open loop system. I want to maintain the output pH value in a range of 5.2 to 5.8 by introducing a feedback and a PID controller.
I have previous data about the dosage we calculated and the resulted pH values. Hi all!.
I am working on a question where we calculate an optimal dosage using multiple sensor inputs. Then we send the calculated dosage to the plant and we monitor the pH value. Right now we have an open loop system. I want to maintain the output pH value in a range of 5.2 to 5.8 by introducing a feedback and a PID controller.
I have previous data about the dosage we calculated and the resulted pH values. pid, ph, feedback control MATLAB Answers — New Questions
Global Administrator Issue
Please be advised that the verification process for your IWE request could not be completed.
The service request will be closed since Microsoft is not able to intervene in any internal dispute.
Thank you for contacting the Microsoft 365 Data Protection Team.
Is there any other Solution for this because the global admin not sharing passwords with the company and asking for extra money
***Need help in this matter***
Please be advised that the verification process for your IWE request could not be completed. The service request will be closed since Microsoft is not able to intervene in any internal dispute. Thank you for contacting the Microsoft 365 Data Protection Team. Is there any other Solution for this because the global admin not sharing passwords with the company and asking for extra money ***Need help in this matter*** Read More
VLookup formula into IF sum
Hi,
I am trying to make a formula for the below:
If text in column D is “No”, calculate in column F =IF(E19>TODAY(),”Overdue”,””)
Does anyone know how to integrate a Vlookup into the IF sum?
Thanks.
Hi, I am trying to make a formula for the below: If text in column D is “No”, calculate in column F =IF(E19>TODAY(),”Overdue”,””) Does anyone know how to integrate a Vlookup into the IF sum? Thanks. Read More
Blocking USB slots in Intune
Dear Reader,
because of security reasons, I want to block all the USB slots of our clients.
On different websides I was told to go to Intunes – Devices – Windows – Configuration and create a new “GPO” policy by choosing an administrative template called “prevent installation of devices not described….” and include the user group. In a second step I need to exclude all the hardware I do not want to be blocked, like keyboard, mouse….
But after all that doesn´t seem to work.
After waiting a few hours, in hope the test client would drag the “GPO”, I could still use my own USB Stick. (Btw: is there a way to synchronise instead of waiting? Like the old gpupdate /force in cmd? and without the “synchronise” in the company portal?)
After that fail, I did the same in Endpoint security and that works fine. All the USB slots are locked.
So was it just a wrong infromation to do it with a configuration profile?
Where is the difference between configuration profile and endpoint security?
In a next step I want to lock down USB in booting the PC as well. Is that possible?
Thanks a lot for any hint.
Have a nice day.
Hilmar
Dear Reader, because of security reasons, I want to block all the USB slots of our clients.On different websides I was told to go to Intunes – Devices – Windows – Configuration and create a new “GPO” policy by choosing an administrative template called “prevent installation of devices not described….” and include the user group. In a second step I need to exclude all the hardware I do not want to be blocked, like keyboard, mouse…. But after all that doesn´t seem to work.After waiting a few hours, in hope the test client would drag the “GPO”, I could still use my own USB Stick. (Btw: is there a way to synchronise instead of waiting? Like the old gpupdate /force in cmd? and without the “synchronise” in the company portal?) After that fail, I did the same in Endpoint security and that works fine. All the USB slots are locked. So was it just a wrong infromation to do it with a configuration profile? Where is the difference between configuration profile and endpoint security? In a next step I want to lock down USB in booting the PC as well. Is that possible? Thanks a lot for any hint. Have a nice day. Hilmar Read More
wt is the Activation Key for activating MATLAB Simulink
Activation KeyActivation Key Activation Key provide activation key for matlab MATLAB Answers — New Questions
vgg16 not installed as Deep learning toolbox has missing this package
Error using vgg16 (line 60)
vgg16 requires the Deep Learning Toolbox Model for VGG-16 Network support package. To install this support package, use the Add-On Explorer.
