This document presents an efficient technique called Back-Inking for document retrieval and image reconstruction from stored document images. Back-Inking works by replacing white pixels in an initialized blank image with black pixels, based on the addresses of information pixels stored in an array. The technique is tested on documents in different formats (GIF, BMP, JPG, TIF) and resolutions, showing that higher resolution images take longer to reconstruct but have better quality, while smaller partial document images reconstruct faster than full pages. Back-Inking provides an efficient way to retrieve images from stored address data.
Introducing the Concept of Back-Inking as an Efficient Model for Document Ret...IJITCA Journal
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This problem is becoming more complex with
time and the increase in the size and number of documents in an organization. Therefore, there is a
growing demand to address this problem. This demand and challenge can be met by developing a
technique to enable specialized document imaging people to use when there is a need for storing
documents images. Thus, we need special and efficient storage techniques for this type of information
storage (IS) systems.
In this paper, we present an efficient storage technique for electronic documents. The proposed technique
uses the Information Pixels concept to make the technique more efficient for certain image formats. In
addition, we shall see how Storing Information Pixels Addresses ( SIPA ) method is an efficient method for
document storage and as a result makes the document image storage relatively efficient for most image
formats.
Solving linear equations from an image using anneSAT Journals
Abstract
Optical character recognition has a great impact in image processing application. This paper combines the concept of OCR and feed-forward artificial neural network to solve mathematical linear equations. We implement blob analysis and feature extraction to extract the individual characters to a captured image which having some mathematical equations. We are constructing 39 character set which having some numbers, alphabet and operators. Training of these character set is done by using supervised learning rule. If that image satisfying linear equation condition then our proposed algorithm solve this equation and generate the output. This paper tries to increase the recognition rate more than 87%. The result achieved from the training and testing on the network of the letter recognition is satisfactory.
Keywords: Artificial Neural Network, Linear Equation, Recognized rate, Optical Character Recognition.
Design of Efficient High Speed Vedic Multiplierijsrd.com
Multipliers are extensively used in Microprocessors, DSP and Communication applications. For higher order multiplications, a huge number of adders are to be used to perform the partial product addition. This paper proposed the design of high speed Vedic Multiplier using the techniques of Ancient Indian Vedic Mathematics that have been modified to improve performance. Vedic Mathematics is the ancient system of mathematics which has a unique technique of calculations based on 16 Sutras. The work has proved the efficiency of Urdhva Triyagbhyam. It enables parallel generation of intermediate products, eliminates unwanted multiplication steps. Urdhva tiryakbhyam Sutra is most efficient Sutra (Algorithm), giving minimum delay for multiplication of all types of numbers, either small or large.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
High speed multiplier using vedic mathematicseSAT Journals
Abstract
The digital signal processing in today’s time need high speed computation. The basic building block of signal processing in
Communication, Biomedical signal processing, and Image processing remains Fast Fourier Transform (FFT). FFT computation
involves multiplications and additions. Speed of the DSP processor mainly depends on the speed of the multiplier. Time delay, power
dissipation and the silicon chip area. These are the most important parameters for the fast growing technology. The conventional
multiplication method requires more time and area and hence more power dissipation. In this paper an ancient Vedic multiplication
method called “Urdhva Triyakbhyam” is implemented. It is a method based on 16 sutras of Vedic mathematics. Vedic Mathematics
reduces the number of operations to be carried out compared to the conventional method. The code description is simulated and
synthesized using FPGA device Spartan XC3S400-PQ208.
Keywords— Vedic Multiplication, Urdhva Tiryakbhayam , FFT
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
This document proposes a new algorithm for encrypting and decrypting digital color images. The algorithm uses pixel shuffling, logistic map encryption, and steganography.
The encryption process involves dividing the image into blocks and rotating them, embedding the image size using steganography, shuffling pixels according to a secret pattern, and XORing the shuffled image with one generated chaotically from a logistic map.
Decryption reverses the process by XORing with the logistic map image, descrambling pixels, extracting the size, and rotating blocks back to the original orientation. Experimental results on a sample image show the encrypted image has a uniform color distribution that resists statistical analysis attacks.
A comprehensive study on Applications of Vedic Multipliers in signal processingIRJET Journal
This document discusses applications of Vedic multipliers in signal processing. It begins with an abstract that introduces digital signal processing operations and their importance. Convolution and multiplication play important roles in signal processing operations like convolution and correlation. The document then discusses how implementing high-speed Vedic multipliers based on ancient Vedic mathematics can make digital signal processing operations more efficient by reducing processing time compared to MATLAB's inbuilt functions. It provides examples of how Vedic multipliers can be used in convolution, fast Fourier transforms, MAC units, and other signal processing applications.
Implementation of an arithmetic logic using area efficient carry lookahead adderVLSICS Design
An arithmetic logic unit acts as the basic building blocks or cell of a central processing unit of a computer.
And it is a digital circuit comprised of the basic electronics components, which is used to perform various
function of arithmetic and logic and integral operations further the purpose of this work is to propose the
design of an 8-bit ALU which supports 4-bit multiplication. Thus, the functionalities of the ALU in this
study consist of following main functions like addition also subtraction, increment, decrement, AND, OR,
NOT, XOR, NOR also two complement generation Multiplication. And the functions with the adder in the
airthemetic logic unit are implemented using a Carry Look Ahead adder joined by a ripple carry approach.
The design of the following multiplier is achieved using the Booths Algorithm therefore the proposed ALU
can be designed by using verilog or VHDL and can also be designed on Cadence Virtuoso platform.
Introducing the Concept of Back-Inking as an Efficient Model for Document Ret...IJITCA Journal
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This problem is becoming more complex with
time and the increase in the size and number of documents in an organization. Therefore, there is a
growing demand to address this problem. This demand and challenge can be met by developing a
technique to enable specialized document imaging people to use when there is a need for storing
documents images. Thus, we need special and efficient storage techniques for this type of information
storage (IS) systems.
In this paper, we present an efficient storage technique for electronic documents. The proposed technique
uses the Information Pixels concept to make the technique more efficient for certain image formats. In
addition, we shall see how Storing Information Pixels Addresses ( SIPA ) method is an efficient method for
document storage and as a result makes the document image storage relatively efficient for most image
formats.
Solving linear equations from an image using anneSAT Journals
Abstract
Optical character recognition has a great impact in image processing application. This paper combines the concept of OCR and feed-forward artificial neural network to solve mathematical linear equations. We implement blob analysis and feature extraction to extract the individual characters to a captured image which having some mathematical equations. We are constructing 39 character set which having some numbers, alphabet and operators. Training of these character set is done by using supervised learning rule. If that image satisfying linear equation condition then our proposed algorithm solve this equation and generate the output. This paper tries to increase the recognition rate more than 87%. The result achieved from the training and testing on the network of the letter recognition is satisfactory.
Keywords: Artificial Neural Network, Linear Equation, Recognized rate, Optical Character Recognition.
