SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645
www.ijmer.com 1123 | Page
Mahesh G. Huddar
Lecturer, Dept. of CSE,Hirasugar Institute of Technology, Nidasoshi, India
Abstract:Fractal Image Compression is a lossy compression technique that has been developed in the early 1990s. Fractal
image compression explores the self-similarity property of a natural image and utilizes the partitioned iterated function
system (PIFS) to encode it. The fractal image compression problem had three major requirements: speeding up the
compression algorithm, improving image quality and increasing compression ratio. So far, several methods have been
proposed in order to speed-up fractal image compression. The time is essentially spent on the search of the similar domain
block. This paper aims to present a method that uses Genetic algorithms to speed up computation time in fractal image
compression with acceptable image quality and high compression rate. These improvements are obtained by encoding all
regions in the image with different size blocks.
Keywords:Fractal image compression; genetic algorithm.
I. Introduction
Deterministic Fractals have the intrinsic property of having extremely high visual complexity while being very low
in information content, as they can be described and generated by simple recursive deterministic algorithms. They are
mathematical objects with a high degree of redundancy in the sense that they are recursively made of transformed copies of
either themselves or parts of themselves.Fractal image compression (FIC) was introduced by Bernesly [1] and Jacquin [2].
Since then, many researches have improved the original approach in various ways [3]. The image compression problem puts
forward three major requirements: speeding up the compression algorithm, improving image qualityafter
compression/decompression or increasing compression ratio. The method based on the theory of partitioned Iterated
Function Systems (PIFS) [3] has received a lot of attention in the last ten years. To encode an image according to the self-
similarity property, each block must find the most similar domain block in a large domain pool.
In fractal image compression, the original image is partitioned into range blocks [8] and for each range block, a
suitable domain block [2] D is searched, so it exists a transformation,
T: Dom(I) → Ranges(I);
T must guaranty ∀i, ∃j /T (Dj) ≈Ri
A transformation is associated to each Ri, it codes the Dj coordinates and parameters of the transformation.
The associated parameters for each Ri are: the isometric flip Rotation π/2, π,3π/2, the horizontal flip, the vertical
flip, the transposed of Dom(I), the rotation π of the transposedof Dom(I), the luminance and contrast.
A. General Structure of FIC Algorithm
A general structure for most proposed fractal compression algorithms, for both coding and decoding images can be given by:
Step 1: Encoding of an Image I
• Set t = some tolerance level
• Partitioning I into uncovered ranges Ri’s.
• For each uncovered range Rido
▪ Search over all Di's in the pool domains:
▪ If (∃wi such thatd(Ri,wi(Di))< t)
◦ Report wiand compress it using adaptivearithmeticCoding (or any other lossless compression
scheme.)
Else
▪ Split Ri into sub-ranges and add them to the list of ranges to be covered.
◦ If the range can no longer be partitioned, return the minimum d(Ri, wi(Di)).Remove Ri from the uncovered list.
Step 2: Decoding of a map w = ∪wi
• Choose any image I0, and then compute the imagewn(I0) = ∪wni(I0). When n is big enough, wn (I0) ≈ Iw ≈ I.
The major problem of this method is time consuming compared with others methods of image compression.In this
paper, a new Genetic Algorithm forimage compression is proposed, that speed up this method when findinga LIFS [6] whose
attractor is close to a given image.
II. Literature Survey
A fully automated fractal-based image compression technique of digital monochrome image was first proposed by
Jacquin [2]. The encoding process consists of approximating the small image blocks, called range blocks, from the larger
Genetic Algorithm based Fractal Image Compression
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645
www.ijmer.com 1124 | Page
blocks, called domain blocks, of the image, through some operations. In the encoding process, separate transformations for
each range block are obtained. The scheme also uses the theory of vector quantization [4] to classify the blocks. The set
consisting of these transformations, when iterated upon any initial image, will produce a fixed point (attractor) that
approximates the target image. This scheme can be viewed as partitioned iterative function system (PIFS). One such scheme,
using PIFS, to store fewer number of bits (or to increase the compression ratio) was proposed by Fisher et al. [7].
III. Fractal Image Compression Using Genetic Algorithm
There are many algorithms of optimization used for different domains. I have chosen Genetic Algorithm [7] [8]
[9]to accelerate our fractal image compression algorithm.For each range domain Ri, the set of all possible domain blocks is
genetically browsed until we find an appropriate solution. The genetic algorithm search space parameters are the domain
block coordinates and the isometric flip.
A. Chromosome Attributes
