SlideShare a Scribd company logo
1 of 8
Download to read offline
Journal for Research | Volume 03| Issue 07 | September 2017
ISSN: 2395-7549
All rights reserved by www.journal4research.org 9
An Improved Blood Splatters Analysis
Technique
Utkarsha Chirmade Ms. Namrata Sharma
Sushila Devi Bansal College of Engineering, Indore, India Sushila Devi Bansal College of Engineering, Indore, India
Prof. B.S Patil
Govt .College of Engineering, Karad, India
Abstract
In different complicated crime investigation and solving the cases the forensic science is a key contributor. That involves the
biology, chemistry, mathematics and physics for investigating the facts about the crime. Forensic science includes on more
technique for crime scene analysis is known as bloodstain analysis. The bloodstain analysis enable the investigators to understand
the crime scene, discover the kind of weapon used, speed of weapon, flight time of blood drops and the angle of weapon or impact.
In this work the aim is to investigate about the blood strain analysis technique and to design a new technique for recovering the
flight time, angle of impact and velocity of weapon. In this context first the crime scene image data is accepted as initial input.
Additionally for finding the accurate analysis some additional inputs are also included such as high of impact, distance of blood
drops and the line passing through the ellipse formed in the input image. Finally the velocity and flight time of blood drops are
calculated using the law of motion and the trajectory analysis. The implementation of the proposed technique is provided using
JAVA technology. Additionally the performance is computed in terms of time and space complexity of the implemented system.
The performance of the proposed system demonstrates the proposed technique is effective and low resource consuming technique.
Keywords: Forensic, Bloodstain Analysis, Trajectory Analysis, Flight Time, Velocity and Angle
_______________________________________________________________________________________________________
I. INTRODUCTION
The domain of computation and their applications are expanding day by day. Among various application domains of computations
now in these days in forensic science it also becomes popular. Basically the forensic science is a domain or subject of investigation
of criminal activities. That is responsible for preservation, investigation and collection of criminal facts that helps to explore the
crime. In this proposed work the domain of forensic science is key area of study and fact collection. In addition of that the effort
is made in order to provide enhance and efficient approach for finding the blood splatter trajectory.
The analysis of blood splatter trajectory is also termed as Bloodstain pattern analysis. That is aimed to helping investigators
draw conclusions about the nature, timing and other details of the crime. Bloodstain pattern analysis draws on the scientific
disciplines of biology, chemistry, mathematics and physics. In this presented work the investigation is limited on the physical
characteristics of crime scene analysis. A single spatter of blood is not enough to determine the Area of Origin at a crime scene.
But in this presented work for demonstrating the proposed working model the work is focused on the single drop based technique.
Therefore the image processing technique (i.e. edge detection) is included initially for finding the curve and the angle of impact.
Additionally for analyzing the velocity and the flight time estimation the low of motion and trajectory is analyzed.
II. PROPOSED WORK
This chapter demonstrates the proposed methodology of blood splatter analysis. In this context the method formulation for
analyzing the blood spot in order to recovering the speed and angle of weapon operation is investigated. This chapter includes the
basic theory and the detailed methodology description for accomplishing the required goal.
System Overview
Forensics is a domain of engineering and science which is used for analysis of any crime scene. Here the different concept of
engineering, chemistry, physics and others are included for finding the different facts that can help for discovering the actions and
reason of crime. Now in these days the forensics is also performed using the image processing concepts. By using the image
processing concepts the crime scene is investigated and different facts about the particular crime is investigated. In this presented
work the main aim is to use the image processing concepts for analyzing the blood splatter. The blood splatters of any crime scene
used to find the type of weapon used, the angle on which the weapon is operated and the speed of weapon. Among these facts the
angle and the speed of weapon is calculated in this work. Thus a new method for computing these facts is introduced in this work.
The proposed technique is based on the blood trajectory analysis. Thus the low of motion and the concept of projectile are used
for formulation and analysis of blood splatters. Using both the techniques the main aim is to compute or recover the information
about the velocity and angle of weapon operation. Therefore the three basic equations of law of motion and the concept of trajectory
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 10
analysis are used for finding the required goal. The proposed technique requires some additional input for finding accurate
information i.e. initial position of body and the height of weapon operation. Using these initial inputs the proposed mathematical
model is formulated. In addition of that some concepts of the image processing is also included for recovering the blood spots and
the edges of the blood splatter images. The next section provides the detailed understanding about the proposed concept and their
outcomes.
Methodology
The proposed methodology for analyzing the speed and angle of weapon is computed in this section. The figure 1 shows the
proposed model how the processes are taken place.
Fig. 1: Proposed Model
Input blood spot image: that is the initial input of the system, user select a blood spot image from the local disk and input to the
system. This file input contains the blood spots which is need to be analyzing by the proposed system.
Canny Edge Detection
The edge detection provides the approach to minimize the amount of data in image. This kind of image analysis leads to preserve
the structural properties of image. In literature a number of methods available here the canny edge detection approach is used
which is given by John F. Canny in 1986[13, 14]. The algorithm works in five different phases:
1) Smoothing: the aim of this phase is to remove noise from the input image.
2) Finding Gradients: in this phase edges are identified using the gradients of the image because the edges have big magnitudes.
3) Non-Maximum Suppression: this phase is responsible to locate only local maxima as edges.
4) Double Thresholding: possible edges are also identified by using thresholding.
5) Edge Tracking By Hystersis: Final edges are obtained by composing all edges that are not involved as strong edge.
Original Image Smoothed Image
Fig. 2: Smoothing Effect on Image
During the photography using any kind of camera it is expected that the images will contain some amount of noise. This noise can
affect the accurate edge recovery therefore to prevent noise a filtering process is used here. This filtering technique for removal of
noise from image is termed as smoothing. To make smooth image Gaussian filter is frequently used here.
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 11
Finding Gradients
The gradient magnitudes are also called as edge strengths. That can be computed using Euclidean distance by applying the
Pythagoras law.
|πΊπ‘Ÿ| = βˆšπΊπ‘Ÿπ‘₯
2
+ πΊπ‘Ÿπ‘¦
2
That can also be computed using Manhattan distance, which is less computationally complicated as compared to Euclidean
distance.
|𝐺| = |𝐺 π‘₯| + |𝐺 𝑦|
Grx and Gry are the gradients in the x and y directions.
Fig. 3: Gradient Magnitude of Image
The Euclidean distance evaluate has been applied to the test image. The computed edge strengths are evaluated to the smoothed
image in figure 3. The figure 3 (b) is an image of the gradient magnitudes. That indicates the edges clearly. Here given edges are
comprehensive and not indicating the edges precisely. Therefore need to make it clearer; the directions of the edges are needed to
be compute.
ΞΈ = arcTan (
|Gry|
|Grx|
)
Non-Maximum Suppression
The reason of this step is to renovate the β€œblurred” edges in the image of the incline magnitudes to β€œsharp” edges. Therefore it is
performed by preserving the entire local maxima in given image. Additionally the removal of other image contents is performed.