How can we run the program without package installed? Is there any solution?Error using vgg16 (line 60)
vgg16 requires the Deep Learning Toolbox Model for VGG-16 Network support package. To install this support package, use the Add-On Explorer.
How can we run the program without package installed? Is there any solution? Error using vgg16 (line 60)
vgg16 requires the Deep Learning Toolbox Model for VGG-16 Network support package. To install this support package, use the Add-On Explorer.
How can we run the program without package installed? Is there any solution? neural network model, vgg16 MATLAB Answers — New Questions
Using FFT Coefficients/Descriptors to reconstruct particle shape
Hi, I am trying to use Fourier descriptors to reconstruct the shape of a particle. I have written most of the code (with a lot of help) and only the last step which involves using Fourier descriptors to reconstruct the shape of the original image remains.
I need help to know which functions to use to achieve this. I would really appreciate if anyone could help.
Here is the code:
I have also attached the original image and another file which demonstrates what I need to do.
scale_factor = 100/90; % (units: microns/pixel)
% to convert pixels to microns,
% multiply # of pixels by scale_factor
%1. Open and show image of particle
img = imread(‘1_50.JPG’); %Read image
subplot (3,3,1)
imshow(img) %show image
%2. Binarize and show image
BW = im2bw(img,0.45); %binarize image with a threshold value of 0.45
img1= bwareaopen (BW, 1000); %Remove small objects
img2= imfill(img1, ‘holes’); %fill holes
subplot(3,3,2)
imshow(img2) %show binarized image
%3. Setting up the axes
% for plotting into multiple axes in one loop, it’s convenient to set up
% all the axes first, before anything is plotted into them
% 3.1. set up the 2nd axes:
ax3 = subplot(3,3,3);
hold on
box on %draws a box that encompasses the entire axes area
axis image %sets the aspect ratio of the axes (ax2) to be equal and
%adjusts the limits of the axes so that the data units are
%of equal size along both the x-axis and y-axis.
set(ax3,’YDir’,’reverse’) %reverses the y-axis to begin from the top
%since the origin of the image is at the top left-corner
% 3.2. set up the 3rd axes:
ax4 = subplot(3,3,4);
hold on
%4. Compute centroid of binarized image
centriod_value= regionprops(img2, ‘Centroid’); %Finds centroid of image
centroid = cat(1,centriod_value.Centroid); %Stores centroid coordinates in a two-column matrix
%5. Tracing the boundary of image
p_boundary= bwboundaries(img2); % trace the exterior boundaries of particle
%(in row, column order, not x,y)
number_of_boundaries = size(p_boundary,1); %specify only one boundary
centroid = centroid*scale_factor;
% 6. Setting up equally spaced angles before initing the loop
%use 129 points to have an angle spacing of 360/128
N_angles = 129;
interp_angles = linspace(0,360,N_angles).’;
%7. Initiate for loop to plot boundary, centroid, & a graph of radius vs angle
for k = 1 : number_of_boundaries % initiate loop to go round the selected boundary
thisBoundary = p_boundary{k}*scale_factor;
y = thisBoundary(:,1); % rows
x = thisBoundary(:,2); % columns
plot(ax3, x, y, ‘g’, ‘LineWidth’, 2);
plot(ax3, centroid(:,1),centroid(:,2),’b.’)