A chromosome is constituted by 5 genes, from which only 3 genes are submitted to genetic modification, the two
others are computed by the RMS equation.
 Xdom,Ydom, flip: which are optimised by genetic search?
 Contrast O, and scaling S: which are computed directly by RMS equation.
Xdom Ydom Flip Oopt Sopt
Figure 1 Chromosome Representation
B. Genetic Operators
The crossover and mutation operators ensure the production of offspring. These genetic operators must be defined
according to the chromosome specification. With these basic components, a Genetic Algorithm works as follows: The first
procedure is to generate the first population represented with string codification (Chromosome) that represents possible
solution to the problem. Each individual is evaluated, and according to its fitness, an associated probability to be selected for
reproduction is assigned.
(1) Crossover Operator
The crossover operator combines two individuals in the current population, to produce two offspring individuals
included in the new generation. The main role of this operator is to create good new solutions based on the characteristics of
their parents. To perform this operation, individuals from current population are chosen randomly and proportionally to their
fitness value. This operator with a probability value fixed as a parameter for the algorithm. Experimental results have shown
that a value of 0.7 is good to ensure quick convergence of the algorithm. The result coordinates for the offspring individuals
are obtained by a linear combination of the parents coordinates. A random number 'a' is generated in the interval [0, 1], then
the new coordinates are calculated according to the following formula:
For the first offspring
Xdom=a* Xdom1+(1-a)* Xdom2
Ydom=a* Ydom1 +(1-a)* Ydom2
For the second offspring
Xdom=(1-a)* Xdom1+(1-a)* Xdom2
Ydom=(1-a)* Ydom1+(1-a)* Ydom2
This crossover pattern is very efficient. It allows to explore all the image area if the two parents are in separated
regions, and to explore the nearest neighbourhood if they are in the same region. Figure 2 illustrates the described crossover
pattern.
Figure 2Crossover Operator Pattern
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645
www.ijmer.com 1125 | Page
(2) Mutation operator
Mutation operator is used in all implementations of genetic algorithms to introduce diversity in each population.
Mutation is applied to individuals by changing pieces of their representations. These individuals are randomly selected
according to their fitness value. At each position in the individual, we decide randomly, using a small mutation probability,
whether the gene at this position is to be changed. This genetic operator allows the algorithm to explore new areas of the
search space, and find new possible optimal solution. Here mutation operator is applied to some selected IFSs from the
current population, one of the 3 genes Xdom, Ydom and flip is selected randomly, and changed with a random generated value.
Figure 3 shows the general pattern of the mutation operator in our algorithm.
Fig. 3 Mutation Operator Pattern
C. Selection Process
To avoid the premature convergence effect, linear scaling is applied to each individual fitness then, the Roulette
wheel method is used as a selection process.
D. Termination Criteria
Any genetic algorithm must find the optimal solution for a given problem in a finite number of steps. Two criteria can
cause the termination of the algorithm when applied to a given range block:
• An acceptable value of fitness for the best in individual in the population is reached.
• A maximum predefined count of generations is reached.
This maximum count is a predefined parameter of the algorithm; it was determined experimentally and fixed to 20.
E. Parameters of the Algorithm
The set of parameters of genetic control is given by:
(1) Population size: specify the number of individuals in each generated population (constant during all steps);
(2) Crossover rate: specify the probability used to select individuals submitted to crossover operator;
(3) Mutation rate: specify the probability used to select individuals submitted to mutation operator;
(4) Maximum generations: specify the maximum number of generations to evaluate before assuming that a particular run
has converged prematurely, and should be aborted.
F. The Fitness Function
In the case of IFS, the measure of quality for a given transformation is given by the RMS error between the coded
range block, and the domain block determined by the transformation coordinates Xdom and Ydom, and transformed with
corresponding luminance and contrast values. This error is calculated using the root mean square equation. The fitness
function is defined by the value of this error, which is inversely proportional to the efficiency of the corresponding
individual.
G.The Genetic Fractal Image Compression Algorithm
Based on all these elements, the geneticcompression algorithm operate on an input image to the following general steps:
(Input I: NxNgrey scale image [Image would be square]
(Output W: Coded IFS);
(Region Size) = 16;
(Fixed Error) = X * (Region Size)/4;
Decompose the input image into (Region Size) blocks;
While Exist (Regions not coded)
-Scale the Domain Blocks;
