SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656
www.ijcat.com 296
Identity Recognition Using Edge Suppression Method
R.Ram kumar
Bharath University
Chennai, India
V.Sanjeevi
Bharath University
Chennai, India
K.Sivaraman
Bharath University
Chennai, India
Abstract: There are multiple crimes happening even in the presence of cctv cameras still we couldn’t able to find the identity due to
shadows in the image. In this work, we have used edge suppression method and affine transformation to recognize identity even under
severe shadow. We also used gradient field to calculate the position of light sources in the place. For classification of identity from the
databases we use k-nearest neighbor rule. Additionally we also were using this principal component analysis for feature extraction.
Classification can be done in real time environments by accessing authorized databases or also by standard databases.
Keywords: K-NN Classifier, Tensors, flash image, shadow removing, Feature extraction
1. INTRODUCTION
Face recognition is one of the applications for automatically
identifying and recognizing the face of an human by an
computer. This kind of image processing applications are used
in many ways, in this work face recognition system is used
not only recognizing face also taken upto his chest which
increases multiple reference points such as neck, shoulder and
more. The another important issue is shadow presence in the
image due to this there is a chance of error occurrence in
finding the correct person. So, to reduce the impact of shadow
on the image diagonally projecting sensors[2] are used this
suppresses the edges of the image. Here we also were
accounting the chromaticity[8] of the environment lighting.
Ramesh Raskar[1] had mentioned that the chromaticity of the
environment lightning will be approximately as same as the
chromaticity of the diffused light. And it is found that for
different magnitude in the chromaticity of differently exposed
regions has different rgb, hue and hsv color values[5].We
proposing that along with face recognition recognizing of
other identities also important because the identity database
like aadhar card are capturing images up to chest level not
only up to face. So it will be useful when using it with real
databases. As compared with thresholding we clear the
textures in the scene by approaching principled way. Here we
are not accounting any assumptions on the environment
lightning, mapping of exposure or reflection. The diagonally
projecting tensors helps us to remove those shadows by using
an highly exposed image as an reference called as flash
image.
2. EXISTING METHODOLOGY:
All images are a combination of primary colors like red, blue,
green. All the image processing process uses RGB images
which has more number of color components and it makes the
processing slower. In recovering the
illumination map, we make the usual assumption that the
scene texture edges do not coincide with the illumination
edges. But the foreground layer, edges of the foreground
object which exactly align with the background edges cannot
be recovered. And the existing systems has face recognition
only, which may fail in case of twins and people having
similar faces and also in usage of mask.
.
3. PROPOSED METHODOLOGY:
To predict the presence of light source the two pictures are
converted into YUV format which reduces the color
components for processing it into a gradient pictures with x
and y-axis components. That helps in finding the position of
light sources which in turn helps in removing shadows. Then
those diagonally projecting tensors are applied on the pictures
to analyze the vector and scalar values of two pictures(real
image and flash image) then affine transformation uses those
values to correct the pictures like rotating and aligning. Thus a
shadow free image is obtained as a result. This resulted
picture is used to search in databases. Here we are proposing a
id recognition instead of regular face recognition which uses
the principal component analysis to feature extract the face,
neck, shoulders from the images. By using the calculated
eigen vectors and values KNN classifier produce the result by
comparison.
Fig.1 Block diagram
4. GRADIENT COMPUTATIONS:
This computations are existing mathematical functions only.
This is used to obtain the gradient value in the image
environment. The gradient magnitude and direction are
encoded by computing. By [9]adding partial derivatives of X
and Y directions gradient vector is formed.
ΔI= (∂I/∂x, ∂I/∂y) …(1)
we could write this continuous function, I(x, y) as:
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656
