Volume-3 (A Conference on Wireless Communication and Android Apps "WiCAA–15")
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Adaptive Approach of Patch Size Selection Using GA in Exemplar Based Image In-painting |
Country | : | India |
Authors | : | Singh S.A. || Shinde J. V. |
Abstract: Image in-painting is the art of restoring lost and selected parts of an image based on the background information in such a way so that the change is not observed by the observer. Image In-painting is very important and emerging field of research in image processing. Image In-painting algorithm have numerous applications such as rebuilding of damaged photographs & films, heritage preservation, removal of superimposed text, removal/replacement of unwanted objects, red eye correction, image coding etc.. In this paper, we are using GA based patch selection approach for Exemplar based Image in-painting using Multiscale graph-cut. In order to improve the computational time and also the acceptable quality of the image, Genetic algorithm is proposed here. Graph cut algorithm is used to solve the problem of energy minimization. Our experiments show how well the proposed algorithm performs compared with the other recent algorithms. Keywords - Exemplar, Genetic Algorithm, graph-cut, Gradient, Image in-painting
[1] Z. Tauber, Z.-N. Li, and M. Drew, "Review and preview: Disocclusion by in-painting for image-based rendering," IEEE Trans. Syst., Man, Cybern., C, Appl. Rev., vol. 37, no. 4, pp. 527–540, Jul. 2007.
[2] M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, Anonymizing Social Networks," Technical Report 07-19,Univ. of Massachusetts Amherst, 2007S. Zinger, L. Do, and P. H. N. de With, "Free-viewpoint depth image based rendering," J. Vis. Commun. Image Rep., vol. 21, nos. 5–6, pp. 533–541, 2010.
[3] D. Liu, X. Sun, F. Wu, S. Li, and Y.-Q. Zhang, "Image compression with edge-based in-painting," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 10, pp. 1273–1287, Oct. 2007.
[4] Z. Xiong, X. Sun, and F. Wu, "Block-based image compression with parameter-assistant in-painting," IEEE Trans. Image Process., vol. 19, no. 6, pp. 1651–1657, Jun. 2010.
[5] Y.-Q. Liu, J. Wang, and H.-H. Zhang, "Adaptive patch-based in-painting for image block recovery," in Proc. Int. Conf. Comput. Vis. Theory Appl., 2010, pp. 52–59.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Advance Algorithm for Fire Detection Using Image Processing and Color Recognition |
Country | : | India |
Authors | : | Patil A.D. || Kuwar K.R. || More M.S. || Pagar P.A. || Somawanshi S.D. |
Abstract: In today's world we find it is mandatory to have a fire extinguisher in every building according to the norms of government. But when there is fire breakout there is chaos and confusion of either vacating the area or turning on the fire extinguisher and extinguishing the fire, for that proper training must be required and given to the employees or personal residing in the building in order to turn on the extinguisher. So we have overcome this problem, which would detect the fire automatically and directly turn on the extinguisher on its own.By using different image processing techniques fire can be detected effectively. In this technique, images like photographs or frames are the inputs and output may be either an image characteristics or image. By using image processing various tasks like image segmentation, smoothing, recognizing multiple and different patterns can be performed. Image processing greatly help to detect fire in a good manner also avoid dangerous situation according to the output. This paper describes different methods used for fire detection.
[1] Surya.T.S, Suchithra.M.S,Survey on Different Smoke Detection Techniques Using ImageProcessing, IJRCCT-2014.
[2] Shaik Rasool, Dr.P.Pandarinath, M.Tech, Ph.D,an Auto adaptive Edge-Detection Algorithm for Flame and Fire Image Processing, International Journal of Computer & Organization Trends –Volume 3 Issue 11 – Dec 2013, ISSN: 2249-2593.
[3] CELIK Turgay, Fast and efficient method for fire detection using image processing,ETRI journal, vol. 32, no. 6, pp. 881– 890, 2010.
[4] Liang-Hua Chen and Wei-Cheng Huang, Fire Detection Using Spatial-temporal Analysis,Vol III, WCE 2013, July 3 - 5, 2013, London, U.K.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Traffic Solution Using Adaptive Embedded System & RFID. |
Country | : | India |
Authors | : | Annadate S.A. ||Wadatkar M.S. || Jadhav S. N. || Verma S. V. |
Abstract: In urban area, problem of traffic management is becoming more and more difficult. Traffic management problem can be solved using embedded system and RFID can provide good traffic related solution under different traffic density conditions. In implanting the system, GSM has been of good helps, in providing both voice and low speed data services. Increasing traffic on Indian roads, are increasing the traffic related problems. Large population of India leads to many problems one of them is increase in traffic. Application such as traffic signal control, parking lot management, accident alert are explained in this paper
[2] Manish Buhptani, Shahram Moradpour, RFID Field Guide - Developing Radio Frequency Identification Systems, Prentice Hall, 2005, pp 7-9, 16-225, 160, 231.