-Generate a random population of chromosomes;
While Exist (Regions not coded) and (Last generation not reached)
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645
www.ijmer.com 1126 | Page
-Compute fitness for all regions;
-When optimal domain block found write obtained transformation parameters to the output W;
-Generate new population {Apply Crossover and Mutation operators};
Wend
(RegionSize) = (RegionSize)/2;
(FixedError) = X * (RegionSize)/4;
If Regions size > 4
Decompose the rest region not coded into (Range Size) blocks;
Else
(FixedError) = (Fixed Error) +X;
Code all rest Regions;
IEnd
Wend
IV. Experimental Results
A. Std. Algorithm with Quad tree Partitioning
Image RMS Limit Execution Time Quality (dB) Compression Ratio
Lena 5.0 1:11:10 32.01 11.48 :1
Boat 5.0 1:27: 04 29.56 8.88:1
Peppers 5.0 1:05:17 33.07 24.56:1
Barb 5.0 1:22:15 33.07 10.85:1
Table 1. Result for different images with Quadtree blocks decomposition
B. Standard algorithm improved with Classification (Y. Fisher approach)
Image RMS Limit Execution Time Quality (dB) Compression Ratio
Lena 5.0 0:02:55 30.05 9.73 :1
Boat 5.0 0:03:22 25.86 7.9 :1
Peppers 5.0 0:02:45 29.36 10.16 :1
Barb 5.0 0:04:12 21.07 8.62:1
Table 2. Results for different images with Quad tree blocks decomposition using Fisher’s classification
C. Genetic Algorithm
The genetic compression algorithm was used with Quad tree partitioning. Different parameters were used for each
test, and the obtained results are given in both table forms and graphical forms. Examples of reconstructed images are also
given to illustrate reconstruction quality.
The following table shows different performances with different value of RMS error limit using fixed value for
other parameters: population size=100, mutation rate=0.1, crossover rate=0.7 and maximum generations count =20.
(1)Effect of parameters controlling fractal compression
We can see from the Graphs 1 and 2, that image quality is inversely proportionate to RMS error limit. And
compression rate is proportionate to that value. The compromise value of this parameter is 5.0 and it gives very acceptable
performances.
RMS Limit Execution Time Quality (dB) Ratio Ranges count
0.0 2 m 44 s 35.66 4.29:1 4096
2.0 1 m 56 s 35.03 6.35:1 2770
4.0 49 s 34.89 9.28:1 2023
5.0 43 s 34.80 9.82:1 1792
8.0 36 s 34.50 9.95:1 1768
10.0 33 s 30.50 10.05:1 1750
15.0 21 s 22.33 13.66:1 1288
20.0 14 s 19.36 19.34:1 910
25.0 13 s 19.01 26.25:1 670
Table 3. Different compression results of Lena image while applying different values ofRMS error limit
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645
www.ijmer.com 1127 | Page
Graph 1 Lena image quality variation according to RMS limit values
Graph 2 Lena image compression rate variation according to RMS limit values
(2) Effect of parameters controlling genetic evolution
Population Size Execution Time Quality (dB) Ratio Ranges count
5 9 s 29.62 8.30:1 2119
10 11 s 29.98 8.35:1 2107
20 14 s 30.21 8.72:1 2017
50 23 s 32.11 9.36:1 1879
100 44 s 32.23 9.83:1 1789
250 2 m 24 s 33.74 10.35:1 1699
500 7 m 4 s 34.56 10.83:1 1624
1000 23m 4 s 35.12 10.97:1 1603
Table 4 Different compression results of Lena image while applying different values of population size
Graph3 Lena image compression time variation according to population size values
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645
www.ijmer.com 1128 | Page
Graph 4 Lena image quality variation according to population size values
V. Conclusion
It is clear that the best image quality is always obtained using the standard schema, but its computation time makes
it unpractical. So we must accept less quality in favour of quick compression. The main goal was to accelerate standard
compression schema, without greatly decreasing both image quality and compression ratio. Furthermore this work
demonstrates the genetic algorithms ability to solve complex problems.
References
[1] M. Barnsley and L. Hurt,”Fractal Image Compression”, Peters, Wellesley, 1993
[2] A. E. Jaquin”Image coding based on a fractal theory of iterated contractive image transformations”, IEEE Trans. on image
Processing. 1, PP, 18-30, 1992.
[3] B.E. Wohlberg and G. de Jager,”A review of the fractal image coding literature”, IEEE Trans. on image Processing. 8(12), PP, 1716-
1729, 1999.
[4] VeenadeviS.V. And A.G.Ananth”Fractal Image Compression with Quadtrees”, Signal & Image Processing: An International Journal
(SIPIJ) Vol.3, No.2, April 2012.
[5] M.F. Barnsley and S. Demko. Iterated function systems and the global construction of fractals. In Proceedings of the Royal Society
of London A399, pages 243 275, 1985.
[6] Arnaud E. Jacquin, “Fractal Image Coding: A Review”, MEMBER, IEEE
[7] Y. Fisher, E. W. Jacbos, and R. D. Boss, “Fractal image compression using iterated transforms,” in Image and Text Compression, J.
A. Storer, Ed. Boston, MA: Kluwer, 1992, pp. 36–61.
[8] Y. Chakrapani and K. SoundaraRajan, “GENETIC Algorithm Applied To Fractal Image Compression”, ARPN Journal of
Engineering and Applied Sciences, VOL. 4, NO. 1, FEBRUARY 2009
[9] S. K. Pal, D. Bhandari, and M. K. Kundu, “Genetic algorithms for optimal image enhancement,” Pattern Recognit. Lett, vol. 15, pp.
261–271, 1994.
[10] S. Forrest, Ed., Proc. 5th Int. Conf. Genetic Algorithms, San Mateo, CA, July 1993.