The every pixel in gradient image is treated using the following steps of process:
Rotate the gradient image direction given as ΞΈ about 45β—¦.That is performed by using the 8-connected neighborhood points to the
image.
Validate the strength of the edges of the target pixel with the edge strength of the pixel in the positive and negative directions.
Suppose that if gradient direction is north (theta = 90β—¦), evaluate with the pixels to the north and south directions.
In this conditions if edge magnitude of target pixel is higher than preserve the value of the edge else remove the computed value.
Double Thresholding
The edge-pixels remaining behind the non-maximum repression step are (still) marked with their strength pixel-by-pixel. Many of
these will probably be true edges in the image, but different maybe caused by noise or color variations for instance owing to rough
surfaces. The simplest way to discern between these would be to use a threshold, so that only edges stronger that a certain value
would be conserved. The canny edge detection algorithm uses double thresholding. Edge pixels stronger than the high threshold
are marked as strong; edge pixels weaker than the low threshold are covered and edge pixels among the two thresholds are marked
as weak.
Edge Tracking By Hystersis
Strong edges are interpreted as β€œcertain edges”, and can immediately be included in the final edge image. Weak edges are
incorporated if and only if they are connected to strong edges. The logic is of course that noise and additional small difference are
unlikely to result in a strong edge (with proper adaptation of the threshold levels). Thus strong edges will (regarding) only be owing
to true edges in the original image. The weak edges can either be owing to true edges or noise/color variations. The latter type will
probably be disseminated independently of edges on the entire image, and consequently only a small amount will be located
adjacent to strong edges. Weak edges owing to true edges are much further likely to be connected directly to strong edges.
Edge tracking can be implemented by BLOB-analysis (Binary Large Object). The edge pixels are divided into connected
BLOB’s using 8-connected neighborhood. BLOB’s containing at least one strong edge pixel is then preserved, though additional
BLOB’s are suppressed. The consequence of edge tracking on the test image is shown in Figure.
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 12
Fig. 4: Blob Analysis
ο€­ Image Edge: the canny edge detection approach provides the images with clearer edges of blood spots. In further these edges
are used for detection of other factors.
ο€­ Input Line: the slop is computed by producing the additional input to the system in the image dynamically.
ο€­ Angle Calculation: in order to calculate the angle using the input dynamic line the following technique is used for computing
angle.
Fig. 5: Computing angle
User first draws the line which is passing through the edge of the blood spot that is given using (π‘₯1, 𝑦1) and the last point where
the line is end is denoted by(π‘₯2, 𝑦2). In order to evaluate the angle of the line a base line which is imaginary produced by the
program accepts the initial co-ordinate (π‘₯1, 𝑦1) and second coordinate(π‘₯2, 𝑦1). Now using the formula of line we find the slop of
both the lines as:
𝑀1 =
𝑦2 βˆ’ 𝑦1
π‘₯2 βˆ’ π‘₯1
And
𝑀2 =
𝑦2 βˆ’ 𝑦1
π‘₯2 βˆ’ π‘₯1
Thus the angle πœƒ is computed using both the slops as:
πœƒ = π‘‘π‘Žπ‘›βˆ’1 (
𝑀1 βˆ’ 𝑀2
1 βˆ’ 𝑀1 𝑀2
)
ο€­ Law of Motion: after computing the πœƒ now need to calculate the speed of the weapon. Thus for understanding the formulation
consider the figure 2.6.
Fig. 6: Location of person and blood spot distance
Form the above given figure we assumed that the person is standing on a position (π‘₯1, 𝑦1) and the weapon is stuck on the person
at height of h thus the location new coordinates are (π‘₯1, 𝑦1 + β„Ž) similarly the blood spots are observed on d distance thus the next
coordinate is (π‘₯1 + 𝑑, 𝑦1). Now need to assume some initial constrains for computing the speeds of weapon consider table 1 which
contains the initial values of the above described technique.
Table - 1
Initial values
Horizontal Vertical
g 0 9.8
πœƒ π‘π‘œπ‘ πœƒ π‘ π‘–π‘›πœƒ
Additionally we consider the three equations of the motion as:
𝑣 = 𝑒 + 𝑔𝑑 (1)
𝑠 = 𝑒𝑑 +
1
2
𝑔𝑑2
(2)
𝑣2
= 𝑒2
+ 2𝑔𝑠 (3)
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 13
Speed calculation: in order to calculate the required speed we initially assumed that the initial speed of weapon is 0. By putting
this value in equation (1) we get
𝑣 = 0 + 𝑔𝑑
𝑑 =
𝑣
𝑔
(4)
Now by substituting the h value in equation (2) we get.
β„Ž = 𝑒𝑑 +
1
2
𝑔𝑑2
(5)
Additionally by the equation (1) we get.
𝑒 = 𝑣 βˆ’ 𝑔𝑑 (6)
Putting the values of equation (6) into equation (5)
β„Ž = (𝑣 βˆ’ 𝑔𝑑)𝑑 +
1
2
𝑔𝑑2
β„Ž = 𝑣𝑑 βˆ’ 𝑔𝑑2
+
1
2
𝑔𝑑2
β„Ž = 𝑣𝑑 βˆ’
1
2
𝑔𝑑2
(7)
Now for vertical scenarios we put the value of g=-9.8 into the equation (7)
β„Ž = 𝑣𝑑 + 4.9𝑑2
Using the equation (4)
β„Ž =
𝑣2
𝑔
+ 4.9𝑑2 (8)
On the other hand we utilize the equation (3) with the value u=0 for computing the value of v such that.
𝑣2
= 𝑒2
+ 2π‘”β„Ž
𝑣2
= 0 + 2π‘”β„Ž
𝑣2
= 2π‘”β„Ž
𝑣 = √2π‘”β„Ž
Now using the value of v the equation (8) can be written as:
β„Ž =
2π‘”β„Ž
𝑔
π‘ π‘–π‘›πœƒ + 4.9𝑑2
βˆ’β„Ž π‘ π‘–π‘›πœƒ = 4.9𝑑2
βˆ’β„Ž π‘ π‘–π‘›πœƒ
4.9
= 𝑑2
𝑑 = √
βˆ’β„Ž π‘ π‘–π‘›πœƒ
4.9
(9)
Now for horizontal computation is performed for computing the velocity, thus by equation (2)
𝑑 = 𝑒𝑑 +
1
2
𝑔𝑑2 (10)
By using the table 2.1 the value can be written as:
𝑑 = π‘£π‘π‘œπ‘ πœƒ βˆ— 𝑑
𝑑 = π‘£π‘π‘œπ‘ πœƒ βˆ— √
βˆ’β„Ž π‘ π‘–π‘›πœƒ
4.9
𝑑 βˆ—
1
βˆšβˆ’β„Ž π‘ π‘–π‘›πœƒ
4.9
= π‘£π‘π‘œπ‘ πœƒ
𝑣 =
𝑑
π‘π‘œπ‘ πœƒ
βˆ— √
4.9
βˆ’β„Žπ‘ π‘–π‘›πœƒ
The v is the final velocity of the weapon, this section demonstrate the formulation of the proposed concept.