Design of Efficient High Speed Vedic Multiplierijsrd.com
Multipliers are extensively used in Microprocessors, DSP and Communication applications. For higher order multiplications, a huge number of adders are to be used to perform the partial product addition. This paper proposed the design of high speed Vedic Multiplier using the techniques of Ancient Indian Vedic Mathematics that have been modified to improve performance. Vedic Mathematics is the ancient system of mathematics which has a unique technique of calculations based on 16 Sutras. The work has proved the efficiency of Urdhva Triyagbhyam. It enables parallel generation of intermediate products, eliminates unwanted multiplication steps. Urdhva tiryakbhyam Sutra is most efficient Sutra (Algorithm), giving minimum delay for multiplication of all types of numbers, either small or large.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
High speed multiplier using vedic mathematicseSAT Journals
Abstract
The digital signal processing in today’s time need high speed computation. The basic building block of signal processing in
Communication, Biomedical signal processing, and Image processing remains Fast Fourier Transform (FFT). FFT computation
involves multiplications and additions. Speed of the DSP processor mainly depends on the speed of the multiplier. Time delay, power
dissipation and the silicon chip area. These are the most important parameters for the fast growing technology. The conventional
multiplication method requires more time and area and hence more power dissipation. In this paper an ancient Vedic multiplication
method called “Urdhva Triyakbhyam” is implemented. It is a method based on 16 sutras of Vedic mathematics. Vedic Mathematics
reduces the number of operations to be carried out compared to the conventional method. The code description is simulated and
synthesized using FPGA device Spartan XC3S400-PQ208.
Keywords— Vedic Multiplication, Urdhva Tiryakbhayam , FFT
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
This document proposes a new algorithm for encrypting and decrypting digital color images. The algorithm uses pixel shuffling, logistic map encryption, and steganography.
The encryption process involves dividing the image into blocks and rotating them, embedding the image size using steganography, shuffling pixels according to a secret pattern, and XORing the shuffled image with one generated chaotically from a logistic map.
Decryption reverses the process by XORing with the logistic map image, descrambling pixels, extracting the size, and rotating blocks back to the original orientation. Experimental results on a sample image show the encrypted image has a uniform color distribution that resists statistical analysis attacks.
A comprehensive study on Applications of Vedic Multipliers in signal processingIRJET Journal
This document discusses applications of Vedic multipliers in signal processing. It begins with an abstract that introduces digital signal processing operations and their importance. Convolution and multiplication play important roles in signal processing operations like convolution and correlation. The document then discusses how implementing high-speed Vedic multipliers based on ancient Vedic mathematics can make digital signal processing operations more efficient by reducing processing time compared to MATLAB's inbuilt functions. It provides examples of how Vedic multipliers can be used in convolution, fast Fourier transforms, MAC units, and other signal processing applications.
Implementation of an arithmetic logic using area efficient carry lookahead adderVLSICS Design
An arithmetic logic unit acts as the basic building blocks or cell of a central processing unit of a computer.
And it is a digital circuit comprised of the basic electronics components, which is used to perform various
function of arithmetic and logic and integral operations further the purpose of this work is to propose the
design of an 8-bit ALU which supports 4-bit multiplication. Thus, the functionalities of the ALU in this
study consist of following main functions like addition also subtraction, increment, decrement, AND, OR,
NOT, XOR, NOR also two complement generation Multiplication. And the functions with the adder in the
airthemetic logic unit are implemented using a Carry Look Ahead adder joined by a ripple carry approach.
The design of the following multiplier is achieved using the Booths Algorithm therefore the proposed ALU
can be designed by using verilog or VHDL and can also be designed on Cadence Virtuoso platform.
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
Fingerprint recognition is one of the oldest and most popular biometric technologies and it is used in criminal investigations, civilian, commercial applications, and so on. Fingerprint matching is the process used to determine whether the two sets of fingerprints details come from the same finger or not. This work focuses on feature extraction and minutiae matching stage. There are many matching techniques used for fingerprint recognition systems such as minutiae based matching, pattern based matching, Correlation based matching, and image based matching.
A new method based upon Principal Component Analysis (PCA) for fingerprint enhancement is proposed in this paper. PCA is a useful statistical technique that has found application in fields such as face recognition and image compression, and is a common technique for finding patterns in data of high dimension. In the proposed method image is first decomposed into directional images using decimation free Directional Filter bank DDFB. Then PCA is applied to these directional fingerprint images which gives the PCA filtered images. Which are basically directional images? Then these directional images are reconstructed into one image which is the enhanced one. Simulation results are included illustrating the capability of the proposed method.
Design of Low Power Vedic Multiplier Based on Reversible LogicIJERA Editor
This document describes a proposed design for an 8-bit low power Vedic multiplier based on reversible logic. It begins with background on reversible logic and how it can reduce power dissipation compared to irreversible logic. It then discusses the Vedic multiplication algorithm Urdhva Tiryakbhyam Sutra and how it can generate partial products and sums in a single step, reducing the number of adders needed compared to other multipliers. The proposed 8-bit multiplier design is described as using four 4-bit Vedic multiplier blocks and three 8-bit ripple carry adders built from reversible HNG gates. Simulation results showing reduced power, area and delay are discussed.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIijcsit
In this document, we propose a simple algorithm for the encryption of gray-scale images, although the
scheme is perfectly usable in color images. Prior to encryption, the proposed algorithm includes a pair of
permutation processes, inspired by the Bernoulli mapping. The permutation disperses the image
information to hinder the unauthorized recovery of the original image. The image is encrypted using the
XOR function between a sequence generated from the same Bernoulli mapping and the image data,
obtained after two permutation processes. Finally, for the verification of the algorithm, the gray-scale Lena
pattern image was used; calculating histograms for each stage alongside of the encryption process. The
histograms prove dispersion evolution for pattern image during whole algorithm.
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET Journal
This document describes a 3D vision system that uses calibrated stereo cameras to estimate the depth of objects. It discusses using two digital cameras placed at different positions to capture images of the same object. Feature matching and disparity calculation algorithms are used to calculate depth based on the difference between images. The cameras are calibrated using camera parameters derived from images of a checkerboard pattern. Trigonometry formulas are then used to calculate depth based on the camera positions and disparity. A servo system is used to independently and synchronously move the cameras along the x and y axes to capture views of objects from different angles.
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...VIT-AP University
In this paper the most significant aspect of the proposed method is that, the developed multiplier architecture is based on vertical and crosswise structure of Ancient Indian Vedic Mathematics. As per this proposed architecture, for two 32-bit numbers; the multiplier and multiplicand, each are grouped as 16-bit numbers so that it decomposes into 16×16 multiplication modules. It is also illustrated that the further hierarchical decomposition of 8×8 modules into 4×4 modules and then 2×2 modules will have a significant VHDL coding of for 32x32 bits multiplication and their used FPGA family Virtex 7 low power implementation by Xilinx Synthesis 16.1 tool done. The synthesis results show that the computation time for calculating the product of 32x32 bits is delay 29.256 ns. (11.499ns logic, 11.994ns route) (48.9% logic, 51.1% route).
This work is proposed the feed forward neural network with symmetric table addition method to design the
neuron synapses algorithm of the sine function approximations, and according to the Taylor series
expansion. Matlab code and LabVIEW are used to build and create the neural network, which has been
designed and trained database set to improve its performance, and gets the best a global convergence with
small value of MSE errors and 97.22% accuracy.
PCA and LDA are dimensionality reduction techniques. PCA transforms variables into uncorrelated principal components while maximizing variance. It is unsupervised. LDA finds axes that maximize separation between classes while minimizing within-class variance. It is supervised and finds axes that separate classes well. The document provides mathematical explanations of how PCA and LDA work including calculating covariance matrices, eigenvalues, eigenvectors, and transformations.