More Related Content

What's hot

Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...
Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...
Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...IJERA Editor
 
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...ijaia
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIJMER
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space IJEEE
 
Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...
Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...
Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...Editor IJMTER
 
Hand gesture recognition using discrete wavelet transform and hidden Markov m...
Hand gesture recognition using discrete wavelet transform and hidden Markov m...Hand gesture recognition using discrete wavelet transform and hidden Markov m...
Hand gesture recognition using discrete wavelet transform and hidden Markov m...TELKOMNIKA JOURNAL
 
6. 7772 8117-1-pb
6. 7772 8117-1-pb6. 7772 8117-1-pb
6. 7772 8117-1-pbIAESIJEECS
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...eSAT Publishing House
 
HDRF: Stream-Based Partitioning for Power-Law Graphs
HDRF: Stream-Based Partitioning for Power-Law GraphsHDRF: Stream-Based Partitioning for Power-Law Graphs
HDRF: Stream-Based Partitioning for Power-Law GraphsFabio Petroni, PhD
 
Modified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformModified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformIJERA Editor
 
08 cie552 image_segmentation
08 cie552 image_segmentation08 cie552 image_segmentation
08 cie552 image_segmentationElsayed Hemayed
 
Scaling Multinomial Logistic Regression via Hybrid Parallelism
Scaling Multinomial Logistic Regression via Hybrid ParallelismScaling Multinomial Logistic Regression via Hybrid Parallelism
Scaling Multinomial Logistic Regression via Hybrid ParallelismParameswaran Raman
 
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...IOSR Journals
 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingIAEME Publication
 

What's hot (18)

Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...
Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...
Comparision of Clustering Algorithms usingNeural Network Classifier for Satel...
 
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
E0212730
E0212730E0212730
E0212730
 
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...
Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...
Computer aided classification of Bascal cell carcinoma using adaptive Neuro-f...
 
Hand gesture recognition using discrete wavelet transform and hidden Markov m...
Hand gesture recognition using discrete wavelet transform and hidden Markov m...Hand gesture recognition using discrete wavelet transform and hidden Markov m...
Hand gesture recognition using discrete wavelet transform and hidden Markov m...
 
6. 7772 8117-1-pb
6. 7772 8117-1-pb6. 7772 8117-1-pb
6. 7772 8117-1-pb
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
 
HDRF: Stream-Based Partitioning for Power-Law Graphs
HDRF: Stream-Based Partitioning for Power-Law GraphsHDRF: Stream-Based Partitioning for Power-Law Graphs
HDRF: Stream-Based Partitioning for Power-Law Graphs
 
Modified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformModified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transform
 
08 cie552 image_segmentation
08 cie552 image_segmentation08 cie552 image_segmentation
08 cie552 image_segmentation
 
Scaling Multinomial Logistic Regression via Hybrid Parallelism
Scaling Multinomial Logistic Regression via Hybrid ParallelismScaling Multinomial Logistic Regression via Hybrid Parallelism
Scaling Multinomial Logistic Regression via Hybrid Parallelism
 
Clustering lect
Clustering lectClustering lect
Clustering lect
 
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matching
 

Viewers also liked

Bc2641334137
Bc2641334137Bc2641334137
Bc2641334137IJMER
 
το δημοτικο τραγουδι
το δημοτικο τραγουδιτο δημοτικο τραγουδι
το δημοτικο τραγουδιPopi Kaza
 
Ay3313861388
Ay3313861388Ay3313861388
Ay3313861388IJMER
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
 
Dl3211461149
Dl3211461149Dl3211461149
Dl3211461149IJMER
 
Enhanced Methodology for supporting approximate string search in Geospatial ...
Enhanced Methodology for supporting approximate string search  in Geospatial ...Enhanced Methodology for supporting approximate string search  in Geospatial ...
Enhanced Methodology for supporting approximate string search in Geospatial ...IJMER
 
Review on Digital Elevation Model
Review on Digital Elevation ModelReview on Digital Elevation Model
Review on Digital Elevation ModelIJMER
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryIJMER
 
G04013845
G04013845G04013845
G04013845IJMER
 
Industrial Microcontroller Based Neural Network Controlled Autonomous Vehicle
Industrial Microcontroller Based Neural Network Controlled  Autonomous VehicleIndustrial Microcontroller Based Neural Network Controlled  Autonomous Vehicle
Industrial Microcontroller Based Neural Network Controlled Autonomous VehicleIJMER
 
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard  Viterbi DecodingBER Performance for Convalutional Code with Soft & Hard  Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard Viterbi DecodingIJMER
 