III. RESULT ANALYSIS
This chapter discusses about the different performance parameters for providing the evaluation of the proposed concept. The
detailed analysis and their observation are described as:
Time Consumption
The time consumption of the proposed data model for estimating the speed and velocity of weapon is computed between initiation
of algorithm and the completion of the processing. That is the total time required to complete the analysis of the input image. This
can be computed using the following formula:
time consumption = algorithm end time βˆ’ start time
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 14
Fig. 7: Time Consumption
Table - 2
Time Consumption
Experiment Number Time consumption
1 56.2
2 76.4
3 68.2
4 72.4
5 61.9
6 65.3
7 69.1
Required memory consumption of the proposed technique is described in table 2 and using figure 7. The table contains the different
number of experiments performed with the simulation system and the corresponding times required in milliseconds are also
reported in next column. Both the parameters are visualized using the figure 7, thus to show the performance X axis includes the
experiments and the Y axis shows the time consumption in milliseconds. According to the observation of results the performance
of the proposed analytical technique for blood spot analysis is accomplished and consumes a consistent amount of time. In different
experiments the time consumption is varies between 56-76 MS.
Memory Usages
The amount of main memory required to execute the algorithm or program is denoted here as the memory consumption of the
proposed algorithm. The memory consumption of algorithm is computed using the amount of main memory allocated to the process
and the amount of memory remain during the execution of the algorithm or process that can be computed using the following
formula:
memory usage = total memory βˆ’ free memory
Table - 3
Memory Usages
Experiment number Memory in KB
1 24749
2 25544
3 24811
4 25726
5 25184
6 25016
7 24915
Fig. 8: Memory Usages
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 15
Table 3 contains the two columns first provides the number of experiments performed with the algorithm and the second column
shows the amount of main memory in terms of KB (kilobytes) required for processing the data. The table 3 data is visualize using
the figure 8 to represent the performance the X axis of the diagram shows the number of experimentations and the Y axis shows
the memory requirements of the algorithm. According to the observations the algorithm demonstrates the limited amount of
consumed memory. Additionally that varies between 24700 KB -25750 KB.
IV. CONCLUSION AND FUTURE WORK
This chapter draws the conclusion of the proposed work and the observations and facts concluded during the experimentation and
development. Additionally the future prospect of the proposed technique is also suggested for work.
Conclusion
The Forensic science is the application or a tool of science to criminal investigation. Forensic scientists collect and analyze
scientific evidence during investigation. Therefore it is a very essential domain of criminology. The forensic science is also useful
for understanding the crime scene and the different other factors about the crime. In this presented work a model for blood splatter
analysis is proposed for design and implementation. The blood splatters are the evidence of the crime and it is used to find the
information about the weapon and their use. In this presented work the aim is to find the facts about the weapon speed and the
angle of operation. Therefore a mathematical model is proposed and implemented.
The proposed technique is basically the combined approach of different areas of science, physics and image processing.
Basically the proposed system accepts the blood spot image. Therefore from this image required to discover the edges of the blood
spots. For computing the edges of the input image the canny edge detection algorithm is implemented. This algorithm provides the
edge information which further edited using the local canvas window by input of line. Using the line input and the actual horizon
the angle of spot creation is developed. In further by solving the law of motion equations and trajectory analysis technique the
speed of the weapon and the time of the blood traveling is also computed.
The implementation of the proposed approach is provided using the JAVA technology. Additionally for demonstration of
performance of the proposed technique the memory usages and time of the image analysis is computed. The table 4 contains the
obtained performance of the proposed working model.
Table - 4
Performance summary
S. No. Parameters Remark
1 Time consumption
The proposed technique is adoptable due to efficient processing of the image it consumes 56-76
MS for producing the output
2 Space complexity
The proposed technique is also suitable and efficient in terms of memory resource consumption
it consumes between 24700 KB -25750 KB memory during different experiments
According to the table 4 proposed technique able to process images for extracting the required information which is utilized in
crime scene analysis in limited memory and time consumption.
Future Work
The main aim of the proposed work is to investigate the blood splatter trajectory analysis technique and implementation of new
approach is accomplished successfully. In near future the following work is suggested for improvements:
ο€­ The current system directly implemented with the canny edge detection approach suggested comparing more algorithms for
edge detection and their smoothing.
ο€­ The current system designed with the concept of law of motion and the trajectory analysis in future it is suggested to evaluate
other available techniques to improve the proposed model.
REFERENCES
[1] Shinde, Abhijit, and Deepali Sale, "Blood spatter trajectory analysis for spatter source reconstruction using image processing", Conference on Advances in
Signal Processing (CASP), IEEE, 2016.
[2] Rafael Gonzalez, Richard Woods, β€œDigital Image Processing”, Pearson Publications, 2002.
[3] Navjeet Kaur, ShvetaChadda and Rajni Thakur, β€œA Survey of Image De-noising Filters”, IJCST Vol. 3, Issue 1, Jan. - March 2012.
[4] Vinod Sharma, Deepika Bansal, β€œA review on digital image enhancement by noise removal”, IJIRSET, vol.4, may 2015.
[5] Divya, Dr. Sasikumar, β€œNoise Removal in Images in the None Subsampled Contourlet Transform Domain Using Orthogonal Matching Pursuit”, IJIRCCE,
vol.3, June 2015.
[6] A. K. Jain, β€œFundamentals of digital image processing”, Prentice-Hall, 1989
[7] Pratishtha Gupta, Manisha Rathore and Saroj Kumari, β€œA Survey of Techniques and Applications for Real Time Image Processing”, Journal of Global
Research in Computer Science, Volume 4, No. 8, August 2013.
[8] Pankaj Gupta and Jaspal Singh, β€œDigital Forensics- A Technological Revolution in Forensic Sciences”, J Indian Academic Forensic Media April-June 2011,
Vol. 33, No. 2
[9] β€œWhat is Forensic Science”, available online at: http://mocomi.com/forensic-science/
[10] β€œChapter II: Conceptual Analysis of Forensic Science and its Relevancy in Crime Investigation: A Panoramic View”, available online at:
http://shodhganga.inflibnet.ac.in/bitstream/10603/70232/6/chapter2.pdf
[11] What is Forensics? Available online at: http://www.crimesceneinvestigatoredu.org/what-is-forensic-science/
An Improved Blood Splatters Analysis Technique
(J4R/ Volume 03 / Issue 07 / 002)
All rights reserved by www.journal4research.org 16
[12] Jia-Rong Sun and Mao-Lin Shih, β€œA Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure”, International Journal of Network
Security, Vol.17, No.5, PP.497-509, Sept. 2015.
[13] Laura Wyckoff and University of Maryland, β€œDefinition and Types of Crime Analysis”, International Association of Crime Analysis, White Paper 2014-02
[14] What is Crime Analysis? International Association of Crime Analysis, available online at: http://www.iaca.net/dc_about_ca.asp
[15] Wong, Jennifer L., Darko Kirovski, and Miodrag Potkonjak, "Computational forensic techniques for intellectual property protection", IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems 23.6 (2004): 987-994.