[3] Shi-Cho Cha Kuan-Ju Huang Hsiang-Meng Chang, An Efficient and Flexible Way to Protect Privacy in RFID Environment with Licenses , IEEE International Conference RFID, April 16-17,2008.
[4] Raj Bridgelall, Senior Member, IEEE, Introducing a Micro-wireless Architecture for Business Activity Sensing, IEEE International Conference RFID, April 16-17,2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Key-Aggregate Cryptosystemfor Scalable Data Sharing in Cloud Storage |
Country | : | India |
Authors | : | Shinde .V. || Kurhade Vidya || Boraste Sujata || Gaikwad Prajakta || Baviskar Shweta |
Abstract: Sharing of Data is an main functionality in cloud Computing. In this system, we show how to share data in securely, flexibly, efficiently, and with others in cloud computing. We design new public-key cryptosystems which produce Fixed-size encrypted texts such that efficient delegation of decryption rights for any set of Encrypted data are possible. The innovation is that one can aggregate any set of secret keys and make them as compressed as a single key, but on all sides of the power of all the keys being aggregated. In other words, the secret key holder can release a fixed-size aggregate key for flexible choices of encrypted text set in cloud storage space, but the other ciphered files outside the set remain secret. This compress aggregate key can be conveniently sent to others or be stored in a E-mail with very limited secure storage space. We provide formal security analysis of our system in the standard model. We also describe other application of our schemes.
[1] S. G. Akl and P. D. Taylor, "Cryptographic Solution to a Problemb of Access Control in aHierarchy," ACM Transactions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239– 248, 1983
[2] G. C. Chick and S. E. Tavares, "Flexible Access Control with Master Keys,‖ inProceedings of Advances in Cryptology – CRYPTO '89, ser. LNCS, vol. 435. Springer,1989, pp. 316–322.
[3] W.-G. Tzeng, "A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy," IEEE Transactions onKnowledge and Data Engineering(TKDE), vol. 14, no. 1, pp. 182–188, 2002.
[4] G. Ateniese, A. D. Santis, A. L. Ferrara, and B. Masucci, "Provably-Secure Time-BoundHierarchical Key Assignment Schemes," J. Cryptology, vol. 25, no. 2, pp. 243–270, 2012.
[5] R. S. Sandhu, "Cryptographic Implementation of a Tree Hierarchy for Access Control," Information Processing Letters, vol. 27, no. 2, pp.95–98, 1988.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Processing Based Language Converter for Deaf and Dumb People |
Country | : | India |
Authors | : | Koli P.B. || Chaudhari Ashwini || Malkar Sonam || Pawale Kavita || Tayde Amrapali |
Abstract: This paper presents a language converter for deaf and dumb people. In the present world it is very difficult for the deaf & dumb people to talk with the ordinary people. So it becomes impossible for them to communicate with the ordinary people unless and until ordinary people like us learn the sign language for the purpose of communication. The sign language of deaf and dumb is quite difficult to learn and it is not possible for everybody to learn that language. So every person cannot come and share their thoughts with these physically impaired people. So here is a system which would enable the deaf and dumb to communicate with each and every one. In this system a webcam is placed in front of the physically impaired person. The physically impaired person would be wearing colored rings in his fingers.
[1] Ibrahim Patel1, Dr. Y. Srinivas Rao2 proposes a "Automated speech synthesizer and converter in cue symbol generation for physically impairs". International Journal of Recent Trends in Engg, Vol 2, No. 7, Nov. 2009.
[2] Anbarasi Rajamohan, Hemavathy R., Dhanalakshmi proposes a" Deaf-Mute Communication Interpreter". Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol I IMECS 2009, March 18 - 20, 2009, Hong Kong
[3] P. SubhaRajam and Dr. G. Balakrishnan "Real Time Indian Sign Language Recognition
[4] System to aid Deaf - dumb People" IEEE International Conference 2013.
[5] Soumya Dutta and Bidyut B. Chaudhuri "A Color Edge Detection Algorithm in RGB Color Space" IEEE TRANSACTIONSVOL.8, NO. 5, MAY 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review of Reversible Synchronous Sequential Circuits |
Country | : | India |
Authors | : | Sonawane P. N. || Hatkar A. P. |
Abstract: In early 70`s one computer requires one whole room and now a days we kept commuter in our pockets, how it`s happens? This happens because we did tremendous revaluation in VLSI field. We rapidly decrease size of transistors. After decades of continuous improvements and shrinking feature sizes, the development of conventional computing technologies faces massive challenges. In particular, power dissipation in today's computer chips becomes critical. Reversible computation is a best alternative to these technologies, where we want to reduced or even eliminatedpower dissipation. Reversible logic has become very capable for low power design using emerging computing technologies. A number of good works have been reported on reversible combinational circuit design. However, a small number of works reported on the design of reversible latches and flip-flops on the top of reversible combinational gates and suggested that sequential circuits be built by replacing the latches and flip-flops and associated combinational gates of the traditional irreversible designs by their reversible counter parts. This replacement technique is not very promising, because it leads to high quantum cost and garbage outputs.