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...ijsrd.com
Multipliers are extensively used in Microprocessors, DSP and Communication applications. For higher order multiplications, a huge number of adders are to be used to perform the partial product addition. The need of high speed multiplier is increasing as the need of high speed processors are increasing. In this project, comparative study of different multipliers is done for high speed. The project includes two 4x4 bit Vedic Multiplier (VM) "Urdhva Tiryakbhyam multiplier" and "Hierarchical Array of Array Multiplier" of Ancient Indian Vedic Mathematics which are compared in terms of their speed. Urdhva Tiryakbhyam sutra increases the speed of multiplier by reducing the number of iterations then Hierarchical Array of Array Multiplier.
This document presents a study on the implementation of a Vedic multiplier using an FPGA. It begins with background on Vedic mathematics and its application to multiplication. It then describes the design of a 4-bit Vedic multiplier using the concept of partial product generation and addition. The hardware implementation is presented, including schematic diagrams and simulation results. It is concluded that the Vedic multiplier design requires fewer logic resources and is more efficient than other multiplier designs.
The document discusses different types of images in Matlab including binary, grayscale, indexed, and RGB images. It also summarizes commands to convert between image types such as converting grayscale to indexed or truecolor to binary. Finally, it provides examples of how to view images, measure pixel values and distances, and crop images using the imtool command.
This document discusses working with images in MATLAB. It defines what an image is as a set of pixel intensity data stored in a 3D matrix with planes for red, green, and blue values. Popular image functions like imread, imshow, rgb2gray and imhist are introduced. Examples are given for loading an image, displaying it, converting it to grayscale, and viewing its histogram. Further image adjustments like contrast ratio changes and conversions to black and white or other formats are demonstrated.
5/3 Lifting Scheme Approach for Image InterpolationIOSRJECE
In this paper we proposed fast and accurate interpolation and resizing of images using lifting scheme approach. 5/3 lifting scheme is an accurate and computationally inexpensive interpolation technique for image resizing. We compared the bilinear interpolation, Haar lifting scheme and 5/3 lifting scheme in this paper. The lifting scheme algorithm is applied for image interpolation to resize the image. In case of reduction in size, the image components are reduced and the reconstruction will be carried out to the original image. The reconstruction results are better by using Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) with other techniques like bilinear interpolation and Haar lifting schemes. The interpolation and reconstruction is executed in much less time with better MSE and PSNR as compared to Bilinear and Haar lifting schemes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document provides an overview of dimensionality reduction techniques. It discusses linear dimensionality reduction methods like principal component analysis (PCA) as well as non-linear dimensionality reduction techniques. For non-linear dimensionality reduction, it describes the concept of manifolds and manifold learning. Specific manifold learning algorithms covered include Isomap, locally linear embedding (LLE), and applications of manifold learning.
An Introduction Linear Algebra for Neural Networks and Deep learningChetan Khatri
This document summarizes a talk on using linear algebra with Python for deep neural networks. It discusses how linear algebra provides useful structures like vectors and matrices for manipulating groups of numbers. It then covers various linear algebra concepts used in neural networks like vectors, matrices, scalar and elementwise operations, matrix multiplication, and transpose. Key linear algebra operations like addition, subtraction, and multiplication are explained through code examples in NumPy.
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALcscpconf
Basic group of visual techniques such as color, shape, texture are used in Content Based Image Retrievals (CBIR) to retrieve query image or sub region of image to find similar images in image database. To improve query result, relevance feedback is used many times in CBIR to help user to express their preference and improve query results. In this paper, a new approach for image retrieval is proposed which is based on the features such as Color Histogram, Eigen Values and Match Point. Images from various types of database are first identified by using edge detection techniques .Once the image is identified, then the image is searched in the particular database, then all related images are displayed. This will save the retrieval time. Further to retrieve the precise query image, any of the three techniques are used and comparison is done w.r.t. average retrieval time. Eigen value technique found to be the best as compared with other two techniques.
A comparative analysis of retrieval techniques in content based image retrievalcsandit
Basic group of visual techniques such as color, shape, texture are used in Content Based Image
Retrievals (CBIR) to retrieve query image or sub region of image to find similar images in
image database. To improve query result, relevance feedback is used many times in CBIR to
help user to express their preference and improve query results. In this paper, a new approach
for image retrieval is proposed which is based on the features such as Color Histogram, Eigen
Values and Match Point. Images from various types of database are first identified by using
edge detection techniques .Once the image is identified, then the image is searched in the
particular database, then all related images are displayed. This will save the retrieval time.
Further to retrieve the precise query image, any of the three techniques are used and
comparison is done w.r.t. average retrieval time. Eigen value technique found to be the best as
compared with other two techniques.
Wavelet-Based Warping Technique for Mobile Devicescsandit
The document proposes a wavelet-based warping technique to render novel views of compressed images on mobile devices. It uses Haar wavelet transform to compress large reference and depth images, reducing their size. The technique decomposes the images into approximation and detail parts, but only uses the approximation parts for warping. This improves rendering speed on mobile devices. The framework is implemented using Android tools and experiments show it provides faster rendering times for large images compared to direct warping without compression.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionAnish Patel
The document describes two computer vision projects: 1) A program that analyzes video from a webcam of a simple pendulum experiment and calculates physics quantities like angle, speed, and energy. 2) A program that grades scanned survey forms by analyzing pixel density to determine filled-in answers. The pendulum program displays angle measurements over time that match expected values. The survey program accurately grades forms with different levels of noise. Both were developed in C++ using OpenCV for computer vision processing.
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
Fingerprint recognition is one of the oldest and most popular biometric technologies and it is used in criminal investigations, civilian, commercial applications, and so on. Fingerprint matching is the process used to determine whether the two sets of fingerprints details come from the same finger or not. This work focuses on feature extraction and minutiae matching stage. There are many matching techniques used for fingerprint recognition systems such as minutiae based matching, pattern based matching, Correlation based matching, and image based matching.
A new method based upon Principal Component Analysis (PCA) for fingerprint enhancement is proposed in this paper. PCA is a useful statistical technique that has found application in fields such as face recognition and image compression, and is a common technique for finding patterns in data of high dimension. In the proposed method image is first decomposed into directional images using decimation free Directional Filter bank DDFB. Then PCA is applied to these directional fingerprint images which gives the PCA filtered images. Which are basically directional images? Then these directional images are reconstructed into one image which is the enhanced one. Simulation results are included illustrating the capability of the proposed method.
Design of Low Power Vedic Multiplier Based on Reversible LogicIJERA Editor
This document describes a proposed design for an 8-bit low power Vedic multiplier based on reversible logic. It begins with background on reversible logic and how it can reduce power dissipation compared to irreversible logic. It then discusses the Vedic multiplication algorithm Urdhva Tiryakbhyam Sutra and how it can generate partial products and sums in a single step, reducing the number of adders needed compared to other multipliers. The proposed 8-bit multiplier design is described as using four 4-bit Vedic multiplier blocks and three 8-bit ripple carry adders built from reversible HNG gates. Simulation results showing reduced power, area and delay are discussed.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIijcsit
In this document, we propose a simple algorithm for the encryption of gray-scale images, although the
scheme is perfectly usable in color images. Prior to encryption, the proposed algorithm includes a pair of
permutation processes, inspired by the Bernoulli mapping. The permutation disperses the image
information to hinder the unauthorized recovery of the original image. The image is encrypted using the
XOR function between a sequence generated from the same Bernoulli mapping and the image data,
obtained after two permutation processes. Finally, for the verification of the algorithm, the gray-scale Lena
pattern image was used; calculating histograms for each stage alongside of the encryption process. The
histograms prove dispersion evolution for pattern image during whole algorithm.