www.ijcat.com 297
(∂I(x,y)/∂x) = limΔx→0 (I(x+Δx,y)-I(x,y))/Δx …(2)
While if it is an discrete case, only one pixel intervals can
be taken. Hence we can take the difference between pixel
before or one pixel after the I(x,y).By the usage of
correlation we can define the pixels after and before I(x,y)
symmetrically, and compute:
(∂I(x,y) /∂x) = ( I(x+1,y) - I(x-1,y)) /2 ...(3)
5. ARCHITECTURE DIAGRAM:
Fig.2 Architecture Diagram
6. AFFINE TRANSFORMATION ON
GRADIENT:
Let intensity image and denote each pixels
gradient vector at I. The Gσ smoothed structure tensor is
defined as
where ∗ denotes convolution and Kσ is a normalized 2D
Gaussian kernel of variance σ. The matrix Gσ can be
de-composed as
here the eigen-vectors v1,v2 are corresponding to the Eigen-
values λ1, λ2 respectively and λ2 ≤ λ1. The eigen-values and
eigen-vectors of Gσ give information about the local intensity
structures in the image[8]. For homogeneous regions, λ1 =
λ2= 0. If λ2= 0 and λ1 > 0, it signifies the presence of an
intensity edge. The eigen-vector v1 (corresponding to the
higher eigen-value λ1) corresponds to the direction of the
edge.
7. TENSORS:
Here we have used tensors to find out the difference between
the scalars and vectors of real image and flash image. These
tensors are idely used mathematical component to derivethe
scalar and vectors, actually it’san generalization of scalars
and vectors; a zero rank tensor is a scalar,and a first
ranktensor is a vector and a tensor also include linear map,
dotproduct and cross product.
Fig.3 (i) Obtained image (ii) Shadow free image
8. SELF PROJECTION TENSORS:
We removed edges from a single image by using this already
proven diagonally projecting tensors from the image itself.
The idea is to project the image gradient vector onto its own
orthogonal direction and hence the name self-projection
tensors. This analysis will lead us to our main idea of cross
projection tensors is to estimate these tensors from a second
image and apply them to suppress edges in the given image.
As Amit Agarwal [7] proposed the technique of gradient
projection to remove artifacts from flash image using a non-
flash real image. They project the flash image gradient onto
the direction of the ambient image gradient to remove
spurious edges from flash image due to glass reflections. They
use the idea that the direction of the image gradient remains
stable under illumination changes. We first show that taking a
projection can also be defined by an affine transformation of
the gradient field. The Eigen-vector v1 of the structure tensor
matrix G correspond to the Direction of the edge. Suppose by
an affine transformation of the gradient field. The Eigen
Vector v1 of the structure tensor matrix G correspond to the
direction of the edge. Suppose we define the self-projection
tensor D
self
as u1=v1 u 2=v2 ,µ1=0 µ2=1. It is
easy to see that an affine transformation of the image gradient
using D
self
will remove the local edge
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656
www.ijcat.com 298
Fig.4 YUV Image from RGB image
9.DIAGONALLY PROJECTING
TENSOR:
To remove the scene texture edges from an image by
transforming its gradient field using diagonally projecting
tensors obtained from a second image of the same scene. The
final image is obtained by a 2D integration. If A is also
homogeneous (λA1 = 0), set μ 1 =μ2 = 0. These results in If A
is also homogeneous (λA1
= 0), set μ1 =μ2 = 0. These results in
If A is not homogeneous (λA1 > 0), set μ1 = μ2 = 1
This result in and edges which are in A but not in B can be
retained. Else, if there is an edge in B (λB1 > 0),
remove that edge by setting μ1 = 0, μ2 =1.
Fig.5(i) shadow free image (ii)illuminated image
10.FEATURE EXTRACTION:
Feature extraction is one of the image processing processes
which can be used to extract the information from the image.
This information must be valuable to the later step of
identifying the subject with an acceptable error rate. This
process is proved to be efficient in computing time and usage
of memory. Again here we extracting more details rather than
the usual information extraction of faces. The optimized
output is obtained for the classification.
11. PRINCIPLE COMPONENT
ANALYSIS:
Again we are using the proven principle component analysis
which is widely used in all the sectors to analysis the form
from computer image processing to neural analysis due to its
extraction of confusing datasets using non-parametric method
which is an simpler one. And it is well known as most reliable
results from applied linear algebra. The Reason for using PCA