Keywords–garbage input, quantum cost, reversible gate
[1] R. Landauer, ―Irreversibility and heat generation in the computation process,‖ IBM J. Res. Develop., vol. 44, pp. 183–191, Jan. 2000.
[2] V. V. Zhirnov, R. K. Cavin, J. A. Hutchby, and G. I. Bourianoff, ―Limits to binary logic switch scaling—A Gedanken model,‖ Proc. IEEE, vol. 91, no, 11, pp. 1934–1939, Nov. 2003.
[3] Bennett, ―Logical reversibility of computations‖ IBM J. Res. Develop., vol. 17, no. 6, pp. 525–532, 1973.
[4] De Benedici, ―Report on future technologies for supercomputing‖,SANDIA Laboratories, 2007.
[5] G. Schrom, ―Ultra-Low-Power CMOS Technology‖, PhD thesis, TechnischenUniversitat Wien, June 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Review on An Encryption Engines For Multi Core Processor Systems |
Country | : | India |
Authors | : | Bodake Vijay || Gawande R.M. |
Abstract: With the development of the GPGPU (General-purpose computing on graphics processing units) more and more computing problems are solved by using the parallel property of GPU (Graphics Processing Unit). CUDA (Compute Unified Device Architecture) is a framework which makes the GPGPU more accessible and easier to learn for the general population of programmers. This is because it builds on C and hides many of the complicated details of how the GPU works from a CUDA developer. Using the unique properties of the GPU through CUDA has greatly increased the efficiency of many computational problems. The target in this project is to study and analyze the majority of algorithms related to the cryptography and then to design and make an implementation of an algorithm in CUDA. Finally, this reach will compare the performance between the GPU implementation and the CPU implementation in order to look into the possibility of improving the performance of algorithms. The survey done in three cryptography algorithm AES, RSA, MD5.
Keywords: Advanced Encryption Standard, Graphics Processing Unit, Parallel Computing, CUDA, cryptography.
[1] Bin Liu, Student Member, IEEE, and Bevan M. Baas, Senior Member, IEEE, Parallel AES Encryption Engines for Many-Core Processor Arrays, ieee transactions on computers, vol.62, no. 3, march 2013
[2] NIST, Advanced Encryption Standard (AES), http://csrc.nist.gov/publications/_ps/_ps197/_ps-197.pdf, Nov. 2001.
[3] NIST, Data Encryption Standard (DES), http://csrc.nist.gov/ publications/_ps/_ps46-3/_ps46-3.pdf, Oct. 1999.
[4] NVIDIA Co., "NVIDIA CUDA Best Practices Guide Version 2.3," Santa Clara,California, 2009.
[5] NVIDIA Co., "NVIDIA CUDA Programming Guide Version 2.3.1," Santa Clara,California, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Fusion Using Absolute Maximum Fusion Rule Using Biorthogonal Wavelet Transform |
Country | : | India |
Authors | : | Kawade S.P. || Ubale V.S. |
Abstract: In this work, I am proposing method of image fusion uses the biorthogonal wavelet transform for decomposing and reconstruction of the source images. The overall fusion scheme based on biorthogonal wavelet transform .Firstly, we decompose source images of same scene using Biorthogonal wavelet transform (BWT) and then coefficients obtained are merged using absolute maximum selection fusion rule. We have used wavelet and scaling functions used in BWT for decomposition of source images. The selection of proper wavelet for decomposition varies from application to application. Although vanishing moment and regularity (smoothness) of wavelet can be considered to decide wavelet function. For image fusion application, selection of wavelet with sufficient vanishing moment is desired. Therefore, we have used biorthogonal filters to get desired number of vanishing moments. The coefficients obtained by decomposition of source images are fused using absolute maximum fusion rule.Image fusion is the technique to combine relevant information from two or more than two images of the same scene into only one composite image that is more informative and which is mostly suitable for human and machine interaction..
Keywords–Image Fusion, Biorthogonal Wavelet Transform, Fusion Rules
[1] Ashish Khare, Om Prakash and Richa Shrivastava, "BIORTHOGONAL WAVELET TRANSFORM BASED IMAGE FUSION USING ABSOLUTE MAXIMUM FUSION RULE", Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT2013), Page No: 577 -582.