% 7.1. Calculate the angles in degrees
deltaY = thisBoundary(:,1) – centroid(k,2); % boundary(:,1) is y, but centroid(k,2) is y
deltaX = thisBoundary(:,2) – centroid(k,1); % boundary(:,2) is x, but centroid(k,1) is x
% angles = atand(deltaY ./ deltaX); % atand gives angles in range [-90,90]
angles = atan2d(deltaY,deltaX); % use atan2d to get angles in range [-180,180]
% 7.2. Calculate the radii
radius = sqrt(deltaY.^2 + deltaX.^2); % use deltaX and deltaY, which were just calculated
% 7.3. Add 360 degrees to negative angles so that range is [0,360] instead of [-180,180]
idx = angles < 0; %idx reps angles less than 0 degreees
angles(idx) = angles(idx)+360; %360 degrees is added to idx angles
%7.4. Sort angles in ascending order
% sort the angles, so the first one is smallest (closest to zero)
% and the last one is largest (closest to 360)
% this is useful for getting a smooth line that goes from 0 to 360 in the plot
% I returns the corresponding indices of the angles
[angles,I] = sort(angles);
%7.5. Reorder distances the same way angles was reordered using I
radius = radius(I);
%7.6. Use only unique angles in case an angle is repeated
% in case any angles are repeated, use only the unique set and
% corresponding distances in interp1 (in this data, one angle is
% repeated twice, with the same distance each time)
%The ~ (tilde) here is a placeholder indicating that we’re not interested
%in capturing the actual unique elements, only their indices
[~,I] = unique(angles);
% 7.7. perform linear interpolation/extrapolation:
%angles(I)= sample points, radius(I)= correspoinding points
%and interp_angles = coordinates of the querry points (QP)
%In general, the functions returns interpolated values at specific QP
interp_distances = interp1(angles(I),radius(I),interp_angles,’linear’,’extrap’);
% 7.8 Plot distance vs. angle.
plot(ax4,interp_angles,interp_distances)
end
%8. Apply fft algorithm to values of radius
L = length(interp_distances); %Define the number of the radiuses (points)
f = 0:L-1; %Define the sampling frequencies
A = fft(interp_distances); %Transforming the radius function into frequency domain using FFT
B = (abs(A)/2535.2); % Normalize the amplitude of fourier descriptors using the first descriptors
%9. Plot fft descriptor vs. frequency
subplot(3,3,5)
bar(f,B,3) %plot the frequencies vs. the nornalised descriptors
xlim([0 128])
%10. Plot phase angle vs. frequency
subplot(3,3,6)
bar(f, angle(A),3) % plot the frequencies vs phase angles
xlim([0 128])
ylim([-4 4])
%11. Create a table of values
table1 = table(A, f’, abs(A), B, angle(A));
table1.Properties.VariableNames = {‘FFT_coeffs’, ‘Frequency’, ‘Amplitude’, ‘Norm_Amplitude’ ‘Phase’};
disp(table1);
%12. Reconstruct particle boundary using FFT descriptors ?????Hi, I am trying to use Fourier descriptors to reconstruct the shape of a particle. I have written most of the code (with a lot of help) and only the last step which involves using Fourier descriptors to reconstruct the shape of the original image remains.
I need help to know which functions to use to achieve this. I would really appreciate if anyone could help.
Here is the code:
I have also attached the original image and another file which demonstrates what I need to do.
scale_factor = 100/90; % (units: microns/pixel)
% to convert pixels to microns,
% multiply # of pixels by scale_factor
%1. Open and show image of particle
img = imread(‘1_50.JPG’); %Read image
subplot (3,3,1)
imshow(img) %show image
%2. Binarize and show image
BW = im2bw(img,0.45); %binarize image with a threshold value of 0.45
img1= bwareaopen (BW, 1000); %Remove small objects
img2= imfill(img1, ‘holes’); %fill holes
subplot(3,3,2)
imshow(img2) %show binarized image
%3. Setting up the axes
% for plotting into multiple axes in one loop, it’s convenient to set up
% all the axes first, before anything is plotted into them
% 3.1. set up the 2nd axes:
ax3 = subplot(3,3,3);
hold on
box on %draws a box that encompasses the entire axes area
axis image %sets the aspect ratio of the axes (ax2) to be equal and
%adjusts the limits of the axes so that the data units are
%of equal size along both the x-axis and y-axis.