[16] van der Steen, M., and M. Blom, A roadmap for future forensic research, Technical report, Netherlands Forensic InsTtute (NFI), The Hague, The Netherlands,
2007.
[17] Saks, Michael J., and Jonathan J. Koehler, "The coming paradigm shift in forensic identification science", Science 309.5736 (2005): 892-895.
[18] Franke, Katrin, and Sargur N. Srihari, "Computational forensics: An overview", International Workshop on Computational Forensics, Springer, Berlin,
Heidelberg, 2008.
[19] Franke, Katrin, and Sargur N. Srihari, "Computational forensics: Towards hybrid-intelligent crime investigation", Third International Symposium on
Information Assurance and Security, (IAS 2007), IEEE, 2007.
[20] W. G. Eckert and S. H. James, β€œInterpretation of Bloodstain Evidence at Crime Scenes”, Elsevier Publishing Company, 1989
[21] S. Weidman, Strengthening forensic science in the United States: A path forward, Committee on Identifying the Needs of the Forensic Sciences Community,
National Research Council, 2009,
[22] Comiskey, P. M., et al. "Prediction of blood back spatter from a gunshot in bloodstain pattern analysis", Physical Review Fluids 1.4 (2016)
[23] Bandyopadhyay, Samir Kumar, and Nabanita Basu, "Review of common bloodstain patterns documented at a crime scene in the event of blunt force hit",
Am. Journal Computer Science and Information Technology, 3 (2015): pp. 45-63.
[24] Carter, A. L. "The directional analysis of bloodstain patterns theory and experimental validation." Canadian Society of Forensic Science Journal 34.4 (2001):
pp. 173-189.
[25] Brodbeck Silke, β€œIntroduction to Bloodstain Pattern Analysis”, .SIAK-Journal – Journal for Police Science and Practice, Volume 2, pp. 51-57, 2012

More Related Content

What's hot

D232430
D232430D232430
D232430irjes
Β 
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...ijcsit
Β 
IRJET-Vision Based Occupant Detection in Unattended Vehicle
IRJET-Vision Based Occupant Detection in Unattended VehicleIRJET-Vision Based Occupant Detection in Unattended Vehicle
IRJET-Vision Based Occupant Detection in Unattended VehicleIRJET Journal
Β 
Mass Segmentation Techniques For Lung Cancer CT Images
Mass Segmentation Techniques For Lung Cancer CT ImagesMass Segmentation Techniques For Lung Cancer CT Images
Mass Segmentation Techniques For Lung Cancer CT Imagesrahulmonikasharma
Β 
PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...
PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...
PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...AM Publications
Β 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...IRJET Journal
Β 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...eSAT Journals
Β 
BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...
BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...
BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...sipij
Β 
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...AM Publications
Β 
IRJET- Brain Tumour Detection and ART Classification Technique in MR Brai...
IRJET-  	  Brain Tumour Detection and ART Classification Technique in MR Brai...IRJET-  	  Brain Tumour Detection and ART Classification Technique in MR Brai...
IRJET- Brain Tumour Detection and ART Classification Technique in MR Brai...IRJET Journal
Β 
Traffic Outlier Detection by Density-Based Bounded Local Outlier Factors
Traffic Outlier Detection by Density-Based Bounded Local Outlier FactorsTraffic Outlier Detection by Density-Based Bounded Local Outlier Factors
Traffic Outlier Detection by Density-Based Bounded Local Outlier FactorsITIIIndustries
Β 
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...
Automatic Segmentation of Brachial Artery based on Fuzzy  C-Means Pixel Clust...Automatic Segmentation of Brachial Artery based on Fuzzy  C-Means Pixel Clust...
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...IJECEIAES
Β 
Unsupervised Deformable Image Registration Using Cycle-Consistent CNN
Unsupervised Deformable Image Registration Using Cycle-Consistent CNNUnsupervised Deformable Image Registration Using Cycle-Consistent CNN
Unsupervised Deformable Image Registration Using Cycle-Consistent CNNBoahKim2
Β 
CycleMorph: Cycle consistent unsupervised deformable image registration
CycleMorph: Cycle consistent unsupervised deformable image registrationCycleMorph: Cycle consistent unsupervised deformable image registration
CycleMorph: Cycle consistent unsupervised deformable image registrationBoahKim2
Β 
Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022
Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022
Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022sugiuralab
Β 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringeSAT Journals
Β 
A study of a modified histogram based fast enhancement algorithm (mhbfe)
A study of a modified histogram based fast enhancement algorithm (mhbfe)A study of a modified histogram based fast enhancement algorithm (mhbfe)
A study of a modified histogram based fast enhancement algorithm (mhbfe)sipij
Β 
Lung Nodule detection System
Lung Nodule detection SystemLung Nodule detection System
Lung Nodule detection SystemEditor IJMTER
Β 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMAM Publications
Β 

What's hot (19)

D232430
D232430D232430
D232430
Β 
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
Β 
IRJET-Vision Based Occupant Detection in Unattended Vehicle
IRJET-Vision Based Occupant Detection in Unattended VehicleIRJET-Vision Based Occupant Detection in Unattended Vehicle
IRJET-Vision Based Occupant Detection in Unattended Vehicle
Β 
Mass Segmentation Techniques For Lung Cancer CT Images
Mass Segmentation Techniques For Lung Cancer CT ImagesMass Segmentation Techniques For Lung Cancer CT Images
Mass Segmentation Techniques For Lung Cancer CT Images
Β 
PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...
PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...
PROFILE DOSE ANALYSIS OF 6MV LINEAR ACCELERATOR WITH CCD ELECTRONIC PORTAL IM...
Β 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
Β 
Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...Automatic detection of optic disc and blood vessels from retinal images using...
Automatic detection of optic disc and blood vessels from retinal images using...
Β 
BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...
BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...
BRAIN PORTION EXTRACTION USING HYBRID CONTOUR TECHNIQUE USING SETS FOR T1 WEI...
Β 
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...
CALCULATION of the CEREBRAL HEMORRHAGE VOLUME USING ANALYSIS of COMPUTED TOMO...
Β 
IRJET- Brain Tumour Detection and ART Classification Technique in MR Brai...
IRJET-  	  Brain Tumour Detection and ART Classification Technique in MR Brai...IRJET-  	  Brain Tumour Detection and ART Classification Technique in MR Brai...
IRJET- Brain Tumour Detection and ART Classification Technique in MR Brai...
Β 
Traffic Outlier Detection by Density-Based Bounded Local Outlier Factors
Traffic Outlier Detection by Density-Based Bounded Local Outlier FactorsTraffic Outlier Detection by Density-Based Bounded Local Outlier Factors
Traffic Outlier Detection by Density-Based Bounded Local Outlier Factors
Β 
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...
Automatic Segmentation of Brachial Artery based on Fuzzy  C-Means Pixel Clust...Automatic Segmentation of Brachial Artery based on Fuzzy  C-Means Pixel Clust...
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...