in this identity recognition is to express the 2-D facial image
into the large 1-D vector of pixels in the compact principal
components of the feature space. Sometimes it also helps us
in revealing hidden, simplified structure by reducing the
complex dataset into the lower dimensions.
12. CLASSIFICATION:
Classification is one of the data mining process of analyzing
and finding the similar things to group under some keyword.
Here we done the classification of the test images with the
images in the present database. For this, we go for the reliable
KNN classifier.
13. K-NN CLASSIFIER:
While looking for the algorithm to search the match in
database K-NN classifier seems to be the proven algorithm
especially in searching images, recognizing patterns and data
mining. K-NN algorithm uses the similarity measures to
classifies the matches in a database. A case is arranged by a
lion's share vote of its neighbors, with the case being allocated
to the class most normal amongst its K closest neighbors
measured by a separation capacity. On the off chance that K =
1, then the case is essentially allotted to the class of its closest
14. RESULTS:
We cleared shadows from the Real-environment (no-flash)
image A by using the image with flash. From the real image,
flash image was created using the separate photo editor tool
like lumia creative∇ studio. Using F and trans-form the
gradient field A the cross projection tensor Df. the shadow
removed image has less color artifacts and less illuminated
map when compared with the previous highly textured one.
Always there will be some difference in color tones due to the
environment lightning. Our edge suppression method requires
no color calibration or artifacts and when compared to the
result using gradient projection. while converting the image
into flash image there will be some variations in lighting and
this doesn’t provide any illumination mapping. The
illumination map obtained by our approach better represents
the diffuse ambient illumination. Even the white balance in
real and flash images is different but Our resulted image has
no color artifacts. We can proceed to classification process
after getting the shadow free image. Image will be given as a
query input and the matches are searched in the database. The
output is shown in figure 6.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656
www.ijcat.com 299
Fig.6 Output
15. CONCLUSION:
To remove shadow in a image, a tensor-based identity
recognition method is proposed the illuminations is
effectively reduced by edge suppression method. We
presented an approach for edge-suppressing operations on an
image. The light sources are found by applying the gradient
field effect. In the recognition phase, Principal component
analysis is used for feature extraction. The K-nearest-neighbor
rule is applied for classification. Experiments are carried out
upon standard databases and if access available can be done in
real-time too. The results reveal that the proposed method
achieves satisfactory recognition rates under varying
illumination conditions. We hope that it can be able to use in
verification and identity authentication processes etc because
of its easy handling.
16. REFERENCE:
[1] Ramesh Raskar, S.Nayar and Y. Li. Removing
photography artifacts using gradient projection and
flashexposure sampling. ACM Trans. Graph., 24(3):828–
835, 2005.
[2] Face Recognition under Severe Shadow Effects Using
Gradient Field Transformation Parisa Beham M *, Bala
Bhattachariar J.U, ISSN 2250-3153. International Journal of
Multimedia and Ubiquitous Engineering
[3] ClopiNet, 955 Creston Rd., Berkeley, CA 94708, USA.
isabelle@clopinet.com 2 IBM Research GmbH, Zurich
Research Laboratory, Saumerstrasse 4, CH-8803 Ruschlikon,
Switzerland. ¨ ael@zurich.ibm.com
[4]H. Barrow and J. Tenenbaum. Recovering intrinsic scene
characteristics from images. In Computer Vision Systems,
pages 3–26, 1978
[5] H.Chen, P.Belhumeur, and D. Jacobs. In search of
illumination invariants. In Proc. Conf. Computer Vision and
Pattern Recognition, pages 254–261, 2000.
[6] A.Elgammal, D.Harwood, and L. Davis. Non-parametric
model for background subtraction. In Proc. European Conf.
Computer Vision, pages 751–767, 2000.
[7] Edge Suppression by Gradient Field Transformation using
Cross-Projection Tensors by Amit Agrawal, Ramesh Raskar
and Rama Chellappa, 2008.
[8] Commentary paper on shadow removal in indoor scene by
Sofke.M, 2008
[9] G.Aubert and P. Kornprobst. Mathematical Problems in
Image Processing: Partial Differential Equations and the
Calculus of Variations, volume 147 of Applied Mathematical
Sciences. SpringerVerlag, 2002