DC Motor Fed with Double Input Z-Source DC-DC Converter
DC Motor Fed with Double Input Z-Source DC-DC ConverterDC Motor Fed with Double Input Z-Source DC-DC Converter
DC Motor Fed with Double Input Z-Source DC-DC ConverterIJMER
 
Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622IJMER
 
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...IJMER
 
Dynamic Organization of User Historical Queries
Dynamic Organization of User Historical QueriesDynamic Organization of User Historical Queries
Dynamic Organization of User Historical QueriesIJMER
 
E04012533
E04012533E04012533
E04012533IJMER
 

Viewers also liked (20)

Bc2641334137
Bc2641334137Bc2641334137
Bc2641334137
 
Smiling fish
Smiling fishSmiling fish
Smiling fish
 
το δημοτικο τραγουδι
το δημοτικο τραγουδιτο δημοτικο τραγουδι
το δημοτικο τραγουδι
 
Ay3313861388
Ay3313861388Ay3313861388
Ay3313861388
 
Secure File Sharing In Cloud Using Encryption with Digital Signature
Secure File Sharing In Cloud Using Encryption with Digital  Signature Secure File Sharing In Cloud Using Encryption with Digital  Signature
Secure File Sharing In Cloud Using Encryption with Digital Signature
 
Dl3211461149
Dl3211461149Dl3211461149
Dl3211461149
 
Enhanced Methodology for supporting approximate string search in Geospatial ...
Enhanced Methodology for supporting approximate string search  in Geospatial ...Enhanced Methodology for supporting approximate string search  in Geospatial ...
Enhanced Methodology for supporting approximate string search in Geospatial ...
 
Startup Oasis
Startup OasisStartup Oasis
Startup Oasis
 
Review on Digital Elevation Model
Review on Digital Elevation ModelReview on Digital Elevation Model
Review on Digital Elevation Model
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industry
 
G04013845
G04013845G04013845
G04013845
 
Eleni
EleniEleni
Eleni
 
Industrial Microcontroller Based Neural Network Controlled Autonomous Vehicle
Industrial Microcontroller Based Neural Network Controlled  Autonomous VehicleIndustrial Microcontroller Based Neural Network Controlled  Autonomous Vehicle
Industrial Microcontroller Based Neural Network Controlled Autonomous Vehicle
 
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard  Viterbi DecodingBER Performance for Convalutional Code with Soft & Hard  Viterbi Decoding
BER Performance for Convalutional Code with Soft & Hard Viterbi Decoding
 
DC Motor Fed with Double Input Z-Source DC-DC Converter
DC Motor Fed with Double Input Z-Source DC-DC ConverterDC Motor Fed with Double Input Z-Source DC-DC Converter
DC Motor Fed with Double Input Z-Source DC-DC Converter
 
Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622
 
Water damage NYC
Water damage NYCWater damage NYC
Water damage NYC
 
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...
Online Bus Arrival Time Prediction Using Hybrid Neural Network and Kalman fil...
 
Dynamic Organization of User Historical Queries
Dynamic Organization of User Historical QueriesDynamic Organization of User Historical Queries
Dynamic Organization of User Historical Queries
 
E04012533
E04012533E04012533
E04012533
 

Similar to Dh3211231128

An Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmAn Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmIOSR Journals
 
Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationIRJET Journal
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ari07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ariIAESIJEECS
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeySougata Das
 
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...CSCJournals
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
 
Image compression using genetic programming
Image compression using genetic programmingImage compression using genetic programming
Image compression using genetic programmingAhmed Ebid
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...IAEME Publication
 
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...IAEME Publication
 
A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...IAEME Publication
 
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...CSCJournals
 
The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...rinzindorjej
 
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowUsing Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowIJCSIS Research Publications
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval ofijcsity
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...cscpconf
 

Similar to Dh3211231128 (20)

An Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmAn Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution Algorithm
 
Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block Classification
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ari07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ari
 
A Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session KeyA Biometric Approach to Encrypt a File with the Help of Session Key
A Biometric Approach to Encrypt a File with the Help of Session Key
 
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
Fabric Textile Defect Detection, By Selection A Suitable Subset Of Wavelet Co...
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Image compression using genetic programming
Image compression using genetic programmingImage compression using genetic programming
Image compression using genetic programming
 
E017443136
E017443136E017443136
E017443136
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...Comparison between the genetic algorithms optimization and particle swarm opt...
Comparison between the genetic algorithms optimization and particle swarm opt...
 
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
COMPARISON BETWEEN THE GENETIC ALGORITHMS OPTIMIZATION AND PARTICLE SWARM OPT...
 
A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...
 
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
 
The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...
 