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET Journal
This document describes a 3D vision system that uses calibrated stereo cameras to estimate the depth of objects. It discusses using two digital cameras placed at different positions to capture images of the same object. Feature matching and disparity calculation algorithms are used to calculate depth based on the difference between images. The cameras are calibrated using camera parameters derived from images of a checkerboard pattern. Trigonometry formulas are then used to calculate depth based on the camera positions and disparity. A servo system is used to independently and synchronously move the cameras along the x and y axes to capture views of objects from different angles.
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...VIT-AP University
In this paper the most significant aspect of the proposed method is that, the developed multiplier architecture is based on vertical and crosswise structure of Ancient Indian Vedic Mathematics. As per this proposed architecture, for two 32-bit numbers; the multiplier and multiplicand, each are grouped as 16-bit numbers so that it decomposes into 16×16 multiplication modules. It is also illustrated that the further hierarchical decomposition of 8×8 modules into 4×4 modules and then 2×2 modules will have a significant VHDL coding of for 32x32 bits multiplication and their used FPGA family Virtex 7 low power implementation by Xilinx Synthesis 16.1 tool done. The synthesis results show that the computation time for calculating the product of 32x32 bits is delay 29.256 ns. (11.499ns logic, 11.994ns route) (48.9% logic, 51.1% route).
This work is proposed the feed forward neural network with symmetric table addition method to design the
neuron synapses algorithm of the sine function approximations, and according to the Taylor series
expansion. Matlab code and LabVIEW are used to build and create the neural network, which has been
designed and trained database set to improve its performance, and gets the best a global convergence with
small value of MSE errors and 97.22% accuracy.
PCA and LDA are dimensionality reduction techniques. PCA transforms variables into uncorrelated principal components while maximizing variance. It is unsupervised. LDA finds axes that maximize separation between classes while minimizing within-class variance. It is supervised and finds axes that separate classes well. The document provides mathematical explanations of how PCA and LDA work including calculating covariance matrices, eigenvalues, eigenvectors, and transformations.
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...ijsrd.com
Multipliers are extensively used in Microprocessors, DSP and Communication applications. For higher order multiplications, a huge number of adders are to be used to perform the partial product addition. The need of high speed multiplier is increasing as the need of high speed processors are increasing. In this project, comparative study of different multipliers is done for high speed. The project includes two 4x4 bit Vedic Multiplier (VM) "Urdhva Tiryakbhyam multiplier" and "Hierarchical Array of Array Multiplier" of Ancient Indian Vedic Mathematics which are compared in terms of their speed. Urdhva Tiryakbhyam sutra increases the speed of multiplier by reducing the number of iterations then Hierarchical Array of Array Multiplier.
This document presents a study on the implementation of a Vedic multiplier using an FPGA. It begins with background on Vedic mathematics and its application to multiplication. It then describes the design of a 4-bit Vedic multiplier using the concept of partial product generation and addition. The hardware implementation is presented, including schematic diagrams and simulation results. It is concluded that the Vedic multiplier design requires fewer logic resources and is more efficient than other multiplier designs.
The document discusses different types of images in Matlab including binary, grayscale, indexed, and RGB images. It also summarizes commands to convert between image types such as converting grayscale to indexed or truecolor to binary. Finally, it provides examples of how to view images, measure pixel values and distances, and crop images using the imtool command.
This document discusses working with images in MATLAB. It defines what an image is as a set of pixel intensity data stored in a 3D matrix with planes for red, green, and blue values. Popular image functions like imread, imshow, rgb2gray and imhist are introduced. Examples are given for loading an image, displaying it, converting it to grayscale, and viewing its histogram. Further image adjustments like contrast ratio changes and conversions to black and white or other formats are demonstrated.
5/3 Lifting Scheme Approach for Image InterpolationIOSRJECE
In this paper we proposed fast and accurate interpolation and resizing of images using lifting scheme approach. 5/3 lifting scheme is an accurate and computationally inexpensive interpolation technique for image resizing. We compared the bilinear interpolation, Haar lifting scheme and 5/3 lifting scheme in this paper. The lifting scheme algorithm is applied for image interpolation to resize the image. In case of reduction in size, the image components are reduced and the reconstruction will be carried out to the original image. The reconstruction results are better by using Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR) with other techniques like bilinear interpolation and Haar lifting schemes. The interpolation and reconstruction is executed in much less time with better MSE and PSNR as compared to Bilinear and Haar lifting schemes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document provides an overview of dimensionality reduction techniques. It discusses linear dimensionality reduction methods like principal component analysis (PCA) as well as non-linear dimensionality reduction techniques. For non-linear dimensionality reduction, it describes the concept of manifolds and manifold learning. Specific manifold learning algorithms covered include Isomap, locally linear embedding (LLE), and applications of manifold learning.
An Introduction Linear Algebra for Neural Networks and Deep learningChetan Khatri
This document summarizes a talk on using linear algebra with Python for deep neural networks. It discusses how linear algebra provides useful structures like vectors and matrices for manipulating groups of numbers. It then covers various linear algebra concepts used in neural networks like vectors, matrices, scalar and elementwise operations, matrix multiplication, and transpose. Key linear algebra operations like addition, subtraction, and multiplication are explained through code examples in NumPy.
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALcscpconf
Basic group of visual techniques such as color, shape, texture are used in Content Based Image Retrievals (CBIR) to retrieve query image or sub region of image to find similar images in image database. To improve query result, relevance feedback is used many times in CBIR to help user to express their preference and improve query results. In this paper, a new approach for image retrieval is proposed which is based on the features such as Color Histogram, Eigen Values and Match Point. Images from various types of database are first identified by using edge detection techniques .Once the image is identified, then the image is searched in the particular database, then all related images are displayed. This will save the retrieval time. Further to retrieve the precise query image, any of the three techniques are used and comparison is done w.r.t. average retrieval time. Eigen value technique found to be the best as compared with other two techniques.
A comparative analysis of retrieval techniques in content based image retrievalcsandit
Basic group of visual techniques such as color, shape, texture are used in Content Based Image
Retrievals (CBIR) to retrieve query image or sub region of image to find similar images in
image database. To improve query result, relevance feedback is used many times in CBIR to
help user to express their preference and improve query results. In this paper, a new approach
for image retrieval is proposed which is based on the features such as Color Histogram, Eigen
Values and Match Point. Images from various types of database are first identified by using
edge detection techniques .Once the image is identified, then the image is searched in the
particular database, then all related images are displayed. This will save the retrieval time.
Further to retrieve the precise query image, any of the three techniques are used and
comparison is done w.r.t. average retrieval time. Eigen value technique found to be the best as
compared with other two techniques.