[2] Prakash NK, "THE IMAGE FUSION ALGORITHM BASED ON BIORTHOGONAL WAVELET", The International Journal of The Enterprise Computing and Business Systems, ISSN (Online) : 2230 -8849, Vol 1, Issue- 2July, 2011.
[3] J.R. Raol and V.P.S. Naidu, "Pixel-level Image Fusion Using Wavelet and Principal Component Analysis", The Defence Science Journal, Vol 58, No- 3, May 2008, Page no. 338- 352.
[4] G Geetha, S.Raja Mohammad and Dr. Y.S.S.R. Murthy, "MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH THE BILATERAL GRADIENT BASED SHARPNESS CRITERION", The Computer Science and Information Technology (CS & IT), Page No. 103-115.
[5] Lindsay I Smith, "A tutorial on Principal Components Analysis", February 26, 2002, Page No. 1-27.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Resolution Improvement Using DWT & SWT Transform |
Country | : | India |
Authors | : | Thorat A.A. || Katariya S.S. |
Abstract: In this work, the proposed method is image resolution enhancement technique that generates better high resolution image. To decompose original low resolution image into different sub bands DWT technique is used. After this interpolation of three high frequency sub band images is done using bicubic interpolation. In order to correct estimated co-efficients high frequency sub bands of input image being incremented into interpolated high frequency sub bands which are obtained by SWT. Input image is also interpolated separately at the same time. An image is decomposes into different sub bands images using Discrete wavelet transform (DWT) like LL, LH HL and HH. Stationary wavelet transform (SWT) is another type of wavelet transform which is used for image processing applications but there is no use of down-sampling in SWT, so input image and sub bands are of same size.
Keywords: DWT, IDWT, Interpolation, SWT
[1] Gholamreza Anbarjafari and Hasan Demirel,"DWT BASED SATELLITE IMAGE RESOLUTION ENHANCEMENT", IEEE transactions on the geoscience and remote sensing, volume 49, Number - 6, JUNE 2011.
[2] G. Anbarjafari and H. Demirel, "SATELLITE IMAGE RESOLUTION ENHANCEMENT USING CWT" IEEE Geoscience and The Remote Sensing Letter, vol 7, no- 1, pp. 123 to 126, Jan 2010.
[3] J. P. Allbach, C. B. Atkins and C. A. Bouman, "OPTIMAL IMAGE SCALING USING THE PIXEL CLASSIFICATION," IN PROC. INTERNATIONAL CONF. IMAGE PROCESS., OCT 7–10, 2001, VOL 3, pp. 864 to 867.
[4] W. K. Carey, S. S. Hemami and D. B. Chuang, "REGULARITY- THE PRESERVING IMAGE INTERPOLATION," IEEE TRANS. IMAGE PROCESSING, VOLUME 8, Number- 9, pp. 1295 to 1297, Sep- 1999.
[5] S. Mallat, "THE WAVELET TOUR OF SIGNAL PROCESSING", second edition New York: Academic, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effect of Component Tolerance on Performance of Difference Amplifier |
Country | : | India |
Authors | : | Phatangare V.S. || Gundal S.S. |
Abstract: The Integrated circuit operational amplifier (IC Opamp) is the most widely used for all linear circuits in production today. Opamps find applications in every analog area. Despite of this wide usage, many of the basic performance characteristics of the opamps are based on the external component used along with it. Care should be taken while choosing component for circuit design. One of the parameters , CMRR is considered here to check the performance of the circuit, which depends on external components also. In this paper, performance analysis of the difference amplifier using opamp is done for two sets of resistance values. In one set exactly matched values are considered and in another set different values are considered (this difference is due to tolerance of component) .In both the cases CMRR and output is calculated and result is compared. This shows that if the values of resistances are tightly matched then CMRR is very high and output is free from error voltage and performance of circuit is improved.
Keywords - Opamp, CMRR,V CM(Common Mode Signal), VD(Differential Mode Signal) ,GD(Differential Gain),GCM(Common Mode Gain).
[1] Hwang-Cherng Chow and Jia-Yu Wang "high CMRR instrumentation amplifier for biomedical application" IEEE 2007.
[2] J. Szynowski, "CMRR analysis of instrumentation amplifiers," Electron, Lett. , Vol. 19, No.14, pp. 547-549, 1983
[3] R.Pallas-Areny, "Interference – rejection characteristics of biopotentialamplifiers : A comparison," IEEE Trans. Biomed. Eng. , Vol. BME-35. Pp. 953-959. Nov. 1988.
[4] R.L.Schoenfeld, "Common-mode rejection ratio – Two definitions," IEEE Trans. Biomed. Eng., vol. BME-17, pp.73-74, 1970. Comments on BME-18, p. 251, 1971.
[5] Sergio Franco, "Design with Operational amplifiers & analogue integrated circuits, third edition," Tata McGraw-Hill, pp.73-74, 2002.