Breast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropyBreast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropy
 
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowUsing Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
Feature extraction based retrieval of
Feature extraction based retrieval ofFeature extraction based retrieval of
Feature extraction based retrieval of
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Dh3211231128

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645 www.ijmer.com 1123 | Page Mahesh G. Huddar Lecturer, Dept. of CSE,Hirasugar Institute of Technology, Nidasoshi, India Abstract:Fractal Image Compression is a lossy compression technique that has been developed in the early 1990s. Fractal image compression explores the self-similarity property of a natural image and utilizes the partitioned iterated function system (PIFS) to encode it. The fractal image compression problem had three major requirements: speeding up the compression algorithm, improving image quality and increasing compression ratio. So far, several methods have been proposed in order to speed-up fractal image compression. The time is essentially spent on the search of the similar domain block. This paper aims to present a method that uses Genetic algorithms to speed up computation time in fractal image compression with acceptable image quality and high compression rate. These improvements are obtained by encoding all regions in the image with different size blocks. Keywords:Fractal image compression; genetic algorithm. I. Introduction Deterministic Fractals have the intrinsic property of having extremely high visual complexity while being very low in information content, as they can be described and generated by simple recursive deterministic algorithms. They are mathematical objects with a high degree of redundancy in the sense that they are recursively made of transformed copies of either themselves or parts of themselves.Fractal image compression (FIC) was introduced by Bernesly [1] and Jacquin [2]. Since then, many researches have improved the original approach in various ways [3]. The image compression problem puts forward three major requirements: speeding up the compression algorithm, improving image qualityafter compression/decompression or increasing compression ratio. The method based on the theory of partitioned Iterated Function Systems (PIFS) [3] has received a lot of attention in the last ten years. To encode an image according to the self- similarity property, each block must find the most similar domain block in a large domain pool. In fractal image compression, the original image is partitioned into range blocks [8] and for each range block, a suitable domain block [2] D is searched, so it exists a transformation, T: Dom(I) → Ranges(I); T must guaranty ∀i, ∃j /T (Dj) ≈Ri A transformation is associated to each Ri, it codes the Dj coordinates and parameters of the transformation. The associated parameters for each Ri are: the isometric flip Rotation π/2, π,3π/2, the horizontal flip, the vertical flip, the transposed of Dom(I), the rotation π of the transposedof Dom(I), the luminance and contrast. A. General Structure of FIC Algorithm A general structure for most proposed fractal compression algorithms, for both coding and decoding images can be given by: Step 1: Encoding of an Image I • Set t = some tolerance level • Partitioning I into uncovered ranges Ri’s. • For each uncovered range Rido ▪ Search over all Di's in the pool domains: ▪ If (∃wi such thatd(Ri,wi(Di))< t) ◦ Report wiand compress it using adaptivearithmeticCoding (or any other lossless compression scheme.) Else ▪ Split Ri into sub-ranges and add them to the list of ranges to be covered. ◦ If the range can no longer be partitioned, return the minimum d(Ri, wi(Di)).Remove Ri from the uncovered list. Step 2: Decoding of a map w = ∪wi • Choose any image I0, and then compute the imagewn(I0) = ∪wni(I0). When n is big enough, wn (I0) ≈ Iw ≈ I. The major problem of this method is time consuming compared with others methods of image compression.In this paper, a new Genetic Algorithm forimage compression is proposed, that speed up this method when findinga LIFS [6] whose attractor is close to a given image. II. Literature Survey A fully automated fractal-based image compression technique of digital monochrome image was first proposed by Jacquin [2]. The encoding process consists of approximating the small image blocks, called range blocks, from the larger Genetic Algorithm based Fractal Image Compression
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645 www.ijmer.com 1124 | Page blocks, called domain blocks, of the image, through some operations. In the encoding process, separate transformations for each range block are obtained. The scheme also uses the theory of vector quantization [4] to classify the blocks. The set consisting of these transformations, when iterated upon any initial image, will produce a fixed point (attractor) that approximates the target image. This scheme can be viewed as partitioned iterative function system (PIFS). One such scheme, using PIFS, to store fewer number of bits (or to increase the compression ratio) was proposed by Fisher et al. [7]. III. Fractal Image Compression Using Genetic Algorithm There are many algorithms of optimization used for different domains. I have chosen Genetic Algorithm [7] [8] [9]to accelerate our fractal image compression algorithm.For each range domain Ri, the set of all possible domain blocks is genetically browsed until we find an appropriate solution. The genetic algorithm search space parameters are the domain block coordinates and the isometric flip. A. Chromosome Attributes A chromosome is constituted by 5 genes, from which only 3 genes are submitted to genetic modification, the two others are computed by the RMS equation.  