Wavelet-Based Warping Technique for Mobile Devicescsandit
The document proposes a wavelet-based warping technique to render novel views of compressed images on mobile devices. It uses Haar wavelet transform to compress large reference and depth images, reducing their size. The technique decomposes the images into approximation and detail parts, but only uses the approximation parts for warping. This improves rendering speed on mobile devices. The framework is implemented using Android tools and experiments show it provides faster rendering times for large images compared to direct warping without compression.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionAnish Patel
The document describes two computer vision projects: 1) A program that analyzes video from a webcam of a simple pendulum experiment and calculates physics quantities like angle, speed, and energy. 2) A program that grades scanned survey forms by analyzing pixel density to determine filled-in answers. The pendulum program displays angle measurements over time that match expected values. The survey program accurately grades forms with different levels of noise. Both were developed in C++ using OpenCV for computer vision processing.
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
This document proposes and evaluates a near lossless image compression algorithm that divides color images into red, green, and blue channels. It classifies pixels in each channel row-by-row and records the results in mask images. The image data is then decomposed into sequences based on the classification and the mask images are hidden in the least significant bits of the sequences. Different encoding schemes like LZW, Huffman, and RLE are applied and compared. Experimental results on test images show the proposed algorithm achieves smaller bits per pixel than simple encoding schemes. PSNR values also indicate very little difference between original and reconstructed images.
This document discusses single object tracking and velocity determination. It begins with an introduction and objectives of the project which is to develop an algorithm for tracking a single object and determining its velocity in a sequence of video frames. It then provides details on preprocessing techniques like mean filtering, Gaussian smoothing and median filtering to reduce noise. It describes segmentation methods including histogram-based, single Gaussian background and frame difference approaches. Feature extraction methods like edges, bounding boxes and color are explained. Object detection using optical flow and block matching is covered. Finally, it discusses tracking and calculating velocity of the moving object. MATLAB is introduced as a technical computing language for solving these types of problems.
A Mat Lab built software application for similar image retrievalIOSR Journals
This document describes a Matlab software application for similar image retrieval that uses shape and color features. It discusses extracting edge features through horizontal, vertical, diagonal and anti-diagonal masks. It also discusses extracting color features by converting images to HSV color space and generating 128-bin color histograms. Features of images in a database are stored in a 'features.mat' file. For a query image, its features are compared to those in the database using Euclidean distance to find similar images. The most similar images based on feature similarity are displayed at the top of the results. The software provides image retrieval based on fusing color and shape features.
This document describes a proposed image indexing and retrieval algorithm using Texture Local Tetra Pattern (LTrP) with Gabor Transform.
The algorithm first finds the direction of each pixel and divides patterns into four parts based on the center pixel direction. It then calculates tetra patterns and separates them into binary patterns. Histograms are constructed from the binary patterns to form a feature vector.
The feature vectors of images in a medical image database are compared to a query image to retrieve similar images. Examples show a heart image used as the query to successfully retrieve related heart images from the database. Performance of the combined Gabor Transform and LTrP approach is analyzed.
This document describes a content-based image retrieval system that uses 2-D discrete wavelet transform with texture features. It proposes using DWT to reduce image dimensions before extracting texture features from images using gray level co-occurrence matrix. Texture features and Euclidean distance are then used to retrieve similar images from a database. The system is tested on a dataset of 1000 images from 10 classes and achieves an average retrieval accuracy of 89.8%.
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
This document proposes a content-based image retrieval system using 2D discrete wavelet transform and texture features. The system decomposes images using 2D DWT, extracts texture features from low frequency coefficients using GLCM, and retrieves similar images by calculating Euclidean distances between feature vectors. Experimental results on Wang's database show the proposed approach achieves 89.8% average retrieval accuracy.
Symmetric Image Encryption Algorithm Using 3D Rossler System........................................................1
Vishnu G. Kamat and Madhu Sharma
Node Monitoring with Fellowship Model against Black Hole Attacks in MANET.................................... 14
Rutuja Shah, M.Tech (I.T.-Networking), Lakshmi Rani, M.Tech (I.T.-Networking) and S. Sumathy, AP [SG]
Load Balancing using Peers in an E-Learning Environment ...................................................................... 22
Maria Dominic and Sagayaraj Francis
E-Transparency and Information Sharing in the Public Sector ................................................................ 30
Edison Lubua (PhD)
A Survey of Frequent Subgraphs and Subtree Mining Methods ............................................................. 39
Hamed Dinari and Hassan Naderi
A Model for Implementation of IT Service Management in Zimbabwean State Universities ................ 58
Munyaradzi Zhou, Caroline Ruvinga, Samuel Musungwini and Tinashe Gwendolyn Zhou
Present a Way to Find Frequent Tree Patterns using Inverted Index ..................................................... 66
Saeid Tajedi and Hasan Naderi
An Approach for Customer Satisfaction: Evaluation and Validation ....................................................... 79
Amina El Kebbaj and A. Namir
Spam Detection in Twitter – A Review...................................................................................................... 92
C. Divya Gowri and Professor V. Mohanraj
Template matching is a basic method in image analysis to extract useful information from images. In this
paper, we suggest a new method for pattern matching. Our method transform the template image from two
dimensional image into one dimensional vector. Also all sub-windows (same size of template) in the
reference image will transform into one dimensional vectors. The three similarity measures SAD, SSD, and
Euclidean are used to compute the likeness between template and all sub-windows in the reference image
to find the best match. The experimental results show the superior performance of the proposed method
over the conventional methods on various template of different sizes.
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...IRJET Journal
1. The document discusses a novel Translation Invariance (TI) approach for improving the performance of various digital image processing filters for image denoising.
2. It describes applying filters like convolution, wiener, gaussian etc. both without TI (directly on noisy image) and with TI (by shifting the image and averaging results) to denoise images.
3. The results found that using the TI approach, where the filters are applied after shifting the image and averaging the outputs, produced better performance and noise removal compared to directly applying the filters without translation invariance. This was also verified using edge detection tests.
The document proposes and evaluates a new digital image security scheme that uses Residue Number System (RNS) encoding/decoding and a modified Arnold transform algorithm. Key points:
- The encryption process encodes the plain image into residual images using RNS, then encrypts them by applying the modified Arnold transform multiple times.
- The decryption process decrypts the cipher image by applying the inverse Arnold transform, then decodes the residual images back into the plain image using RNS and the Chinese Remainder Theorem.
- Experimental results on images of different sizes show the scheme can encrypt/decrypt without information loss. Security analysis indicates resistance to statistical attacks like histograms and strong sensitivity to encryption keys.
The document proposes and evaluates a new digital image security scheme that uses Residue Number System (RNS) encoding/decoding and a modified Arnold transform algorithm. Key points:
- The encryption process encodes the plain image into residual images using RNS, then encrypts them using the modified Arnold transform.
- The decryption process decrypts the cipher image using the inverse Arnold transform, then decodes the residual images back into the plain image using RNS and the Chinese Remainder Theorem.
- Experimental results on test images of different sizes and formats show the scheme can effectively encrypt and decrypt without information loss. Security analysis also indicates resistance to statistical attacks like histograms and strong sensitivity to encryption keys.
A Hybrid Approach for Content Based Image Retrieval SystemIOSR Journals
This document describes a hybrid approach for content-based image retrieval. It combines several spatial features - row sum, column sum, forward and backward diagonal sums - and histograms to represent images with feature vectors. Euclidean distance is used to calculate similarity between a query image's feature vector and those in the database. The approach is evaluated using precision-recall calculations on different image groups, showing the hybrid method performs best by combining multiple features.