Β 
Unsupervised Deformable Image Registration Using Cycle-Consistent CNN
Unsupervised Deformable Image Registration Using Cycle-Consistent CNNUnsupervised Deformable Image Registration Using Cycle-Consistent CNN
Unsupervised Deformable Image Registration Using Cycle-Consistent CNN
Β 
CycleMorph: Cycle consistent unsupervised deformable image registration
CycleMorph: Cycle consistent unsupervised deformable image registrationCycleMorph: Cycle consistent unsupervised deformable image registration
CycleMorph: Cycle consistent unsupervised deformable image registration
Β 
Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022
Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022
Cervical Spine Range of Motion Measurement Utilizing Image Analysis - VISAPP2022
Β 
Clustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clusteringClustering of medline documents using semi supervised spectral clustering
Clustering of medline documents using semi supervised spectral clustering
Β 
A study of a modified histogram based fast enhancement algorithm (mhbfe)
A study of a modified histogram based fast enhancement algorithm (mhbfe)A study of a modified histogram based fast enhancement algorithm (mhbfe)
A study of a modified histogram based fast enhancement algorithm (mhbfe)
Β 
Lung Nodule detection System
Lung Nodule detection SystemLung Nodule detection System
Lung Nodule detection System
Β 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
Β 

Similar to An Improved Blood Splatters Analysis Technique

Automatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct imagesAutomatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct imageseSAT Publishing House
Β 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA ijaceeejournal
Β 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERACROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERAijaceeejournal
Β 
A Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough TransformA Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough TransformIJSRED
Β 
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...paperpublications3
Β 
Iris Recognition Using Active Contours
Iris Recognition Using Active ContoursIris Recognition Using Active Contours
Iris Recognition Using Active ContoursIJARIDEA Journal
Β 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
Β 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING sipij
Β 
IRJET- Texture Analysis and Fracture Identification of Bones X-Ray Images...
IRJET-  	  Texture Analysis and Fracture Identification of Bones X-Ray Images...IRJET-  	  Texture Analysis and Fracture Identification of Bones X-Ray Images...
IRJET- Texture Analysis and Fracture Identification of Bones X-Ray Images...IRJET Journal
Β 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAIRJET Journal
Β 
Retinal blood vessel extraction and optical disc removal
Retinal blood vessel extraction and optical disc removalRetinal blood vessel extraction and optical disc removal
Retinal blood vessel extraction and optical disc removaleSAT Journals
Β 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureIRJET Journal
Β 
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...theijes
Β 
Hx3613861389
Hx3613861389Hx3613861389
Hx3613861389IJERA Editor
Β 
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...IJTET Journal
Β 
Multiple Analysis of Brain Tumor Detection based on FCM
Multiple Analysis of Brain Tumor Detection based on FCMMultiple Analysis of Brain Tumor Detection based on FCM
Multiple Analysis of Brain Tumor Detection based on FCMIRJET Journal
Β 

Similar to An Improved Blood Splatters Analysis Technique (20)

Automatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct imagesAutomatic detection of lung cancer in ct images
Automatic detection of lung cancer in ct images
Β 
E017443136
E017443136E017443136
E017443136
Β 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA
Β 
CROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERACROWD ANALYSIS WITH FISH EYE CAMERA
CROWD ANALYSIS WITH FISH EYE CAMERA
Β 
A Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough TransformA Case Study : Circle Detection Using Circular Hough Transform
A Case Study : Circle Detection Using Circular Hough Transform
Β 
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Β 
Iris Recognition Using Active Contours
Iris Recognition Using Active ContoursIris Recognition Using Active Contours
Iris Recognition Using Active Contours
Β 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
Β 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
Β 
IRJET- Texture Analysis and Fracture Identification of Bones X-Ray Images...
IRJET-  	  Texture Analysis and Fracture Identification of Bones X-Ray Images...IRJET-  	  Texture Analysis and Fracture Identification of Bones X-Ray Images...
IRJET- Texture Analysis and Fracture Identification of Bones X-Ray Images...
Β 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Β 
Retinal blood vessel extraction and optical disc removal
Retinal blood vessel extraction and optical disc removalRetinal blood vessel extraction and optical disc removal
Retinal blood vessel extraction and optical disc removal
Β 
50120130405020
5012013040502050120130405020
50120130405020
Β 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone Fracture
Β 
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Β 
F045033337
F045033337F045033337
F045033337
Β 
Hx3613861389
Hx3613861389Hx3613861389
Hx3613861389
Β 
R-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGE
R-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGER-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGE
R-PI BASED DETECTION OF LUNG CANCER USING MRI IMAGE
Β 
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Supervised Blood Vessel Segmentation in Retinal Images Using Gray level and M...
Β 
Multiple Analysis of Brain Tumor Detection based on FCM
Multiple Analysis of Brain Tumor Detection based on FCMMultiple Analysis of Brain Tumor Detection based on FCM
Multiple Analysis of Brain Tumor Detection based on FCM
Β 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
Β 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
Β 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
Β 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
Β 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
Β 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Β 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
Β 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
Β 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
Β 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
Β 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
Β 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
Β 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010Journal For Research
Β 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
Β 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
Β 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
Β 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
Β 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
Β 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
Β 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
Β 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Β 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
Β 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Β 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
Β 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
Β 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Β 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
Β 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
Β 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
Β 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
Β 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
Β 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
Β 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
Β 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Β 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
Β 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
Β 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
Β 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
Β 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
Β 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
Β 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
Β 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Β 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
Β 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
Β 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
Β 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
Β 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
Β 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Β 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Β 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
Β 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
Β 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
Β 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
Β 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
Β 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
Β 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
Β 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
Β 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Β 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Β 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Β 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Β 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Β 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Β 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Β 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Β 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Β 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Β 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Β 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Β 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Β 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Β 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
Β 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
Β 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Β 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
Β 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
Β 

An Improved Blood Splatters Analysis Technique