Xdom,Ydom, flip: which are optimised by genetic search?  Contrast O, and scaling S: which are computed directly by RMS equation. Xdom Ydom Flip Oopt Sopt Figure 1 Chromosome Representation B. Genetic Operators The crossover and mutation operators ensure the production of offspring. These genetic operators must be defined according to the chromosome specification. With these basic components, a Genetic Algorithm works as follows: The first procedure is to generate the first population represented with string codification (Chromosome) that represents possible solution to the problem. Each individual is evaluated, and according to its fitness, an associated probability to be selected for reproduction is assigned. (1) Crossover Operator The crossover operator combines two individuals in the current population, to produce two offspring individuals included in the new generation. The main role of this operator is to create good new solutions based on the characteristics of their parents. To perform this operation, individuals from current population are chosen randomly and proportionally to their fitness value. This operator with a probability value fixed as a parameter for the algorithm. Experimental results have shown that a value of 0.7 is good to ensure quick convergence of the algorithm. The result coordinates for the offspring individuals are obtained by a linear combination of the parents coordinates. A random number 'a' is generated in the interval [0, 1], then the new coordinates are calculated according to the following formula: For the first offspring Xdom=a* Xdom1+(1-a)* Xdom2 Ydom=a* Ydom1 +(1-a)* Ydom2 For the second offspring Xdom=(1-a)* Xdom1+(1-a)* Xdom2 Ydom=(1-a)* Ydom1+(1-a)* Ydom2 This crossover pattern is very efficient. It allows to explore all the image area if the two parents are in separated regions, and to explore the nearest neighbourhood if they are in the same region. Figure 2 illustrates the described crossover pattern. Figure 2Crossover Operator Pattern
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645 www.ijmer.com 1125 | Page (2) Mutation operator Mutation operator is used in all implementations of genetic algorithms to introduce diversity in each population. Mutation is applied to individuals by changing pieces of their representations. These individuals are randomly selected according to their fitness value. At each position in the individual, we decide randomly, using a small mutation probability, whether the gene at this position is to be changed. This genetic operator allows the algorithm to explore new areas of the search space, and find new possible optimal solution. Here mutation operator is applied to some selected IFSs from the current population, one of the 3 genes Xdom, Ydom and flip is selected randomly, and changed with a random generated value. Figure 3 shows the general pattern of the mutation operator in our algorithm. Fig. 3 Mutation Operator Pattern C. Selection Process To avoid the premature convergence effect, linear scaling is applied to each individual fitness then, the Roulette wheel method is used as a selection process. D. Termination Criteria Any genetic algorithm must find the optimal solution for a given problem in a finite number of steps. Two criteria can cause the termination of the algorithm when applied to a given range block: • An acceptable value of fitness for the best in individual in the population is reached. • A maximum predefined count of generations is reached. This maximum count is a predefined parameter of the algorithm; it was determined experimentally and fixed to 20. E. Parameters of the Algorithm The set of parameters of genetic control is given by: (1) Population size: specify the number of individuals in each generated population (constant during all steps); (2) Crossover rate: specify the probability used to select individuals submitted to crossover operator; (3) Mutation rate: specify the probability used to select individuals submitted to mutation operator; (4) Maximum generations: specify the maximum number of generations to evaluate before assuming that a particular run has converged prematurely, and should be aborted. F. The Fitness Function In the case of IFS, the measure of quality for a given transformation is given by the RMS error between the coded range block, and the domain block determined by the transformation coordinates Xdom and Ydom, and transformed with corresponding luminance and contrast values. This error is calculated using the root mean square equation. The fitness function is defined by the value of this error, which is inversely proportional to the efficiency of the corresponding individual. G.The Genetic Fractal Image Compression Algorithm Based on all these elements, the geneticcompression algorithm operate on an input image to the following general steps: (Input I: NxNgrey scale image [Image would be square] (Output W: Coded IFS); (Region Size) = 16; (Fixed Error) = X * (Region Size)/4; Decompose the input image into (Region Size) blocks; While Exist (Regions not coded) -Scale the Domain Blocks; -Generate a random population of chromosomes; While Exist (Regions not coded) and (Last generation not reached)