set(ax3,’YDir’,’reverse’) %reverses the y-axis to begin from the top
%since the origin of the image is at the top left-corner
% 3.2. set up the 3rd axes:
ax4 = subplot(3,3,4);
hold on
%4. Compute centroid of binarized image
centriod_value= regionprops(img2, ‘Centroid’); %Finds centroid of image
centroid = cat(1,centriod_value.Centroid); %Stores centroid coordinates in a two-column matrix
%5. Tracing the boundary of image
p_boundary= bwboundaries(img2); % trace the exterior boundaries of particle
%(in row, column order, not x,y)
number_of_boundaries = size(p_boundary,1); %specify only one boundary
centroid = centroid*scale_factor;
% 6. Setting up equally spaced angles before initing the loop
%use 129 points to have an angle spacing of 360/128
N_angles = 129;
interp_angles = linspace(0,360,N_angles).’;
%7. Initiate for loop to plot boundary, centroid, & a graph of radius vs angle
for k = 1 : number_of_boundaries % initiate loop to go round the selected boundary
thisBoundary = p_boundary{k}*scale_factor;
y = thisBoundary(:,1); % rows
x = thisBoundary(:,2); % columns
plot(ax3, x, y, ‘g’, ‘LineWidth’, 2);
plot(ax3, centroid(:,1),centroid(:,2),’b.’)
% 7.1. Calculate the angles in degrees
deltaY = thisBoundary(:,1) – centroid(k,2); % boundary(:,1) is y, but centroid(k,2) is y
deltaX = thisBoundary(:,2) – centroid(k,1); % boundary(:,2) is x, but centroid(k,1) is x
% angles = atand(deltaY ./ deltaX); % atand gives angles in range [-90,90]
angles = atan2d(deltaY,deltaX); % use atan2d to get angles in range [-180,180]
% 7.2. Calculate the radii
radius = sqrt(deltaY.^2 + deltaX.^2); % use deltaX and deltaY, which were just calculated
% 7.3. Add 360 degrees to negative angles so that range is [0,360] instead of [-180,180]
idx = angles < 0; %idx reps angles less than 0 degreees
angles(idx) = angles(idx)+360; %360 degrees is added to idx angles
%7.4. Sort angles in ascending order
% sort the angles, so the first one is smallest (closest to zero)
% and the last one is largest (closest to 360)
% this is useful for getting a smooth line that goes from 0 to 360 in the plot
% I returns the corresponding indices of the angles
[angles,I] = sort(angles);
%7.5. Reorder distances the same way angles was reordered using I
radius = radius(I);
%7.6. Use only unique angles in case an angle is repeated
% in case any angles are repeated, use only the unique set and
% corresponding distances in interp1 (in this data, one angle is
% repeated twice, with the same distance each time)
%The ~ (tilde) here is a placeholder indicating that we’re not interested
%in capturing the actual unique elements, only their indices
[~,I] = unique(angles);
% 7.7. perform linear interpolation/extrapolation:
%angles(I)= sample points, radius(I)= correspoinding points
%and interp_angles = coordinates of the querry points (QP)
%In general, the functions returns interpolated values at specific QP
interp_distances = interp1(angles(I),radius(I),interp_angles,’linear’,’extrap’);
% 7.8 Plot distance vs. angle.
plot(ax4,interp_angles,interp_distances)
end
%8. Apply fft algorithm to values of radius
L = length(interp_distances); %Define the number of the radiuses (points)
f = 0:L-1; %Define the sampling frequencies
A = fft(interp_distances); %Transforming the radius function into frequency domain using FFT
B = (abs(A)/2535.2); % Normalize the amplitude of fourier descriptors using the first descriptors
%9. Plot fft descriptor vs. frequency
subplot(3,3,5)
bar(f,B,3) %plot the frequencies vs. the nornalised descriptors
xlim([0 128])
%10. Plot phase angle vs. frequency
subplot(3,3,6)
bar(f, angle(A),3) % plot the frequencies vs phase angles
xlim([0 128])
ylim([-4 4])
%11. Create a table of values
table1 = table(A, f’, abs(A), B, angle(A));
table1.Properties.VariableNames = {‘FFT_coeffs’, ‘Frequency’, ‘Amplitude’, ‘Norm_Amplitude’ ‘Phase’};
disp(table1);
%12. Reconstruct particle boundary using FFT descriptors ????? Hi, I am trying to use Fourier descriptors to reconstruct the shape of a particle. I have written most of the code (with a lot of help) and only the last step which involves using Fourier descriptors to reconstruct the shape of the original image remains.