  • 1. Journal for Research | Volume 03| Issue 07 | September 2017 ISSN: 2395-7549 All rights reserved by www.journal4research.org 9 An Improved Blood Splatters Analysis Technique Utkarsha Chirmade Ms. Namrata Sharma Sushila Devi Bansal College of Engineering, Indore, India Sushila Devi Bansal College of Engineering, Indore, India Prof. B.S Patil Govt .College of Engineering, Karad, India Abstract In different complicated crime investigation and solving the cases the forensic science is a key contributor. That involves the biology, chemistry, mathematics and physics for investigating the facts about the crime. Forensic science includes on more technique for crime scene analysis is known as bloodstain analysis. The bloodstain analysis enable the investigators to understand the crime scene, discover the kind of weapon used, speed of weapon, flight time of blood drops and the angle of weapon or impact. In this work the aim is to investigate about the blood strain analysis technique and to design a new technique for recovering the flight time, angle of impact and velocity of weapon. In this context first the crime scene image data is accepted as initial input. Additionally for finding the accurate analysis some additional inputs are also included such as high of impact, distance of blood drops and the line passing through the ellipse formed in the input image. Finally the velocity and flight time of blood drops are calculated using the law of motion and the trajectory analysis. The implementation of the proposed technique is provided using JAVA technology. Additionally the performance is computed in terms of time and space complexity of the implemented system. The performance of the proposed system demonstrates the proposed technique is effective and low resource consuming technique. Keywords: Forensic, Bloodstain Analysis, Trajectory Analysis, Flight Time, Velocity and Angle _______________________________________________________________________________________________________ I. INTRODUCTION The domain of computation and their applications are expanding day by day. Among various application domains of computations now in these days in forensic science it also becomes popular. Basically the forensic science is a domain or subject of investigation of criminal activities. That is responsible for preservation, investigation and collection of criminal facts that helps to explore the crime. In this proposed work the domain of forensic science is key area of study and fact collection. In addition of that the effort is made in order to provide enhance and efficient approach for finding the blood splatter trajectory. The analysis of blood splatter trajectory is also termed as Bloodstain pattern analysis. That is aimed to helping investigators draw conclusions about the nature, timing and other details of the crime. Bloodstain pattern analysis draws on the scientific disciplines of biology, chemistry, mathematics and physics. In this presented work the investigation is limited on the physical characteristics of crime scene analysis. A single spatter of blood is not enough to determine the Area of Origin at a crime scene. But in this presented work for demonstrating the proposed working model the work is focused on the single drop based technique. Therefore the image processing technique (i.e. edge detection) is included initially for finding the curve and the angle of impact. Additionally for analyzing the velocity and the flight time estimation the low of motion and trajectory is analyzed. II. PROPOSED WORK This chapter demonstrates the proposed methodology of blood splatter analysis. In this context the method formulation for analyzing the blood spot in order to recovering the speed and angle of weapon operation is investigated. This chapter includes the basic theory and the detailed methodology description for accomplishing the required goal. System Overview Forensics is a domain of engineering and science which is used for analysis of any crime scene. Here the different concept of engineering, chemistry, physics and others are included for finding the different facts that can help for discovering the actions and reason of crime. Now in these days the forensics is also performed using the image processing concepts. By using the image processing concepts the crime scene is investigated and different facts about the particular crime is investigated. In this presented work the main aim is to use the image processing concepts for analyzing the blood splatter. The blood splatters of any crime scene used to find the type of weapon used, the angle on which the weapon is operated and the speed of weapon. Among these facts the angle and the speed of weapon is calculated in this work. Thus a new method for computing these facts is introduced in this work. The proposed technique is based on the blood trajectory analysis. Thus the low of motion and the concept of projectile are used for formulation and analysis of blood splatters. Using both the techniques the main aim is to compute or recover the information about the velocity and angle of weapon operation. Therefore the three basic equations of law of motion and the concept of trajectory
  • 2. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 10 analysis are used for finding the required goal. The proposed technique requires some additional input for finding accurate information i.e. initial position of body and the height of weapon operation. Using these initial inputs the proposed mathematical model is formulated. In addition of that some concepts of the image processing is also included for recovering the blood spots and the edges of the blood splatter images. The next section provides the detailed understanding about the proposed concept and their outcomes. Methodology The proposed methodology for analyzing the speed and angle of weapon is computed in this section. The figure 1 shows the proposed model how the processes are taken place. Fig. 1: Proposed Model Input blood spot image: that is the initial input of the system, user select a blood spot image from the local disk and input to the system. This file input contains the blood spots which is need to be analyzing by the proposed system. Canny Edge Detection The edge detection provides the approach to minimize the amount of data in image. This kind of image analysis leads to preserve the structural properties of image. In literature a number of methods available here the canny edge detection approach is used which is given by John F. Canny in 1986[13, 14]. The algorithm works in five different phases: 1) Smoothing: the aim of this phase is to remove noise from the input image. 2) Finding Gradients: in this phase edges are identified using the gradients of the image because the edges have big magnitudes. 3) Non-Maximum Suppression: this phase is responsible to locate only local maxima as edges. 4) Double Thresholding: possible edges are also identified by using thresholding. 5) Edge Tracking By Hystersis: Final edges are obtained by composing all edges that are not involved as strong edge. Original Image Smoothed Image Fig. 2: Smoothing Effect on Image During the photography using any kind of camera it is expected that the images will contain some amount of noise. This noise can affect the accurate edge recovery therefore to prevent noise a filtering process is used here. This filtering technique for removal of noise from image is termed as smoothing. To make smooth image Gaussian filter is frequently used here.
  • 3. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 11 Finding Gradients The gradient magnitudes are also called as edge strengths. That can be computed using Euclidean distance by applying the Pythagoras law. |πΊπ‘Ÿ| = βˆšπΊπ‘Ÿπ‘₯ 2 + πΊπ‘Ÿπ‘¦ 2 That can also be computed using Manhattan distance, which is less computationally complicated as compared to Euclidean distance. |𝐺| = |𝐺 π‘₯| + |𝐺 𝑦| Grx and Gry are the gradients in the x and y directions. Fig. 3: Gradient Magnitude of Image The Euclidean distance evaluate has been applied to the test image. The computed edge strengths are evaluated to the smoothed image in figure 3. The figure 3 (b) is an image of the gradient magnitudes. That indicates the edges clearly. Here given edges are comprehensive and not indicating the edges precisely. Therefore need to make it clearer; the directions of the edges are needed to be compute. ΞΈ = arcTan ( |Gry| |Grx| ) Non-Maximum Suppression The reason of this step is to renovate the β€œblurred” edges in the image of the incline magnitudes to β€œsharp” edges. Therefore it is performed by preserving the entire local maxima in given image. Additionally the removal of other image contents is performed. The every pixel in gradient image is treated using the following steps of process: Rotate the gradient image direction given as ΞΈ about 45β—¦.That is performed by using the 8-connected neighborhood points to the image. Validate the strength of the edges of the target pixel with the edge strength of the pixel in the positive and negative directions. Suppose that if gradient direction is north (theta = 90β—¦), evaluate with the pixels to the north and south directions. In this conditions if edge magnitude of target pixel is higher than preserve the value of the edge else remove the computed value. Double Thresholding The edge-pixels remaining behind the non-maximum repression step are (still) marked with their strength pixel-by-pixel. Many of these will probably be true edges in the image, but different maybe caused by noise or color variations for instance owing to rough surfaces. The simplest way to discern between these would be to use a threshold, so that only edges stronger that a certain value would be conserved. The canny edge detection algorithm uses double thresholding. Edge pixels stronger than the high threshold are marked as strong; edge pixels weaker than the low threshold are covered and edge pixels among the two thresholds are marked as weak. Edge Tracking By Hystersis Strong edges are interpreted as β€œcertain edges”, and can immediately be included in the final edge image. Weak edges are incorporated if and only if they are connected to strong edges. The logic is of course that noise and additional small difference are unlikely to result in a strong edge (with proper adaptation of the threshold levels). Thus strong edges will (regarding) only be owing to true edges in the original image. The weak edges can either be owing to true edges or noise/color variations. The latter type will probably be disseminated independently of edges on the entire image, and consequently only a small amount will be located adjacent to strong edges. Weak edges owing to true edges are much further likely to be connected directly to strong edges. Edge tracking can be implemented by BLOB-analysis (Binary Large Object). The edge pixels are divided into connected BLOB’s using 8-connected neighborhood. BLOB’s containing at least one strong edge pixel is then preserved, though additional BLOB’s are suppressed. The consequence of edge tracking on the test image is shown in Figure.