The document discusses a method for 3D object recognition from 2D images using centroidal representation. It involves several steps: filtering and binarizing the image, detecting edges, calculating the object center point, extracting features around the centroid, and creating mathematical models using wavelet transforms and autoregression. Centroidal samples represent distances from the center to the boundary every 45 degrees. Wavelet transforms and autoregression are used to create scale and position invariant representations of the object for recognition.
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
There are many researchers who have studied the relevance feedback in the literature of content based image
retrieval (CBIR) community, but none of CBIR search engines support it because of scalability, effectiveness
and efficiency issues. In this, we had implemented an integrated relevance feedback for retrieving of web
images. Here, we had concentrated on integration of both textual features (TF) and visual features (VF) based
relevance feedback (RF), simultaneously we also tested them individually. The TFRF employs and effective
search result clustering (SRC) algorithm to get salient phrases. Then a new user interface (UI) is proposed to
support RF. Experimental results show that the proposed algorithm is scalable, effective and accurated
Similar to INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETRIEVAL ( IMAGE RECONSTRUCTION ) (20)
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
Information Technology Convergence Services & AI (ITCAI 2024)IJITCA Journal
Welcome to ITCAI 2024
** Registration is currently open **
Submit Your Research Articles...!!!
International Conference on Information Technology Convergence Services & AI (ITCAI 2024)
September 14 ~ 15, 2024, Virtual Conference
https://itca2024.org/
Submission Deadline : June 01, 2024
Contact us:
Here's where you can reach us : itca@itca2024.org or itcaiconf@gmail.com
Submission Link:
https://itca2024.org/submission/index.php
#science #robots #coder #artificialintelligenceai #cybersecurity #java #javascript #future #digital #datavisualization #neuralnetworks #blockchain #digitalmarketing #raspberrypi #electronics #webdevelopment #marketing #html #startup #digitalart #dataanalysis #arduino #android #internetofthings #computervision #css #design #bhfyp #chatbot #codinglife
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
2 nd International Conference on Soft Computing, Data mining and Data Scienc...IJITCA Journal
2
nd International Conference on Soft Computing, Data mining and Data Science (SCDD
2024) will provide an excellent international forum for sharing knowledge and results in
theory, methodology and applications of Soft Computing, Data mining, and Data Science.
The Conference looks for significant contributions to all major fields of the Soft Computing,
Data mining, and Data Science in theoretical and practical aspects. The aim of the
Conference is to provide a platform to the researchers and practitioners from both academia
as well as industry to meet and share cutting-edge development in the field.
Authors are solicited to contribute to the Conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the following areas, but are not limited to.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
The International Journal of Information Technology, Control and Automation (IJITCA) is a Quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology (IT), Control Systems and Automation Engineering. The journal focuses on all technical and practical aspects of IT, Control Systems and Automation with applications in real-world engineering and scientific problems. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on information technology, control engineering, automation, modeling concepts and establishing new collaborations in these areas.
Authors are invited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Technology, Control Systems and Automation.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETRIEVAL ( IMAGE RECONSTRUCTION )
1. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
DOI:10.5121/ijitca.2013.3402 21
INTRODUCING THE CONCEPT OF BACK-
INKING AS AN EFFICIENT MODEL FOR
DOCUMENT RETRIEVAL
( IMAGE RECONSTRUCTION )
Mohammad A. ALGhalayini
Computer and Information Unit Director
Vice Rectorate for Graduate Studies and Scientific Research
King Saud University, Riyadh, Saudi Arabia
ABSTRACT
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This increase in the size and number of
documents is becoming a complex problem in most offices. Therefore, there is a demand to address this
challenging problem. This can be met by developing a technique to enable specialized document imaging
people to use when there is a need for storing documents images. Thus, there is a need for an efficient
retrieval technique for this type of information retrieval (IR) systems.
In this paper, we present an efficient retrieval technique for electronic documents. TheBack-Inking concept
is proposed as an efficient technique for certain image formats. The use of this approach is a continuation
of the SIPA [32]approach which was presented in an earlier paper as an efficient method for document
storage,and as a result makes the image retrieval relatively efficient.
KEYWORDS
Information Pixels, Document Retrieval, Document Segmentation, Image Formats, Back-Inking
1. INTRODUCTION
By using SIPA technique, we learned how we can store the addresses of information pixels and
how it helps in minimizing the storage size of the image components. We also analyzed the time
consumed to convert an image from its respective format into an array of addresses.
There is a practical significance of this analysis. By converting an image into our format, we are
saving the image not as an array with pixel intensity values but as an array with the addresses of
information pixels. The time taken to convert the image into such an array is in reality the time
taken to save the image in our format. Analogously, if retrieving the image saved in our format is
the purpose, in reality we will be converting the array of addresses of information pixels into an
image. The time taken to open the image saved in our format must be equivalent to converting the
2. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
22
array into an image. In this research paper, we retrieve the image from the array of addresses by
applying a technique that we shall call "Back-Inking".
2. BACK-INKING ALGORITHM
As the name implies, in this technique, we work backwards and replace an information pixel to
where the address in the array points to. The addresses of information pixels are stored in the
array. Every row in the array is made up of 2 elements. The first element is a pointer that points to
the row and the second element is a pointer that points to a column. Together, they work as a 2-
dimansional pointer pointing to the original location of the information pixel in an image.
The algorithm places a black pixel at the address pointed by the array and the remaining pixels
are white.
The Back-Inking Algorithm does the following:
• An array of size (mX n) is formed with all values in it being 256. This represents an image
with all pixels white. Let us call it image R. Here m and n are the corresponding numbers
of rows and columns( the coordinates ) in the original image.
• The algorithm reads the first row in the array of addresses.It contains 2 elements.
• It points to the row in image R correspondingto the first element among the 2 values read.
• It then points to the column in image R corresponding to the second element among the 2
values read.
• This pixel formed by the row-column intersection of addresses is replaced with the value
0.
• The algorithm next reads the second row in the array of addresses and points to the pixel
corresponding to that address in image R. This pixel value is replaced by 0.
• The process repeats till the algorithm reads all rows in the array of addresses and replaces
the pixels in image R corresponding to those addresses by 0.
Example: Let us simulate this algorithm for a BMP image with 150 pixels per inch.
Step 1: Create an array of size (1327 X 1004) with each value in it being 256. This image is called
R.
This represents an image with intensity 256 all through. Hence the image is white. This is an
initialization process. We replace white pixels with black ones according to the address stored in
the array.
Step 2: The first element in the array of addresses corresponding to this image is read.
We have seen in previous research paper [32] that the array of addresses that corresponds to a
BMP image of 150 pixels per inch has a size of (43266 X 2). Let us call this array Array1. The
first row of the array gets read, that is, Array1(1,1) and Array1(1,2).
Array1 (1,1)=1; Array (1,2)=241;
Step 3: The algorithm points to the first row in image R.
This is because it points to the row in image R corresponding to the first element read, that is,
Array1 (1,1)=1.
Step 4: It then points to the 241st
column in image R.
3. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
23
This is because it points to the column in image R corresponding to the second element read, that
is,
Array1 (1,2)=241.
Step 5: The pixel formed by the row-column intersection in step 3 and in step 4 is replaced by a 0.