More Related Content

What's hot

Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
face recognition based on PCA
face recognition based on PCAface recognition based on PCA
face recognition based on PCA@zenafaris91
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeySougata Das
 
Bidirectional bias correction for gradient-based shift estimation
Bidirectional bias correction for gradient-based shift estimationBidirectional bias correction for gradient-based shift estimation
Bidirectional bias correction for gradient-based shift estimationTuan Q. Pham
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an ObjectAnkur Tyagi
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Object recognition
Object recognitionObject recognition
Object recognitionsaniacorreya
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationMostafa G. M. Mostafa
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image FundamentalsA B Shinde
 
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...ijsrd.com
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisIOSR Journals
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 

What's hot (19)

Shadow Detection Using MatLAB
Shadow Detection Using MatLABShadow Detection Using MatLAB
Shadow Detection Using MatLAB
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
Ct31628631
Ct31628631Ct31628631
Ct31628631
 
face recognition based on PCA
face recognition based on PCAface recognition based on PCA
face recognition based on PCA
 
495Poster
495Poster495Poster
495Poster
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
Bidirectional bias correction for gradient-based shift estimation
Bidirectional bias correction for gradient-based shift estimationBidirectional bias correction for gradient-based shift estimation
Bidirectional bias correction for gradient-based shift estimation
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Object recognition
Object recognitionObject recognition
Object recognition
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 
20120140502012
2012014050201220120140502012
20120140502012
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
An Efficient Approach for Image Enhancement Based on Image Fusion with Retine...
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. pptImage segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
 

Viewers also liked

Prediction Model Using Web Usage Mining Techniques
Prediction Model Using Web Usage Mining TechniquesPrediction Model Using Web Usage Mining Techniques
Prediction Model Using Web Usage Mining TechniquesEditor IJCATR
 
Design and Analysis of Robotic Rover with Gripper Arm using Embedded C
Design and Analysis of Robotic Rover with Gripper Arm using Embedded CDesign and Analysis of Robotic Rover with Gripper Arm using Embedded C
Design and Analysis of Robotic Rover with Gripper Arm using Embedded CEditor IJCATR
 
The Critical Technological Factors OF E-Government in Kenya
The Critical Technological Factors OF E-Government in KenyaThe Critical Technological Factors OF E-Government in Kenya
The Critical Technological Factors OF E-Government in KenyaEditor IJCATR
 
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...Editor IJCATR
 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEfficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEditor IJCATR
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 
Reverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature ReviewReverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature ReviewEditor IJCATR
 
A Survey on Agriculture Monitoring Using Wireless Sensor Network
A Survey on Agriculture Monitoring Using Wireless Sensor NetworkA Survey on Agriculture Monitoring Using Wireless Sensor Network
A Survey on Agriculture Monitoring Using Wireless Sensor NetworkEditor IJCATR
 

Viewers also liked (16)

Ijsea04021001
Ijsea04021001Ijsea04021001
Ijsea04021001
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
Ijsea04031013
Ijsea04031013Ijsea04031013
Ijsea04031013
 
Prediction Model Using Web Usage Mining Techniques
Prediction Model Using Web Usage Mining TechniquesPrediction Model Using Web Usage Mining Techniques
Prediction Model Using Web Usage Mining Techniques
 
Design and Analysis of Robotic Rover with Gripper Arm using Embedded C
Design and Analysis of Robotic Rover with Gripper Arm using Embedded CDesign and Analysis of Robotic Rover with Gripper Arm using Embedded C
Design and Analysis of Robotic Rover with Gripper Arm using Embedded C
 
The Critical Technological Factors OF E-Government in Kenya
The Critical Technological Factors OF E-Government in KenyaThe Critical Technological Factors OF E-Government in Kenya
The Critical Technological Factors OF E-Government in Kenya
 
Ijcatr04041021
Ijcatr04041021Ijcatr04041021
Ijcatr04041021
 
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEfficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent Environment
 
Ijcatr04051004
Ijcatr04051004Ijcatr04051004
Ijcatr04051004
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
Ijcatr04051013
Ijcatr04051013Ijcatr04051013
Ijcatr04051013
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
Ijcatr04051006
Ijcatr04051006Ijcatr04051006
Ijcatr04051006
 
Reverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature ReviewReverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature Review
 
A Survey on Agriculture Monitoring Using Wireless Sensor Network
A Survey on Agriculture Monitoring Using Wireless Sensor NetworkA Survey on Agriculture Monitoring Using Wireless Sensor Network
A Survey on Agriculture Monitoring Using Wireless Sensor Network
 

Similar to Ijcatr04041016

F044045052
F044045052F044045052
F044045052inventy
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
 
QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing Hasini Weerathunge
 
State of art pde based ip to bt vijayakrishna rowthu
State of art pde based ip to bt  vijayakrishna rowthuState of art pde based ip to bt  vijayakrishna rowthu
State of art pde based ip to bt vijayakrishna rowthuvijayakrishna rowthu
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...ijcsa
 
Estrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitaleEstrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitalefrancescapadoin
 
Image processing
Image processingImage processing
Image processingkamal330
 
Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...Editor IJCATR
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator cscpconf
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devicescsandit
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Editor IJARCET
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Editor IJARCET
 
Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...
Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...
Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...ijsrd.com
 

Similar to Ijcatr04041016 (20)