  • 4. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 12 Fig. 4: Blob Analysis ο€­ Image Edge: the canny edge detection approach provides the images with clearer edges of blood spots. In further these edges are used for detection of other factors. ο€­ Input Line: the slop is computed by producing the additional input to the system in the image dynamically. ο€­ Angle Calculation: in order to calculate the angle using the input dynamic line the following technique is used for computing angle. Fig. 5: Computing angle User first draws the line which is passing through the edge of the blood spot that is given using (π‘₯1, 𝑦1) and the last point where the line is end is denoted by(π‘₯2, 𝑦2). In order to evaluate the angle of the line a base line which is imaginary produced by the program accepts the initial co-ordinate (π‘₯1, 𝑦1) and second coordinate(π‘₯2, 𝑦1). Now using the formula of line we find the slop of both the lines as: 𝑀1 = 𝑦2 βˆ’ 𝑦1 π‘₯2 βˆ’ π‘₯1 And 𝑀2 = 𝑦2 βˆ’ 𝑦1 π‘₯2 βˆ’ π‘₯1 Thus the angle πœƒ is computed using both the slops as: πœƒ = π‘‘π‘Žπ‘›βˆ’1 ( 𝑀1 βˆ’ 𝑀2 1 βˆ’ 𝑀1 𝑀2 ) ο€­ Law of Motion: after computing the πœƒ now need to calculate the speed of the weapon. Thus for understanding the formulation consider the figure 2.6. Fig. 6: Location of person and blood spot distance Form the above given figure we assumed that the person is standing on a position (π‘₯1, 𝑦1) and the weapon is stuck on the person at height of h thus the location new coordinates are (π‘₯1, 𝑦1 + β„Ž) similarly the blood spots are observed on d distance thus the next coordinate is (π‘₯1 + 𝑑, 𝑦1). Now need to assume some initial constrains for computing the speeds of weapon consider table 1 which contains the initial values of the above described technique. Table - 1 Initial values Horizontal Vertical g 0 9.8 πœƒ π‘π‘œπ‘ πœƒ π‘ π‘–π‘›πœƒ Additionally we consider the three equations of the motion as: 𝑣 = 𝑒 + 𝑔𝑑 (1) 𝑠 = 𝑒𝑑 + 1 2 𝑔𝑑2 (2) 𝑣2 = 𝑒2 + 2𝑔𝑠 (3)
  • 5. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 13 Speed calculation: in order to calculate the required speed we initially assumed that the initial speed of weapon is 0. By putting this value in equation (1) we get 𝑣 = 0 + 𝑔𝑑 𝑑 = 𝑣 𝑔 (4) Now by substituting the h value in equation (2) we get. β„Ž = 𝑒𝑑 + 1 2 𝑔𝑑2 (5) Additionally by the equation (1) we get. 𝑒 = 𝑣 βˆ’ 𝑔𝑑 (6) Putting the values of equation (6) into equation (5) β„Ž = (𝑣 βˆ’ 𝑔𝑑)𝑑 + 1 2 𝑔𝑑2 β„Ž = 𝑣𝑑 βˆ’ 𝑔𝑑2 + 1 2 𝑔𝑑2 β„Ž = 𝑣𝑑 βˆ’ 1 2 𝑔𝑑2 (7) Now for vertical scenarios we put the value of g=-9.8 into the equation (7) β„Ž = 𝑣𝑑 + 4.9𝑑2 Using the equation (4) β„Ž = 𝑣2 𝑔 + 4.9𝑑2 (8) On the other hand we utilize the equation (3) with the value u=0 for computing the value of v such that. 𝑣2 = 𝑒2 + 2π‘”β„Ž 𝑣2 = 0 + 2π‘”β„Ž 𝑣2 = 2π‘”β„Ž 𝑣 = √2π‘”β„Ž Now using the value of v the equation (8) can be written as: β„Ž = 2π‘”β„Ž 𝑔 π‘ π‘–π‘›πœƒ + 4.9𝑑2 βˆ’β„Ž π‘ π‘–π‘›πœƒ = 4.9𝑑2 βˆ’β„Ž π‘ π‘–π‘›πœƒ 4.9 = 𝑑2 𝑑 = √ βˆ’β„Ž π‘ π‘–π‘›πœƒ 4.9 (9) Now for horizontal computation is performed for computing the velocity, thus by equation (2) 𝑑 = 𝑒𝑑 + 1 2 𝑔𝑑2 (10) By using the table 2.1 the value can be written as: 𝑑 = π‘£π‘π‘œπ‘ πœƒ βˆ— 𝑑 𝑑 = π‘£π‘π‘œπ‘ πœƒ βˆ— √ βˆ’β„Ž π‘ π‘–π‘›πœƒ 4.9 𝑑 βˆ— 1 βˆšβˆ’β„Ž π‘ π‘–π‘›πœƒ 4.9 = π‘£π‘π‘œπ‘ πœƒ 𝑣 = 𝑑 π‘π‘œπ‘ πœƒ βˆ— √ 4.9 βˆ’β„Žπ‘ π‘–π‘›πœƒ The v is the final velocity of the weapon, this section demonstrate the formulation of the proposed concept. III. RESULT ANALYSIS This chapter discusses about the different performance parameters for providing the evaluation of the proposed concept. The detailed analysis and their observation are described as: Time Consumption The time consumption of the proposed data model for estimating the speed and velocity of weapon is computed between initiation of algorithm and the completion of the processing. That is the total time required to complete the analysis of the input image. This can be computed using the following formula: time consumption = algorithm end time βˆ’ start time
  • 6. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 14 Fig. 7: Time Consumption Table - 2 Time Consumption Experiment Number Time consumption 1 56.2 2 76.4 3 68.2 4 72.4 5 61.9 6 65.3 7 69.1 Required memory consumption of the proposed technique is described in table 2 and using figure 7. The table contains the different number of experiments performed with the simulation system and the corresponding times required in milliseconds are also reported in next column. Both the parameters are visualized using the figure 7, thus to show the performance X axis includes the experiments and the Y axis shows the time consumption in milliseconds. According to the observation of results the performance of the proposed analytical technique for blood spot analysis is accomplished and consumes a consistent amount of time. In different experiments the time consumption is varies between 56-76 MS. Memory Usages The amount of main memory required to execute the algorithm or program is denoted here as the memory consumption of the proposed algorithm. The memory consumption of algorithm is computed using the amount of main memory allocated to the process and the amount of memory remain during the execution of the algorithm or process that can be computed using the following formula: memory usage = total memory βˆ’ free memory Table - 3 Memory Usages Experiment number Memory in KB 1 24749 2 25544 3 24811 4 25726 5 25184 6 25016 7 24915 Fig. 8: Memory Usages
  • 7. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 15 Table 3 contains the two columns first provides the number of experiments performed with the algorithm and the second column shows the amount of main memory in terms of KB (kilobytes) required for processing the data. The table 3 data is visualize using the figure 8 to represent the performance the X axis of the diagram shows the number of experimentations and the Y axis shows the memory requirements of the algorithm. According to the observations the algorithm demonstrates the limited amount of consumed memory. Additionally that varies between 24700 KB -25750 KB. IV. CONCLUSION AND FUTURE WORK This chapter draws the conclusion of the proposed work and the observations and facts concluded during the experimentation and development. Additionally the future prospect of the proposed technique is also suggested for work. Conclusion The Forensic science is the application or a tool of science to criminal investigation. Forensic scientists collect and analyze scientific evidence during investigation. Therefore it is a very essential domain of criminology. The forensic science is also useful for understanding the crime scene and the different other factors