I need help to know which functions to use to achieve this. I would really appreciate if anyone could help.
Here is the code:
I have also attached the original image and another file which demonstrates what I need to do.
scale_factor = 100/90; % (units: microns/pixel)
% to convert pixels to microns,
% multiply # of pixels by scale_factor
%1. Open and show image of particle
img = imread(‘1_50.JPG’); %Read image
subplot (3,3,1)
imshow(img) %show image
%2. Binarize and show image
BW = im2bw(img,0.45); %binarize image with a threshold value of 0.45
img1= bwareaopen (BW, 1000); %Remove small objects
img2= imfill(img1, ‘holes’); %fill holes
subplot(3,3,2)
imshow(img2) %show binarized image
%3. Setting up the axes
% for plotting into multiple axes in one loop, it’s convenient to set up
% all the axes first, before anything is plotted into them
% 3.1. set up the 2nd axes:
ax3 = subplot(3,3,3);
hold on
box on %draws a box that encompasses the entire axes area
axis image %sets the aspect ratio of the axes (ax2) to be equal and
%adjusts the limits of the axes so that the data units are
%of equal size along both the x-axis and y-axis.
set(ax3,’YDir’,’reverse’) %reverses the y-axis to begin from the top
%since the origin of the image is at the top left-corner
% 3.2. set up the 3rd axes:
ax4 = subplot(3,3,4);
hold on
%4. Compute centroid of binarized image
centriod_value= regionprops(img2, ‘Centroid’); %Finds centroid of image
centroid = cat(1,centriod_value.Centroid); %Stores centroid coordinates in a two-column matrix
%5. Tracing the boundary of image
p_boundary= bwboundaries(img2); % trace the exterior boundaries of particle
%(in row, column order, not x,y)
number_of_boundaries = size(p_boundary,1); %specify only one boundary
centroid = centroid*scale_factor;
% 6. Setting up equally spaced angles before initing the loop
%use 129 points to have an angle spacing of 360/128
N_angles = 129;
interp_angles = linspace(0,360,N_angles).’;
%7. Initiate for loop to plot boundary, centroid, & a graph of radius vs angle
for k = 1 : number_of_boundaries % initiate loop to go round the selected boundary
thisBoundary = p_boundary{k}*scale_factor;
y = thisBoundary(:,1); % rows
x = thisBoundary(:,2); % columns
plot(ax3, x, y, ‘g’, ‘LineWidth’, 2);
plot(ax3, centroid(:,1),centroid(:,2),’b.’)
% 7.1. Calculate the angles in degrees
deltaY = thisBoundary(:,1) – centroid(k,2); % boundary(:,1) is y, but centroid(k,2) is y
deltaX = thisBoundary(:,2) – centroid(k,1); % boundary(:,2) is x, but centroid(k,1) is x
% angles = atand(deltaY ./ deltaX); % atand gives angles in range [-90,90]
angles = atan2d(deltaY,deltaX); % use atan2d to get angles in range [-180,180]
% 7.2. Calculate the radii
radius = sqrt(deltaY.^2 + deltaX.^2); % use deltaX and deltaY, which were just calculated
% 7.3. Add 360 degrees to negative angles so that range is [0,360] instead of [-180,180]
idx = angles < 0; %idx reps angles less than 0 degreees
angles(idx) = angles(idx)+360; %360 degrees is added to idx angles
%7.4. Sort angles in ascending order
% sort the angles, so the first one is smallest (closest to zero)
% and the last one is largest (closest to 360)
% this is useful for getting a smooth line that goes from 0 to 360 in the plot
% I returns the corresponding indices of the angles
[angles,I] = sort(angles);
%7.5. Reorder distances the same way angles was reordered using I
radius = radius(I);
%7.6. Use only unique angles in case an angle is repeated
% in case any angles are repeated, use only the unique set and
% corresponding distances in interp1 (in this data, one angle is
% repeated twice, with the same distance each time)
%The ~ (tilde) here is a placeholder indicating that we’re not interested
%in capturing the actual unique elements, only their indices
[~,I] = unique(angles);
% 7.7. perform linear interpolation/extrapolation:
%angles(I)= sample points, radius(I)= correspoinding points
%and interp_angles = coordinates of the querry points (QP)
%In general, the functions returns interpolated values at specific QP
interp_distances = interp1(angles(I),radius(I),interp_angles,’linear’,’extrap’);
% 7.8 Plot distance vs. angle.