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645 www.ijmer.com 1126 | Page -Compute fitness for all regions; -When optimal domain block found write obtained transformation parameters to the output W; -Generate new population {Apply Crossover and Mutation operators}; Wend (RegionSize) = (RegionSize)/2; (FixedError) = X * (RegionSize)/4; If Regions size > 4 Decompose the rest region not coded into (Range Size) blocks; Else (FixedError) = (Fixed Error) +X; Code all rest Regions; IEnd Wend IV. Experimental Results A. Std. Algorithm with Quad tree Partitioning Image RMS Limit Execution Time Quality (dB) Compression Ratio Lena 5.0 1:11:10 32.01 11.48 :1 Boat 5.0 1:27: 04 29.56 8.88:1 Peppers 5.0 1:05:17 33.07 24.56:1 Barb 5.0 1:22:15 33.07 10.85:1 Table 1. Result for different images with Quadtree blocks decomposition B. Standard algorithm improved with Classification (Y. Fisher approach) Image RMS Limit Execution Time Quality (dB) Compression Ratio Lena 5.0 0:02:55 30.05 9.73 :1 Boat 5.0 0:03:22 25.86 7.9 :1 Peppers 5.0 0:02:45 29.36 10.16 :1 Barb 5.0 0:04:12 21.07 8.62:1 Table 2. Results for different images with Quad tree blocks decomposition using Fisher’s classification C. Genetic Algorithm The genetic compression algorithm was used with Quad tree partitioning. Different parameters were used for each test, and the obtained results are given in both table forms and graphical forms. Examples of reconstructed images are also given to illustrate reconstruction quality. The following table shows different performances with different value of RMS error limit using fixed value for other parameters: population size=100, mutation rate=0.1, crossover rate=0.7 and maximum generations count =20. (1)Effect of parameters controlling fractal compression We can see from the Graphs 1 and 2, that image quality is inversely proportionate to RMS error limit. And compression rate is proportionate to that value. The compromise value of this parameter is 5.0 and it gives very acceptable performances. RMS Limit Execution Time Quality (dB) Ratio Ranges count 0.0 2 m 44 s 35.66 4.29:1 4096 2.0 1 m 56 s 35.03 6.35:1 2770 4.0 49 s 34.89 9.28:1 2023 5.0 43 s 34.80 9.82:1 1792 8.0 36 s 34.50 9.95:1 1768 10.0 33 s 30.50 10.05:1 1750 15.0 21 s 22.33 13.66:1 1288 20.0 14 s 19.36 19.34:1 910 25.0 13 s 19.01 26.25:1 670 Table 3. Different compression results of Lena image while applying different values ofRMS error limit
  • 5. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645 www.ijmer.com 1127 | Page Graph 1 Lena image quality variation according to RMS limit values Graph 2 Lena image compression rate variation according to RMS limit values (2) Effect of parameters controlling genetic evolution Population Size Execution Time Quality (dB) Ratio Ranges count 5 9 s 29.62 8.30:1 2119 10 11 s 29.98 8.35:1 2107 20 14 s 30.21 8.72:1 2017 50 23 s 32.11 9.36:1 1879 100 44 s 32.23 9.83:1 1789 250 2 m 24 s 33.74 10.35:1 1699 500 7 m 4 s 34.56 10.83:1 1624 1000 23m 4 s 35.12 10.97:1 1603 Table 4 Different compression results of Lena image while applying different values of population size Graph3 Lena image compression time variation according to population size values
  • 6. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-1123-1128 ISSN: 2249-6645 www.ijmer.com 1128 | Page Graph 4 Lena image quality variation according to population size values V. Conclusion It is clear that the best image quality is always obtained using the standard schema, but its computation time makes it unpractical. So we must accept less quality in favour of quick compression. The main goal was to accelerate standard compression schema, without greatly decreasing both image quality and compression ratio. Furthermore this work demonstrates the genetic algorithms ability to solve complex problems. References [1] M. Barnsley and L. Hurt,”Fractal Image Compression”, Peters, Wellesley, 1993 [2] A. E. Jaquin”Image coding based on a fractal theory of iterated contractive image transformations”, IEEE Trans. on image Processing. 1, PP, 18-30, 1992. [3] B.E. Wohlberg and G. de Jager,”A review of the fractal image coding literature”, IEEE Trans. on image Processing. 8(12), PP, 1716- 1729, 1999. [4] VeenadeviS.V. And A.G.Ananth”Fractal Image Compression with Quadtrees”, Signal & Image Processing: An International Journal (SIPIJ) Vol.3, No.2, April 2012. [5] M.F. Barnsley and S. Demko. Iterated function systems and the global construction of fractals. In Proceedings of the Royal Society of London A399, pages 243 275, 1985. [6] Arnaud E. Jacquin, “Fractal Image Coding: A Review”, MEMBER, IEEE [7] Y. Fisher, E. W. Jacbos, and R. D. Boss, “Fractal image compression using iterated transforms,” in Image and Text Compression, J. A. Storer, Ed. Boston, MA: Kluwer, 1992, pp. 36–61. [8] Y. Chakrapani and K. SoundaraRajan, “GENETIC Algorithm Applied To Fractal Image Compression”, ARPN Journal of Engineering and Applied Sciences, VOL. 4, NO. 1, FEBRUARY 2009 [9] S. K. Pal, D. Bhandari, and M. K. Kundu, “Genetic algorithms for optimal image enhancement,” Pattern Recognit. Lett, vol. 15, pp. 261–271, 1994. [10] S. Forrest, Ed., Proc. 5th Int. Conf. Genetic Algorithms, San Mateo, CA, July 1993.