Lm342080283
Lm342080283Lm342080283
Lm342080283
 
F044045052
F044045052F044045052
F044045052
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
I010634450
I010634450I010634450
I010634450
 
QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing QR code decoding and Image Preprocessing
QR code decoding and Image Preprocessing
 
State of art pde based ip to bt vijayakrishna rowthu
State of art pde based ip to bt  vijayakrishna rowthuState of art pde based ip to bt  vijayakrishna rowthu
State of art pde based ip to bt vijayakrishna rowthu
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
SIFT
SIFTSIFT
SIFT
 
Seminarpaper
SeminarpaperSeminarpaper
Seminarpaper
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
 
Estrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitaleEstrazione automatica delle linee in un'immagine digitale
Estrazione automatica delle linee in un'immagine digitale
 
mini prjt
mini prjtmini prjt
mini prjt
 
Image processing
Image processingImage processing
Image processing
 
Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...
 
I0154957
I0154957I0154957
I0154957
 
Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator Object Shape Representation by Kernel Density Feature Points Estimator
Object Shape Representation by Kernel Density Feature Points Estimator
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322
 
Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322Ijarcet vol-2-issue-7-2319-2322
Ijarcet vol-2-issue-7-2319-2322
 
Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...
Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...
Depth of Field Image Segmentation Using Saliency Map and Energy Mapping Techn...
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Ijcatr04041016