about the crime. In this presented work a model for blood splatter analysis is proposed for design and implementation. The blood splatters are the evidence of the crime and it is used to find the information about the weapon and their use. In this presented work the aim is to find the facts about the weapon speed and the angle of operation. Therefore a mathematical model is proposed and implemented. The proposed technique is basically the combined approach of different areas of science, physics and image processing. Basically the proposed system accepts the blood spot image. Therefore from this image required to discover the edges of the blood spots. For computing the edges of the input image the canny edge detection algorithm is implemented. This algorithm provides the edge information which further edited using the local canvas window by input of line. Using the line input and the actual horizon the angle of spot creation is developed. In further by solving the law of motion equations and trajectory analysis technique the speed of the weapon and the time of the blood traveling is also computed. The implementation of the proposed approach is provided using the JAVA technology. Additionally for demonstration of performance of the proposed technique the memory usages and time of the image analysis is computed. The table 4 contains the obtained performance of the proposed working model. Table - 4 Performance summary S. No. Parameters Remark 1 Time consumption The proposed technique is adoptable due to efficient processing of the image it consumes 56-76 MS for producing the output 2 Space complexity The proposed technique is also suitable and efficient in terms of memory resource consumption it consumes between 24700 KB -25750 KB memory during different experiments According to the table 4 proposed technique able to process images for extracting the required information which is utilized in crime scene analysis in limited memory and time consumption. Future Work The main aim of the proposed work is to investigate the blood splatter trajectory analysis technique and implementation of new approach is accomplished successfully. In near future the following work is suggested for improvements: ο€­ The current system directly implemented with the canny edge detection approach suggested comparing more algorithms for edge detection and their smoothing. ο€­ The current system designed with the concept of law of motion and the trajectory analysis in future it is suggested to evaluate other available techniques to improve the proposed model. REFERENCES [1] Shinde, Abhijit, and Deepali Sale, "Blood spatter trajectory analysis for spatter source reconstruction using image processing", Conference on Advances in Signal Processing (CASP), IEEE, 2016. [2] Rafael Gonzalez, Richard Woods, β€œDigital Image Processing”, Pearson Publications, 2002. [3] Navjeet Kaur, ShvetaChadda and Rajni Thakur, β€œA Survey of Image De-noising Filters”, IJCST Vol. 3, Issue 1, Jan. - March 2012. [4] Vinod Sharma, Deepika Bansal, β€œA review on digital image enhancement by noise removal”, IJIRSET, vol.4, may 2015. [5] Divya, Dr. Sasikumar, β€œNoise Removal in Images in the None Subsampled Contourlet Transform Domain Using Orthogonal Matching Pursuit”, IJIRCCE, vol.3, June 2015. [6] A. K. Jain, β€œFundamentals of digital image processing”, Prentice-Hall, 1989 [7] Pratishtha Gupta, Manisha Rathore and Saroj Kumari, β€œA Survey of Techniques and Applications for Real Time Image Processing”, Journal of Global Research in Computer Science, Volume 4, No. 8, August 2013. [8] Pankaj Gupta and Jaspal Singh, β€œDigital Forensics- A Technological Revolution in Forensic Sciences”, J Indian Academic Forensic Media April-June 2011, Vol. 33, No. 2 [9] β€œWhat is Forensic Science”, available online at: http://mocomi.com/forensic-science/ [10] β€œChapter II: Conceptual Analysis of Forensic Science and its Relevancy in Crime Investigation: A Panoramic View”, available online at: http://shodhganga.inflibnet.ac.in/bitstream/10603/70232/6/chapter2.pdf [11] What is Forensics? Available online at: http://www.crimesceneinvestigatoredu.org/what-is-forensic-science/
  • 8. An Improved Blood Splatters Analysis Technique (J4R/ Volume 03 / Issue 07 / 002) All rights reserved by www.journal4research.org 16 [12] Jia-Rong Sun and Mao-Lin Shih, β€œA Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure”, International Journal of Network Security, Vol.17, No.5, PP.497-509, Sept. 2015. [13] Laura Wyckoff and University of Maryland, β€œDefinition and Types of Crime Analysis”, International Association of Crime Analysis, White Paper 2014-02 [14] What is Crime Analysis? International Association of Crime Analysis, available online at: http://www.iaca.net/dc_about_ca.asp [15] Wong, Jennifer L., Darko Kirovski, and Miodrag Potkonjak, "Computational forensic techniques for intellectual property protection", IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 23.6 (2004): 987-994. [16] van der Steen, M., and M. Blom, A roadmap for future forensic research, Technical report, Netherlands Forensic InsTtute (NFI), The Hague, The Netherlands, 2007. [17] Saks, Michael J., and Jonathan J. Koehler, "The coming paradigm shift in forensic identification science", Science 309.5736 (2005): 892-895. [18] Franke, Katrin, and Sargur N. Srihari, "Computational forensics: An overview", International Workshop on Computational Forensics, Springer, Berlin, Heidelberg, 2008. [19] Franke, Katrin, and Sargur N. Srihari, "Computational forensics: Towards hybrid-intelligent crime investigation", Third International Symposium on Information Assurance and Security, (IAS 2007), IEEE, 2007. [20] W. G. Eckert and S. H. James, β€œInterpretation of Bloodstain Evidence at Crime Scenes”, Elsevier Publishing Company, 1989 [21] S. Weidman, Strengthening forensic science in the United States: A path forward, Committee on Identifying the Needs of the Forensic Sciences Community, National Research Council, 2009, [22] Comiskey, P. M., et al. "Prediction of blood back spatter from a gunshot in bloodstain pattern analysis", Physical Review Fluids 1.4 (2016) [23] Bandyopadhyay, Samir Kumar, and Nabanita Basu, "Review of common bloodstain patterns documented at a crime scene in the event of blunt force hit", Am. Journal Computer Science and Information Technology, 3 (2015): pp. 45-63. [24] Carter, A. L. "The directional analysis of bloodstain patterns theory and experimental validation." Canadian Society of Forensic Science Journal 34.4 (2001): pp. 173-189. [25] Brodbeck Silke, β€œIntroduction to Bloodstain Pattern Analysis”, .SIAK-Journal – Journal for Police Science and Practice, Volume 2, pp. 51-57, 2012