Intensity 0 corresponds to black. We have now replaced a black pixel at location (1,241).
Step 6: The same process repeats for each row of Array1 and hence all addresses present in
Array1 are replaced by a 0 in image R, that is, a black pixel in image R. We shall call this the
"Back-Inking Process".
3. MATLAB SIMULATION OF BACK-INKING ALGORITHM
Previously, we have used MATLAB to store the image in the form of an array of addresses. We
will now simulate the conversion of array of addresses into an image in MATLAB.A snippet of
the code that is used for reconstruction of the image is shown below.
% Start counter to keep a tab of the time
tic;
% Reconstructed array
Rearray=uint8(255*ones(m,n));
for l=1:lgth
rearray(Array(l,1),Array(l,2))=0;
end
figure(2)
imshow(rearray)
% End of time counter
toc;
1. Here tic and toc commands are used to keep a tab of the time. They return the time taken
to convert the array of addresses into an image.
2. Rearray=uint8(255*ones(m,n));
We initialize the reconstructed image (calledrearray) with all intensity values 255.
Here
m- Number of rows in the image;
n- Number of columns in the image;
ones (m,n) will create an array of size (m X n) with all values in it being 1.
255*ones(m,n) will multiply each value in the array ones (m,n) by 255. Hence each value in the
array is now initialized to 255.
uint 8 is a function used to convert numbers from any data type to the type- uint8. This is because
images are supposed to be in the form uint8 in MATLAB. uint8 has a range (0 – 255) which
matches the intensity range in 8-bit grayscale images.
4. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
24
1. for l=1:lgth
rearray(Array(l,1),Array(l,2))=0;
end
This part of the program is used to replace each pixel in the image rearraywith an intensity value
0. The address of the pixel is pointed by the array of addresses (called Array).
Here lgth= number of rows in the array.
The for loop:
for l=1:lgth
………
End
executes the statement within the loop #lgth number of times and in each iteration, the value of l
is incremented by 1. The start value of l is 1 and its stop value is #lgth.
The statement within the for loop is:
Rearray(Array(l,1),Array(l,2))=0
As explained in the example above, the initial value in the for loop is Array(1,1)=1 and
Array(1,2)=241.
Here, rearray(Array(l,1),Array(l,2)), i.e., rearray(1,241)=0;
For each iteration in the for loop, successive values of addresses stored in Array are read and the
corresponding values in rearray are replaced by 0. Since the for loop ends at l=lgth, the last
iteration is executed till the last element in Array is read and a 0 is replaced in its corresponding
location in the image.
2. Imshow(rearray) is used to display the reconstructed image.
The same snippet of code can be used for all image formats with different dpi and for both full
body segments of the scanned document image and the whole A4 scanned document image types.
For the same dpi, since the size of the full body image is smaller than that of an A4 size image;
the number of information pixels in a full body image is lesser, the size of its corresponding array
of addresses is smaller and hence it will take lesser time to be reconstructed into an image when
compared to its A4 counterpart.
5. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
25
Table ( 1 ) below shows the reconstruction time and the average viewable mark of the reconstructed images
for different resolutions of the Whole KSU Document images.
No
IMAGE
FORMAT
( TYPE )
IMAGE
RESOLUTION
( DPI )
IMAGE
RECONTRUCTION
TIME ( Seconds )
IMAGE
EVALUATION
POINTS ( 10 )
1
GIF
75 1.8223 6.2
2 100 1.6245 6.9
3 150 7.8764 8.9
4 200 23.4180 9.7
5
BMP
75 0.8154 7.8
6 100 1.7831 8.6
7 150 8.4214 9.2
8 200 24.2599 9.6
9
JPG
75 1.4210 5.9
10 100 3.6006 7.1
11 150 14.6970 8.6
12 200 59.8907 9.1
13
TIF
75 0.7510 6.3
14 100 1.5989 7.9
15 150 7.7328 8.9
16 200 19.2055 9.6
Table ( 1 )
4 . MATLAB CODES AND RECONSTRUCTED IMAGES
Now we are ready to see the MATLAB codes and reconstructed images for the examined image
types for different image resolutions for both the whole KSU A4 document and for the Full Body
Segment images.
The code below is the code for reconstructing ( Back-Inking ) the whole A4 Document ( .gif )
format image scanned with ( 150 ) dpi.
clear all; close all; clc;
tic;
RGBimage = imread( 'C:UsersALGhalayini_rn a4sizegiffull page 256 colors 8bit 150.gif ,
'gif' );
GRAYimage = RGBimage;
figure ( 1 ) ;
imshow ( GRAYimage ) ;
6. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
26
m = length ( GRAYimage ) ;
n = length ( GRAYimage ( 1 , : ) ) ;
total_pixels = m * n;
k = 1;
fori = 1 : m
for j = 1 : n
ifGRAYimage ( i , j ) < 128
Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j;
k = k + 1;
end
end
end
Array = [Array1' Array2'];
Toc
Table ( 2 ) below shows the reconstruction time and the average viewable mark of the reconstructed images
for different resolutions of the Full Body Segment Images.
No
IMAGE
FORMAT
( TYPE )
IMAGE
RESOLUTION
( DPI )
IMAGE
RECONTRUCTION
TIME ( Seconds )
IMAGE
EVALUATION
POINTS ( 10 )
1
GIF
75 0.6415 5.1
2 100 1.4724 6.8
3 150 6.1677 9.0
4 200 12.8715 9.7
5
BMP
75 0.7326 4.1
6 100 1.4580 5.9
7 150 6.1659 8.1
8 200 12.6825 9.1
9
JPG
75 0.7860 6.4
10 100 1.7775 7.1
11 150 6.8940 8.9
12 200 12.8280 9.8
13
TIF
75 0.6282 6.3
14 100 1.4001 7.1
15 150 6.1385 8.5
16 200 12.9299 9.2
Table ( 2 )
7. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
27
Figure ( 1 ) below shows the reconstructed Image after applying the Back-Inking Method the whole A4
Document ( .gif ) format image scanned with (150) dpi
Figure ( 1 )
8. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
28
The code below is the code for reconstructing ( Back-Inking ) the Full Body ( .tif ) format
image scanned with ( 150 ) dpi.
clear all; close all; clc;
tic;
RGBimage = imread( 'C:UsersALGhalayini_rn Fulltiffull page 256 colors 8bit 150.tif' , 'tif' ) ;
GRAYimage= rgb2gray ( RGBimage ) ;
figure ( 1 ) ;
imshow ( GRAYimage ( 454 : 1459 , 118 : 1122 ) );
m = length ( GRAYimage ) ;
n = length ( GRAYimage ( 1 , : ) ) ;
total_pixels = m * n;
k = 1;
fori = 454 : 1459
for j = 118 : 1122
ifGRAYimage ( i , j ) < 128
Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j;
k = k + 1;
end
end
end
Array = [Array1' Array2'];
Toc
9. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
29
Figure ( 2 ) below shows the reconstructed Image after applying the Back-Inking Method the Full Body
Segment ( .tif ) format image scanned with ( 150 ) dpi
Figure ( 2 )
5. CONCLUSION
Our goal in this research paper was to introduce the concept of Back-Inking which is the
procedure to retrieve the stored addresses of the Information pixels from the array and plot black
10. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
30
pixels back into the white page to reconstruct the whole image back, then display it to the user in
a relatively short time.