  • 1. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656 www.ijcat.com 296 Identity Recognition Using Edge Suppression Method R.Ram kumar Bharath University Chennai, India V.Sanjeevi Bharath University Chennai, India K.Sivaraman Bharath University Chennai, India Abstract: There are multiple crimes happening even in the presence of cctv cameras still we couldn’t able to find the identity due to shadows in the image. In this work, we have used edge suppression method and affine transformation to recognize identity even under severe shadow. We also used gradient field to calculate the position of light sources in the place. For classification of identity from the databases we use k-nearest neighbor rule. Additionally we also were using this principal component analysis for feature extraction. Classification can be done in real time environments by accessing authorized databases or also by standard databases. Keywords: K-NN Classifier, Tensors, flash image, shadow removing, Feature extraction 1. INTRODUCTION Face recognition is one of the applications for automatically identifying and recognizing the face of an human by an computer. This kind of image processing applications are used in many ways, in this work face recognition system is used not only recognizing face also taken upto his chest which increases multiple reference points such as neck, shoulder and more. The another important issue is shadow presence in the image due to this there is a chance of error occurrence in finding the correct person. So, to reduce the impact of shadow on the image diagonally projecting sensors[2] are used this suppresses the edges of the image. Here we also were accounting the chromaticity[8] of the environment lighting. Ramesh Raskar[1] had mentioned that the chromaticity of the environment lightning will be approximately as same as the chromaticity of the diffused light. And it is found that for different magnitude in the chromaticity of differently exposed regions has different rgb, hue and hsv color values[5].We proposing that along with face recognition recognizing of other identities also important because the identity database like aadhar card are capturing images up to chest level not only up to face. So it will be useful when using it with real databases. As compared with thresholding we clear the textures in the scene by approaching principled way. Here we are not accounting any assumptions on the environment lightning, mapping of exposure or reflection. The diagonally projecting tensors helps us to remove those shadows by using an highly exposed image as an reference called as flash image. 2. EXISTING METHODOLOGY: All images are a combination of primary colors like red, blue, green. All the image processing process uses RGB images which has more number of color components and it makes the processing slower. In recovering the illumination map, we make the usual assumption that the scene texture edges do not coincide with the illumination edges. But the foreground layer, edges of the foreground object which exactly align with the background edges cannot be recovered. And the existing systems has face recognition only, which may fail in case of twins and people having similar faces and also in usage of mask. . 3. PROPOSED METHODOLOGY: To predict the presence of light source the two pictures are converted into YUV format which reduces the color components for processing it into a gradient pictures with x and y-axis components. That helps in finding the position of light sources which in turn helps in removing shadows. Then those diagonally projecting tensors are applied on the pictures to analyze the vector and scalar values of two pictures(real image and flash image) then affine transformation uses those values to correct the pictures like rotating and aligning. Thus a shadow free image is obtained as a result. This resulted picture is used to search in databases. Here we are proposing a id recognition instead of regular face recognition which uses the principal component analysis to feature extract the face, neck, shoulders from the images. By using the calculated eigen vectors and values KNN classifier produce the result by comparison. Fig.1 Block diagram 4. GRADIENT COMPUTATIONS: This computations are existing mathematical functions only. This is used to obtain the gradient value in the image environment. The gradient magnitude and direction are encoded by computing. By [9]adding partial derivatives of X and Y directions gradient vector is formed. ΔI= (∂I/∂x, ∂I/∂y) …(1) we could write this continuous function, I(x, y) as:
  • 2. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656 www.ijcat.com 297 (∂I(x,y)/∂x) = limΔx→0 (I(x+Δx,y)-I(x,y))/Δx …(2) While if it is an discrete case, only one pixel intervals can be taken. Hence we can take the difference between pixel before or one pixel after the I(x,y).By the usage of correlation we can define the pixels after and before I(x,y) symmetrically, and compute: (∂I(x,y) /∂x) = ( I(x+1,y) - I(x-1,y)) /2 ...(3) 5. ARCHITECTURE DIAGRAM: Fig.2 Architecture Diagram 6. AFFINE TRANSFORMATION ON GRADIENT: Let intensity image and denote each pixels gradient vector at I. The Gσ smoothed structure tensor is defined as where ∗ denotes convolution and Kσ is a normalized 2D Gaussian kernel of variance σ. The matrix Gσ can be de-composed as here the eigen-vectors v1,v2 are corresponding to the Eigen- values λ1, λ2 respectively and λ2 ≤ λ1. The eigen-values and eigen-vectors of Gσ give information about the local intensity structures in the image[8]. For homogeneous regions, λ1 = λ2= 0. If λ2= 0 and λ1 > 0, it signifies the presence of an intensity edge. The eigen-vector v1 (corresponding to the higher eigen-value λ1) corresponds to the direction of the edge. 7. TENSORS: Here we have used tensors to find out the difference between the scalars and vectors of real image and flash image. These tensors are idely used mathematical component to derivethe scalar and vectors, actually it’san generalization of scalars and vectors; a zero rank tensor is a scalar,and a first ranktensor is a vector and a tensor also include linear map, dotproduct and cross product. Fig.3 (i) Obtained image (ii) Shadow free image 8. SELF PROJECTION TENSORS: We removed edges from a single image by using this already proven diagonally projecting tensors from the image itself. The idea is to project the image gradient vector onto its own orthogonal direction and hence the name self-projection tensors. This analysis will lead us to our main idea of cross projection tensors is to estimate these tensors from a second image and apply them to suppress edges in the given image. As Amit Agarwal [7] proposed the technique of gradient projection to remove artifacts from flash image using a non- flash real image. They project the flash image gradient onto the direction of the ambient image gradient to remove spurious edges from flash image due to glass reflections. They use the idea that the direction of the image gradient remains stable under illumination changes. We first show that taking a projection can also be defined by an affine transformation of the gradient field. The Eigen-vector v1 of the structure tensor matrix G correspond to the Direction of the edge. Suppose by an affine transformation of the gradient field. The Eigen Vector v1 of the structure tensor matrix G correspond to the direction of the edge. Suppose we define the self-projection tensor D self as u1=v1 u 2=v2 ,µ1=0 µ2=1. It is easy to see that an affine transformation of the image gradient using D self will remove the local edge