plot(ax4,interp_angles,interp_distances)
end
%8. Apply fft algorithm to values of radius
L = length(interp_distances); %Define the number of the radiuses (points)
f = 0:L-1; %Define the sampling frequencies
A = fft(interp_distances); %Transforming the radius function into frequency domain using FFT
B = (abs(A)/2535.2); % Normalize the amplitude of fourier descriptors using the first descriptors
%9. Plot fft descriptor vs. frequency
subplot(3,3,5)
bar(f,B,3) %plot the frequencies vs. the nornalised descriptors
xlim([0 128])
%10. Plot phase angle vs. frequency
subplot(3,3,6)
bar(f, angle(A),3) % plot the frequencies vs phase angles
xlim([0 128])
ylim([-4 4])
%11. Create a table of values
table1 = table(A, f’, abs(A), B, angle(A));
table1.Properties.VariableNames = {‘FFT_coeffs’, ‘Frequency’, ‘Amplitude’, ‘Norm_Amplitude’ ‘Phase’};
disp(table1);
%12. Reconstruct particle boundary using FFT descriptors ????? fft, shape reconstruction, fourier descriptor MATLAB Answers — New Questions
How to treat 200 rows of data as an event when constructing a Timetable, as a piece of data, the size is 200*1
There is a table, if the sampling rate is set to 200 when constructing the Timetable,TT = timetable(var,’SampleRate’,200) ,then the time of each row of the Timetable is 0.005s, 0.01s etc, but what I want is that the time of each row is 1s, 2s, 3s, and the corresponding var data shape of each row is 200*1, what should I do?There is a table, if the sampling rate is set to 200 when constructing the Timetable,TT = timetable(var,’SampleRate’,200) ,then the time of each row of the Timetable is 0.005s, 0.01s etc, but what I want is that the time of each row is 1s, 2s, 3s, and the corresponding var data shape of each row is 200*1, what should I do? There is a table, if the sampling rate is set to 200 when constructing the Timetable,TT = timetable(var,’SampleRate’,200) ,then the time of each row of the Timetable is 0.005s, 0.01s etc, but what I want is that the time of each row is 1s, 2s, 3s, and the corresponding var data shape of each row is 200*1, what should I do? timetable MATLAB Answers — New Questions
My question is what is the value i am getting as the output of my code.
syms x
eqn = 0.5959 + 0.0321*(x^2.1)-0.184*(x^8)+0.0143*(x^2.5)-0.2359*(sqrt((1-x^4)/x^4));
solve(eqn == 0,x)
the results are given assyms x
eqn = 0.5959 + 0.0321*(x^2.1)-0.184*(x^8)+0.0143*(x^2.5)-0.2359*(sqrt((1-x^4)/x^4));
solve(eqn == 0,x)
the results are given as syms x
eqn = 0.5959 + 0.0321*(x^2.1)-0.184*(x^8)+0.0143*(x^2.5)-0.2359*(sqrt((1-x^4)/x^4));
solve(eqn == 0,x)
the results are given as linear equation MATLAB Answers — New Questions