We observe that the reconstructed images for all formats are better in quality, in that, as the dpi
increases, the sharpness of the image increases. But as the dpi increases the time to reconstruct
the image also increases.Through applying this method, we came up with the following
conclusions:
• The time taken to retrieve an image in a specific format with lesser dpi is less than the
time taken to retrieve an image in the same format with larger dpi. Hence, this is a
time/complexity-quality tradeoff.
• Full body images of a specific format and dpi take lesser time to be executed than its A4
size image counterpart.
• Consideringthe above 2 factors, the complexity and time of image retrieval increases as
we move from 75 to 200 dpi. It takes lesser time to retrieve a full body segment scanned
image than an A4 scanned image. We can therefore conclude that using 150 dpi full body
segment scanned images produces an optimum result because :
• Retrieval of images with 150 dpi do not take as much time as images with 200 dpi;
• Retrieval of an image with 150 dpi is not as complex as an image with 200 dpi because
the number of information pixels are lesser in images with 150 dpi and hence lesser the
size of the array of addresses.
• The quality of images is certainly better than images with 75,100
References
[1] O. Lezoray and H. Cardot, “Cooperation of color classification schemes and color watershed: a study
for microscopic images,” IEEE Trans. on Image Processing, no. 7, vol. 11, 2002.
[2] D. Comaniciu, “Image segmentation using clustering with saddle point detection,” IEEE Int. Conf.
Image Processing (ICIP'02), Rochester, NY, Vol. 3, 297-300, 2002
[3] G. Herman, and B. Carvalho, “Multiseeded segmentation using fuzzy connectedness,” IEEE Tans. On
Pattern Analysis and Machine Intelligence, no. 5, vol. 23, May 2001.
[4] R. Nock, F. Nielsen, “Semi-supervised statistical region refinement for color image segmentation,”
Pattern Recognition no. 6 vol. 38 pp. 835-846, 2005.
[5] T. Lee, and M. Lewicki, “Unsupervised classification, segmentation, and enhancement using, ICA
mixture model,” IEEE Trans. Image Proc. No. 3 vol 11 pp. 270-279, 2002.
[6] H. Shah-Hosseini and R. Safabakhsh, “Automatic multilevel thresholding for image segmentation by
growing time adaptive self-organizing map,” IEEE Tans. On Pattern Analysis and Machine
Intelligence, no. 10, vol. 24, 2002.
[7] T. HORIUCHI, “Grayscale image segmentation using color space,” IEICE Transactions on
Information and Systems, E89-D(3) pp. 1231-1237, 2006.
[8] T. Horiuchi and S. Hirano, "Colorization algorithm for grayscale image by propagating seed pixels,"
Proc. IEEE ICIP 2003, pp.457–460, 2003.
[9] Y. Deng, and B. Manjunath, “Unsupervised segmentation of color-texture regions in image and
video,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 3, vol, 23, pp. 800-810, 2001.
[10] Z. Tu, and S. Zhu, “Image segmentation by data-driven markov chain montecarlo,” IEEE Tans. On
Pattern Analysis and Machine Intelligence, no 5, vol. 24, pp. 657-673, 2002.
[11] J. Rushing, H. Ranganth, T. Hinke, and S. Graves, “Image Segmentation using association rule
features,” IEEE Trans. on Image Processing, no. 5, vol. 11, 2002.
[12] M. Ozden, E. Polat, “A color image segmentation approach for content-based image retrieval,”
Pattern Recognition,vol. 40 , issue 4, pp. 1318-1325, 2007.
11. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
31
[13] S. Panda, P. Nanda, and P Mohapatra, “Multiresolution Approach for Color Image Segmentation
using MRF Model,” Proceedings of the National Conference on Smart Communication Technologies
and Industrial Informatics, SCTII, 03-04 pp. 34-42, Rourkela, Feb 2007.
[14] S. Kang, S. Park, Y. Shin, H. Yoo, and D. Jang, “Image segmentation using statistical approach via
perception-based color Information,” International Journal of Computer Science and Network
Security, no. 4, vol. 8 No.4, April 2008.
[15] Bocij, P. et al., Business information systems: Technology, development and management. (London:
Financial Times Management, 1999).
[16] Richard Casey, " Document Image Analysis", available
athttp://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html
[17] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document ImageAnalysis",
available at:http://www.worldscibooks.com/compsci/2757.html
[18] M Simone, " Document Image Analysis And Recognition" , available at
:http://www.dsi.unifi.it/~simone/DIAR/
[19] "Document Image Analysis",availableat:http://elib.cs.berkeley.edu/dia.html
[20] Richard Casey, " Document Image Analysis", available
at:http://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html
[21] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document Image Analysis",
available at :http://www.worldscibooks.com/compsci/2757.html
[22] M Simone, " Document Image Analysis And Recognition" http://www.dsi.unifi.it/~simone/DIAR/
[23] "Basic Images Processing" : "Some general commands related to handling Matlab graphics and
printing" "Simple image processing operations that you can do with Matlab" available at:
http://noodle.med.yale.edu/~papad/ta/handouts/matlab_image.html
[24] "Document Image Analysis" availableat :http://elib.cs.berkeley.edu/dia.html
[25] "Getting Started with MATLAB" available at
:http://www.stewart.cs.sdsu.edu/cs205/module7/getting6.html
[26] "Matlab Image Processing Toolbox" available at
:http://homepages.inf.ed.ac.uk/rbf/HIPR2/impmatl.htm
[27] Matlab Resources" available at :http://www.cse.uiuc.edu/heath/scicomp/matlab.htm
[28] "Read and Display an Image" available at
:http://www.mathworks.com/access/helpdesk/help/toolbox/images/getting8.html
[29] "Reading and displaying images" matlab toutorial",03/25/2005, available at
:http://ai.ucsd.edu/Tutorial/matlab.html#images
[30] ALGhalayini M., Shah A., "Introducing The ( POSSDI ) Process : The Process of Optimizing the
Selection of The Scanned Document Images". International Joint Conferences on Computer,
Information, Systems Sciences, and Engineering (CISSE 06) December 4 - 14, 2006.
[31] Mohammad A. ALGhalayini and ELQasemALNemah, “An Efficient Storage and Retrieval
Technique for Documents Using Symantec Document Segmentation (SDS) Approach”; CISSE 2007,
The Third International Joint Conferenceson Computer, Information, and Systems Sciences, and
Engineering (CISSE 07).
[32] Mohammad A. ALGhalayini “Introducing The Concept Of Information Pixels and the SIPA ( Storing
Information Pixels Addresses ) Method As a Model for Document Storage”; CISSE 2011, The
Seventh International Joint Conferenceson Computer, Information, and Systems Sciences, and
Engineering (CISSE 11).
12. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013
32
AUTHOR
Mohammad A. ALGhalayini, Bs.C. in Computer Science and Mathematics, Iowa, USA.
1987. Ms.C. in Computer Science, Alabama, USA. 1999. Ph.D. in Information
Management Systems, London, UK. 2010.The author lectured at the College of
Information & Computer Sciences of King Saud University, KSA for more than 14 years.
Specialized in document management and databases, the author developed several
imaging database systems for various KSU offices and departments, currently working as an academic
researcherand supervisor of computer and Information unit at the KSU Vice Rectorate of Graduate Studies
and scientific Research.