  • 3. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656 www.ijcat.com 298 Fig.4 YUV Image from RGB image 9.DIAGONALLY PROJECTING TENSOR: To remove the scene texture edges from an image by transforming its gradient field using diagonally projecting tensors obtained from a second image of the same scene. The final image is obtained by a 2D integration. If A is also homogeneous (λA1 = 0), set μ 1 =μ2 = 0. These results in If A is also homogeneous (λA1 = 0), set μ1 =μ2 = 0. These results in If A is not homogeneous (λA1 > 0), set μ1 = μ2 = 1 This result in and edges which are in A but not in B can be retained. Else, if there is an edge in B (λB1 > 0), remove that edge by setting μ1 = 0, μ2 =1. Fig.5(i) shadow free image (ii)illuminated image 10.FEATURE EXTRACTION: Feature extraction is one of the image processing processes which can be used to extract the information from the image. This information must be valuable to the later step of identifying the subject with an acceptable error rate. This process is proved to be efficient in computing time and usage of memory. Again here we extracting more details rather than the usual information extraction of faces. The optimized output is obtained for the classification. 11. PRINCIPLE COMPONENT ANALYSIS: Again we are using the proven principle component analysis which is widely used in all the sectors to analysis the form from computer image processing to neural analysis due to its extraction of confusing datasets using non-parametric method which is an simpler one. And it is well known as most reliable results from applied linear algebra. The Reason for using PCA in this identity recognition is to express the 2-D facial image into the large 1-D vector of pixels in the compact principal components of the feature space. Sometimes it also helps us in revealing hidden, simplified structure by reducing the complex dataset into the lower dimensions. 12. CLASSIFICATION: Classification is one of the data mining process of analyzing and finding the similar things to group under some keyword. Here we done the classification of the test images with the images in the present database. For this, we go for the reliable KNN classifier. 13. K-NN CLASSIFIER: While looking for the algorithm to search the match in database K-NN classifier seems to be the proven algorithm especially in searching images, recognizing patterns and data mining. K-NN algorithm uses the similarity measures to classifies the matches in a database. A case is arranged by a lion's share vote of its neighbors, with the case being allocated to the class most normal amongst its K closest neighbors measured by a separation capacity. On the off chance that K = 1, then the case is essentially allotted to the class of its closest 14. RESULTS: We cleared shadows from the Real-environment (no-flash) image A by using the image with flash. From the real image, flash image was created using the separate photo editor tool like lumia creative∇ studio. Using F and trans-form the gradient field A the cross projection tensor Df. the shadow removed image has less color artifacts and less illuminated map when compared with the previous highly textured one. Always there will be some difference in color tones due to the environment lightning. Our edge suppression method requires no color calibration or artifacts and when compared to the result using gradient projection. while converting the image into flash image there will be some variations in lighting and this doesn’t provide any illumination mapping. The illumination map obtained by our approach better represents the diffuse ambient illumination. Even the white balance in real and flash images is different but Our resulted image has no color artifacts. We can proceed to classification process after getting the shadow free image. Image will be given as a query input and the matches are searched in the database. The output is shown in figure 6.
  • 4. International Journal of Computer Applications Technology and Research Volume 4– Issue 4, 296 - 299, 2015, ISSN:- 2319–8656 www.ijcat.com 299 Fig.6 Output 15. CONCLUSION: To remove shadow in a image, a tensor-based identity recognition method is proposed the illuminations is effectively reduced by edge suppression method. We presented an approach for edge-suppressing operations on an image. The light sources are found by applying the gradient field effect. In the recognition phase, Principal component analysis is used for feature extraction. The K-nearest-neighbor rule is applied for classification. Experiments are carried out upon standard databases and if access available can be done in real-time too. The results reveal that the proposed method achieves satisfactory recognition rates under varying illumination conditions. We hope that it can be able to use in verification and identity authentication processes etc because of its easy handling. 16. REFERENCE: [1] Ramesh Raskar, S.Nayar and Y. Li. Removing photography artifacts using gradient projection and flashexposure sampling. ACM Trans. Graph., 24(3):828– 835, 2005. [2] Face Recognition under Severe Shadow Effects Using Gradient Field Transformation Parisa Beham M *, Bala Bhattachariar J.U, ISSN 2250-3153. International Journal of Multimedia and Ubiquitous Engineering [3] ClopiNet, 955 Creston Rd., Berkeley, CA 94708, USA. isabelle@clopinet.com 2 IBM Research GmbH, Zurich Research Laboratory, Saumerstrasse 4, CH-8803 Ruschlikon, Switzerland. ¨ ael@zurich.ibm.com [4]H. Barrow and J. Tenenbaum. Recovering intrinsic scene characteristics from images. In Computer Vision Systems, pages 3–26, 1978 [5] H.Chen, P.Belhumeur, and D. Jacobs. In search of illumination invariants. In Proc. Conf. Computer Vision and Pattern Recognition, pages 254–261, 2000. [6] A.Elgammal, D.Harwood, and L. Davis. Non-parametric model for background subtraction. In Proc. European Conf. Computer Vision, pages 751–767, 2000. [7] Edge Suppression by Gradient Field Transformation using Cross-Projection Tensors by Amit Agrawal, Ramesh Raskar and Rama Chellappa, 2008. [8] Commentary paper on shadow removal in indoor scene by Sofke.M, 2008 [9] G.Aubert and P. Kornprobst. Mathematical Problems in Image Processing: Partial Differential Equations and the Calculus of Variations, volume 147 of Applied Mathematical Sciences. SpringerVerlag, 2002